FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:15404 core dump dir: /var/tmp secrets file: /etc/ipsec.secrets leak-detective enabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x55564d7fd0c8 size 40 | libevent_malloc: new ptr-libevent@0x55564d7fb878 size 40 | libevent_malloc: new ptr-libevent@0x55564d7fb7f8 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x55564d7fd728 size 56 | libevent_malloc: new ptr-libevent@0x55564d796558 size 664 | libevent_malloc: new ptr-libevent@0x55564d82b5a8 size 24 | libevent_malloc: new ptr-libevent@0x55564d7931f8 size 384 | libevent_malloc: new ptr-libevent@0x55564d822b68 size 16 | libevent_malloc: new ptr-libevent@0x55564d7fb778 size 40 | libevent_malloc: new ptr-libevent@0x55564d7fb6f8 size 48 | libevent_realloc: new ptr-libevent@0x55564d7961e8 size 256 | libevent_malloc: new ptr-libevent@0x55564d82b5f8 size 16 | libevent_free: release ptr-libevent@0x55564d7fd728 | libevent initialized | libevent_realloc: new ptr-libevent@0x55564d7fd728 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 starting up 20 crypto helpers started thread for crypto helper 0 | starting up helper thread 0 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) started thread for crypto helper 1 started thread for crypto helper 2 | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) started thread for crypto helper 3 started thread for crypto helper 4 | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) started thread for crypto helper 5 | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) started thread for crypto helper 6 | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) started thread for crypto helper 7 | starting up helper thread 7 | status value returned by setting the priority of this thread (crypto helper 7) 22 | crypto helper 7 waiting (nothing to do) started thread for crypto helper 8 | starting up helper thread 8 | status value returned by setting the priority of this thread (crypto helper 8) 22 | crypto helper 8 waiting (nothing to do) started thread for crypto helper 9 | starting up helper thread 9 | status value returned by setting the priority of this thread (crypto helper 9) 22 | crypto helper 9 waiting (nothing to do) started thread for crypto helper 10 | starting up helper thread 10 | status value returned by setting the priority of this thread (crypto helper 10) 22 | crypto helper 10 waiting (nothing to do) started thread for crypto helper 11 | starting up helper thread 11 | status value returned by setting the priority of this thread (crypto helper 11) 22 | crypto helper 11 waiting (nothing to do) started thread for crypto helper 12 | starting up helper thread 12 | status value returned by setting the priority of this thread (crypto helper 12) 22 | crypto helper 12 waiting (nothing to do) started thread for crypto helper 13 | starting up helper thread 13 | status value returned by setting the priority of this thread (crypto helper 13) 22 | crypto helper 13 waiting (nothing to do) started thread for crypto helper 14 | starting up helper thread 14 | status value returned by setting the priority of this thread (crypto helper 14) 22 | crypto helper 14 waiting (nothing to do) started thread for crypto helper 15 | starting up helper thread 15 | status value returned by setting the priority of this thread (crypto helper 15) 22 | crypto helper 15 waiting (nothing to do) started thread for crypto helper 16 | starting up helper thread 16 | status value returned by setting the priority of this thread (crypto helper 16) 22 | crypto helper 16 waiting (nothing to do) | starting up helper thread 1 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) started thread for crypto helper 17 | starting up helper thread 3 | status value returned by setting the priority of this thread (crypto helper 3) 22 | crypto helper 3 waiting (nothing to do) | starting up helper thread 17 | status value returned by setting the priority of this thread (crypto helper 17) 22 | crypto helper 17 waiting (nothing to do) started thread for crypto helper 18 | starting up helper thread 18 | status value returned by setting the priority of this thread (crypto helper 18) 22 | crypto helper 18 waiting (nothing to do) started thread for crypto helper 19 | starting up helper thread 19 | checking IKEv1 state table | status value returned by setting the priority of this thread (crypto helper 19) 22 | crypto helper 19 waiting (nothing to do) | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55564d82b1e8 | libevent_malloc: new ptr-libevent@0x55564d829ca8 size 128 | libevent_malloc: new ptr-libevent@0x55564d8307f8 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55564d830b68 | libevent_malloc: new ptr-libevent@0x55564d7ff2d8 size 128 | libevent_malloc: new ptr-libevent@0x55564d831118 size 16 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55564d831008 | libevent_malloc: new ptr-libevent@0x55564d83e3a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d849658 size 16 | libevent_realloc: new ptr-libevent@0x55564d849698 size 256 | libevent_malloc: new ptr-libevent@0x55564d8497c8 size 8 | libevent_realloc: new ptr-libevent@0x55564d849808 size 144 | libevent_malloc: new ptr-libevent@0x55564d78a0d8 size 152 | libevent_malloc: new ptr-libevent@0x55564d8498c8 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x55564d849908 size 8 | libevent_malloc: new ptr-libevent@0x55564d849948 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x55564d849a18 size 8 | libevent_malloc: new ptr-libevent@0x55564d849a58 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x55564d849b28 size 8 | libevent_realloc: release ptr-libevent@0x55564d849808 | libevent_realloc: new ptr-libevent@0x55564d849b68 size 256 | libevent_malloc: new ptr-libevent@0x55564d849c98 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:15544) using fork+execve | forked child 15544 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | Inspecting interface eth0 | found eth0 with address 192.1.3.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.2 | Inspecting interface eth0 | found eth0 with address 192.1.3.3 | Inspecting interface eth0 | found eth0 with address 192.1.3.4 | Inspecting interface eth0 | found eth0 with address 192.1.3.5 | Inspecting interface eth0 | found eth0 with address 192.1.3.6 | Inspecting interface eth0 | found eth0 with address 192.1.3.7 | Inspecting interface eth0 | found eth0 with address 192.1.3.8 | Inspecting interface eth0 | found eth0 with address 192.1.3.9 | Inspecting interface eth0 | found eth0 with address 192.1.3.10 | Inspecting interface eth0 | found eth0 with address 192.1.3.11 | Inspecting interface eth0 | found eth0 with address 192.1.3.12 | Inspecting interface eth0 | found eth0 with address 192.1.3.13 | Inspecting interface eth0 | found eth0 with address 192.1.3.14 | Inspecting interface eth0 | found eth0 with address 192.1.3.15 | Inspecting interface eth0 | found eth0 with address 192.1.3.16 | Inspecting interface eth0 | found eth0 with address 192.1.3.17 | Inspecting interface eth0 | found eth0 with address 192.1.3.18 | Inspecting interface eth0 | found eth0 with address 192.1.3.19 | Inspecting interface eth0 | found eth0 with address 192.1.3.20 | Inspecting interface eth0 | found eth0 with address 192.1.3.21 | Inspecting interface eth0 | found eth0 with address 192.1.3.22 | Inspecting interface eth0 | found eth0 with address 192.1.3.23 | Inspecting interface eth0 | found eth0 with address 192.1.3.24 | Inspecting interface eth0 | found eth0 with address 192.1.3.25 | Inspecting interface eth0 | found eth0 with address 192.1.3.26 | Inspecting interface eth0 | found eth0 with address 192.1.3.27 | Inspecting interface eth0 | found eth0 with address 192.1.3.28 | Inspecting interface eth0 | found eth0 with address 192.1.3.29 | Inspecting interface eth0 | found eth0 with address 192.1.3.30 | Inspecting interface eth0 | found eth0 with address 192.1.3.31 | Inspecting interface eth0 | found eth0 with address 192.1.3.32 | Inspecting interface eth0 | found eth0 with address 192.1.3.33 | Inspecting interface eth0 | found eth0 with address 192.1.3.34 | Inspecting interface eth0 | found eth0 with address 192.1.3.35 | Inspecting interface eth0 | found eth0 with address 192.1.3.36 | Inspecting interface eth0 | found eth0 with address 192.1.3.37 | Inspecting interface eth0 | found eth0 with address 192.1.3.38 | Inspecting interface eth0 | found eth0 with address 192.1.3.39 | Inspecting interface eth0 | found eth0 with address 192.1.3.40 | Inspecting interface eth0 | found eth0 with address 192.1.3.41 | Inspecting interface eth0 | found eth0 with address 192.1.3.42 | Inspecting interface eth0 | found eth0 with address 192.1.3.43 | Inspecting interface eth0 | found eth0 with address 192.1.3.44 | Inspecting interface eth0 | found eth0 with address 192.1.3.45 | Inspecting interface eth0 | found eth0 with address 192.1.3.46 | Inspecting interface eth0 | found eth0 with address 192.1.3.47 | Inspecting interface eth0 | found eth0 with address 192.1.3.48 | Inspecting interface eth0 | found eth0 with address 192.1.3.49 | Inspecting interface eth0 | found eth0 with address 192.1.3.50 | Inspecting interface eth0 | found eth0 with address 192.1.3.51 | Inspecting interface eth0 | found eth0 with address 192.1.3.52 | Inspecting interface eth0 | found eth0 with address 192.1.3.53 | Inspecting interface eth0 | found eth0 with address 192.1.3.54 | Inspecting interface eth0 | found eth0 with address 192.1.3.55 | Inspecting interface eth0 | found eth0 with address 192.1.3.56 | Inspecting interface eth0 | found eth0 with address 192.1.3.57 | Inspecting interface eth0 | found eth0 with address 192.1.3.58 | Inspecting interface eth0 | found eth0 with address 192.1.3.59 | Inspecting interface eth0 | found eth0 with address 192.1.3.60 | Inspecting interface eth0 | found eth0 with address 192.1.3.61 | Inspecting interface eth0 | found eth0 with address 192.1.3.62 | Inspecting interface eth0 | found eth0 with address 192.1.3.63 | Inspecting interface eth0 | found eth0 with address 192.1.3.64 | Inspecting interface eth0 | found eth0 with address 192.1.3.65 | Inspecting interface eth0 | found eth0 with address 192.1.3.66 | Inspecting interface eth0 | found eth0 with address 192.1.3.67 | Inspecting interface eth0 | found eth0 with address 192.1.3.68 | Inspecting interface eth0 | found eth0 with address 192.1.3.69 | Inspecting interface eth0 | found eth0 with address 192.1.3.70 | Inspecting interface eth0 | found eth0 with address 192.1.3.71 | Inspecting interface eth0 | found eth0 with address 192.1.3.72 | Inspecting interface eth0 | found eth0 with address 192.1.3.73 | Inspecting interface eth0 | found eth0 with address 192.1.3.74 | Inspecting interface eth0 | found eth0 with address 192.1.3.75 | Inspecting interface eth0 | found eth0 with address 192.1.3.76 | Inspecting interface eth0 | found eth0 with address 192.1.3.77 | Inspecting interface eth0 | found eth0 with address 192.1.3.78 | Inspecting interface eth0 | found eth0 with address 192.1.3.79 | Inspecting interface eth0 | found eth0 with address 192.1.3.80 | Inspecting interface eth0 | found eth0 with address 192.1.3.81 | Inspecting interface eth0 | found eth0 with address 192.1.3.82 | Inspecting interface eth0 | found eth0 with address 192.1.3.83 | Inspecting interface eth0 | found eth0 with address 192.1.3.84 | Inspecting interface eth0 | found eth0 with address 192.1.3.85 | Inspecting interface eth0 | found eth0 with address 192.1.3.86 | Inspecting interface eth0 | found eth0 with address 192.1.3.87 | Inspecting interface eth0 | found eth0 with address 192.1.3.88 | Inspecting interface eth0 | found eth0 with address 192.1.3.89 | Inspecting interface eth0 | found eth0 with address 192.1.3.90 | Inspecting interface eth0 | found eth0 with address 192.1.3.91 | Inspecting interface eth0 | found eth0 with address 192.1.3.92 | Inspecting interface eth0 | found eth0 with address 192.1.3.93 | Inspecting interface eth0 | found eth0 with address 192.1.3.94 | Inspecting interface eth0 | found eth0 with address 192.1.3.95 | Inspecting interface eth0 | found eth0 with address 192.1.3.96 | Inspecting interface eth0 | found eth0 with address 192.1.3.97 | Inspecting interface eth0 | found eth0 with address 192.1.3.98 | Inspecting interface eth0 | found eth0 with address 192.1.3.99 | Inspecting interface eth0 | found eth0 with address 192.1.3.100 | Inspecting interface eth0 | found eth0 with address 192.1.3.101 | Inspecting interface eth0 | found eth0 with address 192.1.3.102 | Inspecting interface eth0 | found eth0 with address 192.1.3.103 | Inspecting interface eth0 | found eth0 with address 192.1.3.104 | Inspecting interface eth0 | found eth0 with address 192.1.3.105 | Inspecting interface eth0 | found eth0 with address 192.1.3.106 | Inspecting interface eth0 | found eth0 with address 192.1.3.107 | Inspecting interface eth0 | found eth0 with address 192.1.3.108 | Inspecting interface eth0 | found eth0 with address 192.1.3.109 | Inspecting interface eth0 | found eth0 with address 192.1.3.110 | Inspecting interface eth0 | found eth0 with address 192.1.3.111 | Inspecting interface eth0 | found eth0 with address 192.1.3.112 | Inspecting interface eth0 | found eth0 with address 192.1.3.113 | Inspecting interface eth0 | found eth0 with address 192.1.3.114 | Inspecting interface eth0 | found eth0 with address 192.1.3.115 | Inspecting interface eth0 | found eth0 with address 192.1.3.116 | Inspecting interface eth0 | found eth0 with address 192.1.3.117 | Inspecting interface eth0 | found eth0 with address 192.1.3.118 | Inspecting interface eth0 | found eth0 with address 192.1.3.119 | Inspecting interface eth0 | found eth0 with address 192.1.3.120 | Inspecting interface eth0 | found eth0 with address 192.1.3.121 | Inspecting interface eth0 | found eth0 with address 192.1.3.122 | Inspecting interface eth0 | found eth0 with address 192.1.3.123 | Inspecting interface eth0 | found eth0 with address 192.1.3.124 | Inspecting interface eth0 | found eth0 with address 192.1.3.125 | Inspecting interface eth0 | found eth0 with address 192.1.3.126 | Inspecting interface eth0 | found eth0 with address 192.1.3.127 | Inspecting interface eth0 | found eth0 with address 192.1.3.128 | Inspecting interface eth0 | found eth0 with address 192.1.3.129 | Inspecting interface eth0 | found eth0 with address 192.1.3.130 | Inspecting interface eth0 | found eth0 with address 192.1.3.131 | Inspecting interface eth0 | found eth0 with address 192.1.3.132 | Inspecting interface eth0 | found eth0 with address 192.1.3.133 | Inspecting interface eth0 | found eth0 with address 192.1.3.134 | Inspecting interface eth0 | found eth0 with address 192.1.3.135 | Inspecting interface eth0 | found eth0 with address 192.1.3.136 | Inspecting interface eth0 | found eth0 with address 192.1.3.137 | Inspecting interface eth0 | found eth0 with address 192.1.3.138 | Inspecting interface eth0 | found eth0 with address 192.1.3.139 | Inspecting interface eth0 | found eth0 with address 192.1.3.140 | Inspecting interface eth0 | found eth0 with address 192.1.3.141 | Inspecting interface eth0 | found eth0 with address 192.1.3.142 | Inspecting interface eth0 | found eth0 with address 192.1.3.143 | Inspecting interface eth0 | found eth0 with address 192.1.3.144 | Inspecting interface eth0 | found eth0 with address 192.1.3.145 | Inspecting interface eth0 | found eth0 with address 192.1.3.146 | Inspecting interface eth0 | found eth0 with address 192.1.3.147 | Inspecting interface eth0 | found eth0 with address 192.1.3.148 | Inspecting interface eth0 | found eth0 with address 192.1.3.149 | Inspecting interface eth0 | found eth0 with address 192.1.3.150 | Inspecting interface eth0 | found eth0 with address 192.1.3.151 | Inspecting interface eth0 | found eth0 with address 192.1.3.152 | Inspecting interface eth0 | found eth0 with address 192.1.3.153 | Inspecting interface eth0 | found eth0 with address 192.1.3.154 | Inspecting interface eth0 | found eth0 with address 192.1.3.155 | Inspecting interface eth0 | found eth0 with address 192.1.3.156 | Inspecting interface eth0 | found eth0 with address 192.1.3.157 | Inspecting interface eth0 | found eth0 with address 192.1.3.158 | Inspecting interface eth0 | found eth0 with address 192.1.3.159 | Inspecting interface eth0 | found eth0 with address 192.1.3.160 | Inspecting interface eth0 | found eth0 with address 192.1.3.161 | Inspecting interface eth0 | found eth0 with address 192.1.3.162 | Inspecting interface eth0 | found eth0 with address 192.1.3.163 | Inspecting interface eth0 | found eth0 with address 192.1.3.164 | Inspecting interface eth0 | found eth0 with address 192.1.3.165 | Inspecting interface eth0 | found eth0 with address 192.1.3.166 | Inspecting interface eth0 | found eth0 with address 192.1.3.167 | Inspecting interface eth0 | found eth0 with address 192.1.3.168 | Inspecting interface eth0 | found eth0 with address 192.1.3.169 | Inspecting interface eth0 | found eth0 with address 192.1.3.170 | Inspecting interface eth0 | found eth0 with address 192.1.3.171 | Inspecting interface eth0 | found eth0 with address 192.1.3.172 | Inspecting interface eth0 | found eth0 with address 192.1.3.173 | Inspecting interface eth0 | found eth0 with address 192.1.3.174 | Inspecting interface eth0 | found eth0 with address 192.1.3.175 | Inspecting interface eth0 | found eth0 with address 192.1.3.176 | Inspecting interface eth0 | found eth0 with address 192.1.3.177 | Inspecting interface eth0 | found eth0 with address 192.1.3.178 | Inspecting interface eth0 | found eth0 with address 192.1.3.179 | Inspecting interface eth0 | found eth0 with address 192.1.3.180 | Inspecting interface eth0 | found eth0 with address 192.1.3.181 | Inspecting interface eth0 | found eth0 with address 192.1.3.182 | Inspecting interface eth0 | found eth0 with address 192.1.3.183 | Inspecting interface eth0 | found eth0 with address 192.1.3.184 | Inspecting interface eth0 | found eth0 with address 192.1.3.185 | Inspecting interface eth0 | found eth0 with address 192.1.3.186 | Inspecting interface eth0 | found eth0 with address 192.1.3.187 | Inspecting interface eth0 | found eth0 with address 192.1.3.188 | Inspecting interface eth0 | found eth0 with address 192.1.3.189 | Inspecting interface eth0 | found eth0 with address 192.1.3.190 | Inspecting interface eth0 | found eth0 with address 192.1.3.191 | Inspecting interface eth0 | found eth0 with address 192.1.3.192 | Inspecting interface eth0 | found eth0 with address 192.1.3.193 | Inspecting interface eth0 | found eth0 with address 192.1.3.194 | Inspecting interface eth0 | found eth0 with address 192.1.3.195 | Inspecting interface eth0 | found eth0 with address 192.1.3.196 | Inspecting interface eth0 | found eth0 with address 192.1.3.197 | Inspecting interface eth0 | found eth0 with address 192.1.3.198 | Inspecting interface eth0 | found eth0 with address 192.1.3.199 | Inspecting interface eth0 | found eth0 with address 192.1.3.200 | Inspecting interface eth0 | found eth0 with address 192.1.3.201 | Inspecting interface eth0 | found eth0 with address 192.1.3.202 | Inspecting interface eth0 | found eth0 with address 192.1.3.203 | Inspecting interface eth0 | found eth0 with address 192.1.3.204 | Inspecting interface eth0 | found eth0 with address 192.1.3.205 | Inspecting interface eth0 | found eth0 with address 192.1.3.206 | Inspecting interface eth0 | found eth0 with address 192.1.3.207 | Inspecting interface eth0 | found eth0 with address 192.1.3.208 | Inspecting interface eth0 | found eth0 with address 192.1.3.210 | Inspecting interface eth0 | found eth0 with address 192.1.3.211 | Inspecting interface eth0 | found eth0 with address 192.1.3.212 | Inspecting interface eth0 | found eth0 with address 192.1.3.213 | Inspecting interface eth0 | found eth0 with address 192.1.3.214 | Inspecting interface eth0 | found eth0 with address 192.1.3.215 | Inspecting interface eth0 | found eth0 with address 192.1.3.216 | Inspecting interface eth0 | found eth0 with address 192.1.3.217 | Inspecting interface eth0 | found eth0 with address 192.1.3.218 | Inspecting interface eth0 | found eth0 with address 192.1.3.219 | Inspecting interface eth0 | found eth0 with address 192.1.3.220 | Inspecting interface eth0 | found eth0 with address 192.1.3.221 | Inspecting interface eth0 | found eth0 with address 192.1.3.222 | Inspecting interface eth0 | found eth0 with address 192.1.3.223 | Inspecting interface eth0 | found eth0 with address 192.1.3.224 | Inspecting interface eth0 | found eth0 with address 192.1.3.225 | Inspecting interface eth0 | found eth0 with address 192.1.3.226 | Inspecting interface eth0 | found eth0 with address 192.1.3.227 | Inspecting interface eth0 | found eth0 with address 192.1.3.228 | Inspecting interface eth0 | found eth0 with address 192.1.3.229 | Inspecting interface eth0 | found eth0 with address 192.1.3.230 | Inspecting interface eth0 | found eth0 with address 192.1.3.231 | Inspecting interface eth0 | found eth0 with address 192.1.3.232 | Inspecting interface eth0 | found eth0 with address 192.1.3.233 | Inspecting interface eth0 | found eth0 with address 192.1.3.234 | Inspecting interface eth0 | found eth0 with address 192.1.3.235 | Inspecting interface eth0 | found eth0 with address 192.1.3.236 | Inspecting interface eth0 | found eth0 with address 192.1.3.237 | Inspecting interface eth0 | found eth0 with address 192.1.3.238 | Inspecting interface eth0 | found eth0 with address 192.1.3.239 | Inspecting interface eth0 | found eth0 with address 192.1.3.240 | Inspecting interface eth0 | found eth0 with address 192.1.3.241 | Inspecting interface eth0 | found eth0 with address 192.1.3.242 | Inspecting interface eth0 | found eth0 with address 192.1.3.243 | Inspecting interface eth0 | found eth0 with address 192.1.3.244 | Inspecting interface eth0 | found eth0 with address 192.1.3.245 | Inspecting interface eth0 | found eth0 with address 192.1.3.246 | Inspecting interface eth0 | found eth0 with address 192.1.3.247 | Inspecting interface eth0 | found eth0 with address 192.1.3.248 | Inspecting interface eth0 | found eth0 with address 192.1.3.249 | Inspecting interface eth0 | found eth0 with address 192.1.3.250 | Inspecting interface eth0 | found eth0 with address 192.1.3.251 | Inspecting interface eth0 | found eth0 with address 192.1.3.252 Kernel supports NIC esp-hw-offload adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.252:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.252:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.251:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.251:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.250:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.250:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.249:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.249:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.248:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.248:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.247:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.247:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.246:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.246:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.245:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.245:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.244:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.244:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.243:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.243:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.242:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.242:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.241:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.241:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.240:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.240:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.239:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.239:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.238:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.238:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.237:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.237:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.236:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.236:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.235:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.235:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.234:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.234:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.233:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.233:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.232:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.232:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.231:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.231:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.230:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.230:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.229:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.229:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.228:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.228:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.227:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.227:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.226:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.226:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.225:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.225:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.224:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.224:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.223:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.223:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.222:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.222:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.221:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.221:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.220:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.220:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.219:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.219:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.218:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.218:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.217:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.217:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.216:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.216:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.215:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.215:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.214:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.214:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.213:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.213:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.212:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.212:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.211:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.211:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.210:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.210:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.208:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.208:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.207:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.207:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.206:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.206:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.205:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.205:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.204:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.204:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.203:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.203:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.202:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.202:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.201:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.201:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.200:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.200:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.199:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.199:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.198:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.198:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.197:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.197:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.196:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.196:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.195:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.195:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.194:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.194:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.193:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.193:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.192:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.192:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.191:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.191:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.190:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.190:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.189:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.189:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.188:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.188:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.187:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.187:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.186:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.186:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.185:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.185:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.184:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.184:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.183:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.183:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.182:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.182:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.181:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.181:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.180:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.180:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.179:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.179:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.178:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.178:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.177:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.177:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.176:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.176:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.175:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.175:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.174:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.174:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.173:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.173:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.172:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.172:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.171:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.171:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.170:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.170:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.169:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.169:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.168:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.168:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.167:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.167:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.166:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.166:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.165:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.165:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.164:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.164:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.163:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.163:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.162:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.162:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.161:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.161:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.160:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.160:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.159:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.159:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.158:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.158:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.157:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.157:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.156:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.156:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.155:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.155:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.154:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.154:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.153:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.153:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.152:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.152:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.151:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.151:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.150:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.150:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.149:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.149:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.148:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.148:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.147:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.147:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.146:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.146:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.145:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.145:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.144:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.144:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.143:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.143:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.142:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.142:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.141:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.141:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.140:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.140:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.139:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.139:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.138:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.138:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.137:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.137:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.136:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.136:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.135:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.135:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.134:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.134:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.133:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.133:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.132:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.132:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.131:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.131:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.130:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.130:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.129:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.129:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.128:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.128:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.127:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.127:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.126:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.126:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.125:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.125:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.124:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.124:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.123:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.123:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.122:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.122:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.121:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.121:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.120:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.120:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.119:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.119:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.118:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.118:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.117:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.117:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.116:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.116:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.115:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.115:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.114:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.114:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.113:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.113:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.112:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.112:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.111:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.111:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.110:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.110:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.109:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.109:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.108:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.108:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.107:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.107:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.106:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.106:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.105:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.105:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.104:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.104:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.103:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.103:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.102:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.102:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.101:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.101:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.100:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.100:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.99:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.99:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.98:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.98:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.97:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.97:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.96:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.96:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.95:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.95:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.94:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.94:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.93:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.93:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.92:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.92:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.91:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.91:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.90:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.90:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.89:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.89:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.88:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.88:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.87:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.87:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.86:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.86:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.85:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.85:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.84:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.84:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.83:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.83:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.82:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.82:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.81:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.81:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.80:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.80:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.79:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.79:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.78:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.78:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.77:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.77:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.76:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.76:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.75:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.75:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.74:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.74:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.73:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.73:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.72:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.72:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.71:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.71:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.70:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.70:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.69:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.69:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.68:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.68:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.67:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.67:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.66:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.66:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.65:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.65:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.64:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.64:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.63:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.63:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.62:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.62:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.61:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.61:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.60:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.60:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.59:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.59:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.58:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.58:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.57:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.57:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.56:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.56:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.55:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.55:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.54:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.54:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.53:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.53:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.52:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.52:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.51:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.51:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.50:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.50:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.49:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.49:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.48:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.48:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.47:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.47:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.46:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.46:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.45:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.45:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.44:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.44:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.43:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.43:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.42:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.42:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.41:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.41:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.40:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.40:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.39:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.39:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.38:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.38:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.37:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.37:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.36:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.36:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.35:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.35:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.34:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.34:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.33:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.33:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.32:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.32:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.31:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.31:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.30:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.30:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.29:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.29:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.28:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.28:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.27:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.27:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.26:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.26:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.25:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.25:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.24:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.24:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.23:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.23:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.22:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.22:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.21:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.21:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.20:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.20:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.19:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.19:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.18:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.18:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.17:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.17:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.16:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.16:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.15:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.15:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.14:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.14:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.13:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.13:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.12:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.12:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.11:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.11:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.10:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.10:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.9:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.9:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.8:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.8:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.7:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.7:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.6:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.6:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.5:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.5:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.4:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.4:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.3:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.3:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.2:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.2:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.1:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.209:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x55564d86d858 | libevent_malloc: new ptr-libevent@0x55564d83e2f8 size 128 | libevent_realloc: release ptr-libevent@0x55564d7961e8 | libevent_realloc: new ptr-libevent@0x55564d84d288 size 8192 | libevent_malloc: new ptr-libevent@0x55564d75d898 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 522 | add_fd_read_event_handler: new ethX-pe@0x55564d754128 | libevent_malloc: new ptr-libevent@0x55564d7ff388 size 128 | libevent_malloc: new ptr-libevent@0x55564d75d8d8 size 16 | setup callback for interface lo 127.0.0.1:500 fd 521 | add_fd_read_event_handler: new ethX-pe@0x55564d849df8 | libevent_malloc: new ptr-libevent@0x55564d7fe748 size 128 | libevent_malloc: new ptr-libevent@0x55564d849e68 size 16 | setup callback for interface eth0 192.1.3.209:4500 fd 520 | add_fd_read_event_handler: new ethX-pe@0x55564d849ea8 | libevent_malloc: new ptr-libevent@0x55564d7fd378 size 128 | libevent_malloc: new ptr-libevent@0x55564d849f18 size 16 | setup callback for interface eth0 192.1.3.209:500 fd 519 | add_fd_read_event_handler: new ethX-pe@0x55564d849f58 | libevent_malloc: new ptr-libevent@0x55564d7fd478 size 128 | libevent_malloc: new ptr-libevent@0x55564d849fc8 size 16 | setup callback for interface eth0 192.1.3.1:4500 fd 518 | add_fd_read_event_handler: new ethX-pe@0x55564d84a008 | libevent_malloc: new ptr-libevent@0x55564d7fd578 size 128 | libevent_malloc: new ptr-libevent@0x55564d84a078 size 16 | setup callback for interface eth0 192.1.3.1:500 fd 517 | add_fd_read_event_handler: new ethX-pe@0x55564d84a0b8 | libevent_malloc: new ptr-libevent@0x55564d84a128 size 128 | libevent_malloc: new ptr-libevent@0x55564d84a1d8 size 16 | setup callback for interface eth0 192.1.3.2:4500 fd 516 | add_fd_read_event_handler: new ethX-pe@0x55564d84a218 | libevent_malloc: new ptr-libevent@0x55564d84a288 size 128 | libevent_malloc: new ptr-libevent@0x55564d84a338 size 16 | setup callback for interface eth0 192.1.3.2:500 fd 515 | add_fd_read_event_handler: new ethX-pe@0x55564d84a378 | libevent_malloc: new ptr-libevent@0x55564d84a3e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d84a498 size 16 | setup callback for interface eth0 192.1.3.3:4500 fd 514 | add_fd_read_event_handler: new ethX-pe@0x55564d84a4d8 | libevent_malloc: new ptr-libevent@0x55564d84a548 size 128 | libevent_malloc: new ptr-libevent@0x55564d84f2b8 size 16 | setup callback for interface eth0 192.1.3.3:500 fd 513 | add_fd_read_event_handler: new ethX-pe@0x55564d84f2f8 | libevent_malloc: new ptr-libevent@0x55564d84f368 size 128 | libevent_malloc: new ptr-libevent@0x55564d84f418 size 16 | setup callback for interface eth0 192.1.3.4:4500 fd 512 | add_fd_read_event_handler: new ethX-pe@0x55564d84f458 | libevent_malloc: new ptr-libevent@0x55564d84f4c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d84f578 size 16 | setup callback for interface eth0 192.1.3.4:500 fd 511 | add_fd_read_event_handler: new ethX-pe@0x55564d84f5b8 | libevent_malloc: new ptr-libevent@0x55564d84f628 size 128 | libevent_malloc: new ptr-libevent@0x55564d84f6d8 size 16 | setup callback for interface eth0 192.1.3.5:4500 fd 510 | add_fd_read_event_handler: new ethX-pe@0x55564d84f718 | libevent_malloc: new ptr-libevent@0x55564d84f788 size 128 | libevent_malloc: new ptr-libevent@0x55564d84f838 size 16 | setup callback for interface eth0 192.1.3.5:500 fd 509 | add_fd_read_event_handler: new ethX-pe@0x55564d84f878 | libevent_malloc: new ptr-libevent@0x55564d84f8e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d84f998 size 16 | setup callback for interface eth0 192.1.3.6:4500 fd 508 | add_fd_read_event_handler: new ethX-pe@0x55564d84f9d8 | libevent_malloc: new ptr-libevent@0x55564d84fa48 size 128 | libevent_malloc: new ptr-libevent@0x55564d84faf8 size 16 | setup callback for interface eth0 192.1.3.6:500 fd 507 | add_fd_read_event_handler: new ethX-pe@0x55564d84fb38 | libevent_malloc: new ptr-libevent@0x55564d84fba8 size 128 | libevent_malloc: new ptr-libevent@0x55564d84fc58 size 16 | setup callback for interface eth0 192.1.3.7:4500 fd 506 | add_fd_read_event_handler: new ethX-pe@0x55564d84fc98 | libevent_malloc: new ptr-libevent@0x55564d84fd08 size 128 | libevent_malloc: new ptr-libevent@0x55564d84fdb8 size 16 | setup callback for interface eth0 192.1.3.7:500 fd 505 | add_fd_read_event_handler: new ethX-pe@0x55564d84fdf8 | libevent_malloc: new ptr-libevent@0x55564d84fe68 size 128 | libevent_malloc: new ptr-libevent@0x55564d84ff18 size 16 | setup callback for interface eth0 192.1.3.8:4500 fd 504 | add_fd_read_event_handler: new ethX-pe@0x55564d84ff58 | libevent_malloc: new ptr-libevent@0x55564d84ffc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d850078 size 16 | setup callback for interface eth0 192.1.3.8:500 fd 503 | add_fd_read_event_handler: new ethX-pe@0x55564d8500b8 | libevent_malloc: new ptr-libevent@0x55564d850128 size 128 | libevent_malloc: new ptr-libevent@0x55564d8501d8 size 16 | setup callback for interface eth0 192.1.3.9:4500 fd 502 | add_fd_read_event_handler: new ethX-pe@0x55564d850218 | libevent_malloc: new ptr-libevent@0x55564d850288 size 128 | libevent_malloc: new ptr-libevent@0x55564d850338 size 16 | setup callback for interface eth0 192.1.3.9:500 fd 501 | add_fd_read_event_handler: new ethX-pe@0x55564d850378 | libevent_malloc: new ptr-libevent@0x55564d8503e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d850498 size 16 | setup callback for interface eth0 192.1.3.10:4500 fd 500 | add_fd_read_event_handler: new ethX-pe@0x55564d8504d8 | libevent_malloc: new ptr-libevent@0x55564d850548 size 128 | libevent_malloc: new ptr-libevent@0x55564d8505f8 size 16 | setup callback for interface eth0 192.1.3.10:500 fd 499 | add_fd_read_event_handler: new ethX-pe@0x55564d850638 | libevent_malloc: new ptr-libevent@0x55564d8506a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d850758 size 16 | setup callback for interface eth0 192.1.3.11:4500 fd 498 | add_fd_read_event_handler: new ethX-pe@0x55564d850798 | libevent_malloc: new ptr-libevent@0x55564d850808 size 128 | libevent_malloc: new ptr-libevent@0x55564d8508b8 size 16 | setup callback for interface eth0 192.1.3.11:500 fd 497 | add_fd_read_event_handler: new ethX-pe@0x55564d8508f8 | libevent_malloc: new ptr-libevent@0x55564d850968 size 128 | libevent_malloc: new ptr-libevent@0x55564d850a18 size 16 | setup callback for interface eth0 192.1.3.12:4500 fd 496 | add_fd_read_event_handler: new ethX-pe@0x55564d850a58 | libevent_malloc: new ptr-libevent@0x55564d850ac8 size 128 | libevent_malloc: new ptr-libevent@0x55564d850b78 size 16 | setup callback for interface eth0 192.1.3.12:500 fd 495 | add_fd_read_event_handler: new ethX-pe@0x55564d850bb8 | libevent_malloc: new ptr-libevent@0x55564d850c28 size 128 | libevent_malloc: new ptr-libevent@0x55564d850cd8 size 16 | setup callback for interface eth0 192.1.3.13:4500 fd 494 | add_fd_read_event_handler: new ethX-pe@0x55564d850d18 | libevent_malloc: new ptr-libevent@0x55564d850d88 size 128 | libevent_malloc: new ptr-libevent@0x55564d850e38 size 16 | setup callback for interface eth0 192.1.3.13:500 fd 493 | add_fd_read_event_handler: new ethX-pe@0x55564d850e78 | libevent_malloc: new ptr-libevent@0x55564d850ee8 size 128 | libevent_malloc: new ptr-libevent@0x55564d850f98 size 16 | setup callback for interface eth0 192.1.3.14:4500 fd 492 | add_fd_read_event_handler: new ethX-pe@0x55564d850fd8 | libevent_malloc: new ptr-libevent@0x55564d851048 size 128 | libevent_malloc: new ptr-libevent@0x55564d8510f8 size 16 | setup callback for interface eth0 192.1.3.14:500 fd 491 | add_fd_read_event_handler: new ethX-pe@0x55564d851138 | libevent_malloc: new ptr-libevent@0x55564d8511a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d851258 size 16 | setup callback for interface eth0 192.1.3.15:4500 fd 490 | add_fd_read_event_handler: new ethX-pe@0x55564d851298 | libevent_malloc: new ptr-libevent@0x55564d851308 size 128 | libevent_malloc: new ptr-libevent@0x55564d8513b8 size 16 | setup callback for interface eth0 192.1.3.15:500 fd 489 | add_fd_read_event_handler: new ethX-pe@0x55564d8513f8 | libevent_malloc: new ptr-libevent@0x55564d851468 size 128 | libevent_malloc: new ptr-libevent@0x55564d851518 size 16 | setup callback for interface eth0 192.1.3.16:4500 fd 488 | add_fd_read_event_handler: new ethX-pe@0x55564d851558 | libevent_malloc: new ptr-libevent@0x55564d8515c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d851678 size 16 | setup callback for interface eth0 192.1.3.16:500 fd 487 | add_fd_read_event_handler: new ethX-pe@0x55564d8516b8 | libevent_malloc: new ptr-libevent@0x55564d851728 size 128 | libevent_malloc: new ptr-libevent@0x55564d8517d8 size 16 | setup callback for interface eth0 192.1.3.17:4500 fd 486 | add_fd_read_event_handler: new ethX-pe@0x55564d851818 | libevent_malloc: new ptr-libevent@0x55564d851888 size 128 | libevent_malloc: new ptr-libevent@0x55564d851938 size 16 | setup callback for interface eth0 192.1.3.17:500 fd 485 | add_fd_read_event_handler: new ethX-pe@0x55564d851978 | libevent_malloc: new ptr-libevent@0x55564d8519e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d851a98 size 16 | setup callback for interface eth0 192.1.3.18:4500 fd 484 | add_fd_read_event_handler: new ethX-pe@0x55564d851ad8 | libevent_malloc: new ptr-libevent@0x55564d851b48 size 128 | libevent_malloc: new ptr-libevent@0x55564d851bf8 size 16 | setup callback for interface eth0 192.1.3.18:500 fd 483 | add_fd_read_event_handler: new ethX-pe@0x55564d851c38 | libevent_malloc: new ptr-libevent@0x55564d851ca8 size 128 | libevent_malloc: new ptr-libevent@0x55564d851d58 size 16 | setup callback for interface eth0 192.1.3.19:4500 fd 482 | add_fd_read_event_handler: new ethX-pe@0x55564d851d98 | libevent_malloc: new ptr-libevent@0x55564d851e08 size 128 | libevent_malloc: new ptr-libevent@0x55564d851eb8 size 16 | setup callback for interface eth0 192.1.3.19:500 fd 481 | add_fd_read_event_handler: new ethX-pe@0x55564d851ef8 | libevent_malloc: new ptr-libevent@0x55564d851f68 size 128 | libevent_malloc: new ptr-libevent@0x55564d852018 size 16 | setup callback for interface eth0 192.1.3.20:4500 fd 480 | add_fd_read_event_handler: new ethX-pe@0x55564d852058 | libevent_malloc: new ptr-libevent@0x55564d8520c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d852178 size 16 | setup callback for interface eth0 192.1.3.20:500 fd 479 | add_fd_read_event_handler: new ethX-pe@0x55564d8521b8 | libevent_malloc: new ptr-libevent@0x55564d852228 size 128 | libevent_malloc: new ptr-libevent@0x55564d8522d8 size 16 | setup callback for interface eth0 192.1.3.21:4500 fd 478 | add_fd_read_event_handler: new ethX-pe@0x55564d852318 | libevent_malloc: new ptr-libevent@0x55564d852388 size 128 | libevent_malloc: new ptr-libevent@0x55564d852438 size 16 | setup callback for interface eth0 192.1.3.21:500 fd 477 | add_fd_read_event_handler: new ethX-pe@0x55564d852478 | libevent_malloc: new ptr-libevent@0x55564d8524e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d852598 size 16 | setup callback for interface eth0 192.1.3.22:4500 fd 476 | add_fd_read_event_handler: new ethX-pe@0x55564d8525d8 | libevent_malloc: new ptr-libevent@0x55564d852648 size 128 | libevent_malloc: new ptr-libevent@0x55564d8526f8 size 16 | setup callback for interface eth0 192.1.3.22:500 fd 475 | add_fd_read_event_handler: new ethX-pe@0x55564d852738 | libevent_malloc: new ptr-libevent@0x55564d8527a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d852858 size 16 | setup callback for interface eth0 192.1.3.23:4500 fd 474 | add_fd_read_event_handler: new ethX-pe@0x55564d852898 | libevent_malloc: new ptr-libevent@0x55564d852908 size 128 | libevent_malloc: new ptr-libevent@0x55564d8529b8 size 16 | setup callback for interface eth0 192.1.3.23:500 fd 473 | add_fd_read_event_handler: new ethX-pe@0x55564d8529f8 | libevent_malloc: new ptr-libevent@0x55564d852a68 size 128 | libevent_malloc: new ptr-libevent@0x55564d852b18 size 16 | setup callback for interface eth0 192.1.3.24:4500 fd 472 | add_fd_read_event_handler: new ethX-pe@0x55564d852b58 | libevent_malloc: new ptr-libevent@0x55564d852bc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d852c78 size 16 | setup callback for interface eth0 192.1.3.24:500 fd 471 | add_fd_read_event_handler: new ethX-pe@0x55564d852cb8 | libevent_malloc: new ptr-libevent@0x55564d852d28 size 128 | libevent_malloc: new ptr-libevent@0x55564d852dd8 size 16 | setup callback for interface eth0 192.1.3.25:4500 fd 470 | add_fd_read_event_handler: new ethX-pe@0x55564d852e18 | libevent_malloc: new ptr-libevent@0x55564d852e88 size 128 | libevent_malloc: new ptr-libevent@0x55564d852f38 size 16 | setup callback for interface eth0 192.1.3.25:500 fd 469 | add_fd_read_event_handler: new ethX-pe@0x55564d852f78 | libevent_malloc: new ptr-libevent@0x55564d852fe8 size 128 | libevent_malloc: new ptr-libevent@0x55564d853098 size 16 | setup callback for interface eth0 192.1.3.26:4500 fd 468 | add_fd_read_event_handler: new ethX-pe@0x55564d8530d8 | libevent_malloc: new ptr-libevent@0x55564d853148 size 128 | libevent_malloc: new ptr-libevent@0x55564d8531f8 size 16 | setup callback for interface eth0 192.1.3.26:500 fd 467 | add_fd_read_event_handler: new ethX-pe@0x55564d853238 | libevent_malloc: new ptr-libevent@0x55564d8532a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d853358 size 16 | setup callback for interface eth0 192.1.3.27:4500 fd 466 | add_fd_read_event_handler: new ethX-pe@0x55564d853398 | libevent_malloc: new ptr-libevent@0x55564d853408 size 128 | libevent_malloc: new ptr-libevent@0x55564d8534b8 size 16 | setup callback for interface eth0 192.1.3.27:500 fd 465 | add_fd_read_event_handler: new ethX-pe@0x55564d8534f8 | libevent_malloc: new ptr-libevent@0x55564d853568 size 128 | libevent_malloc: new ptr-libevent@0x55564d853618 size 16 | setup callback for interface eth0 192.1.3.28:4500 fd 464 | add_fd_read_event_handler: new ethX-pe@0x55564d853658 | libevent_malloc: new ptr-libevent@0x55564d8536c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d853778 size 16 | setup callback for interface eth0 192.1.3.28:500 fd 463 | add_fd_read_event_handler: new ethX-pe@0x55564d8537b8 | libevent_malloc: new ptr-libevent@0x55564d853828 size 128 | libevent_malloc: new ptr-libevent@0x55564d8538d8 size 16 | setup callback for interface eth0 192.1.3.29:4500 fd 462 | add_fd_read_event_handler: new ethX-pe@0x55564d853918 | libevent_malloc: new ptr-libevent@0x55564d853988 size 128 | libevent_malloc: new ptr-libevent@0x55564d853a38 size 16 | setup callback for interface eth0 192.1.3.29:500 fd 461 | add_fd_read_event_handler: new ethX-pe@0x55564d853a78 | libevent_malloc: new ptr-libevent@0x55564d853ae8 size 128 | libevent_malloc: new ptr-libevent@0x55564d853b98 size 16 | setup callback for interface eth0 192.1.3.30:4500 fd 460 | add_fd_read_event_handler: new ethX-pe@0x55564d853bd8 | libevent_malloc: new ptr-libevent@0x55564d853c48 size 128 | libevent_malloc: new ptr-libevent@0x55564d853cf8 size 16 | setup callback for interface eth0 192.1.3.30:500 fd 459 | add_fd_read_event_handler: new ethX-pe@0x55564d853d38 | libevent_malloc: new ptr-libevent@0x55564d853da8 size 128 | libevent_malloc: new ptr-libevent@0x55564d853e58 size 16 | setup callback for interface eth0 192.1.3.31:4500 fd 458 | add_fd_read_event_handler: new ethX-pe@0x55564d853e98 | libevent_malloc: new ptr-libevent@0x55564d853f08 size 128 | libevent_malloc: new ptr-libevent@0x55564d853fb8 size 16 | setup callback for interface eth0 192.1.3.31:500 fd 457 | add_fd_read_event_handler: new ethX-pe@0x55564d853ff8 | libevent_malloc: new ptr-libevent@0x55564d854068 size 128 | libevent_malloc: new ptr-libevent@0x55564d854118 size 16 | setup callback for interface eth0 192.1.3.32:4500 fd 456 | add_fd_read_event_handler: new ethX-pe@0x55564d854158 | libevent_malloc: new ptr-libevent@0x55564d8541c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d854278 size 16 | setup callback for interface eth0 192.1.3.32:500 fd 455 | add_fd_read_event_handler: new ethX-pe@0x55564d8542b8 | libevent_malloc: new ptr-libevent@0x55564d854328 size 128 | libevent_malloc: new ptr-libevent@0x55564d8543d8 size 16 | setup callback for interface eth0 192.1.3.33:4500 fd 454 | add_fd_read_event_handler: new ethX-pe@0x55564d854418 | libevent_malloc: new ptr-libevent@0x55564d86d8c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86d978 size 16 | setup callback for interface eth0 192.1.3.33:500 fd 453 | add_fd_read_event_handler: new ethX-pe@0x55564d86d9b8 | libevent_malloc: new ptr-libevent@0x55564d86da28 size 128 | libevent_malloc: new ptr-libevent@0x55564d86dad8 size 16 | setup callback for interface eth0 192.1.3.34:4500 fd 452 | add_fd_read_event_handler: new ethX-pe@0x55564d86db18 | libevent_malloc: new ptr-libevent@0x55564d86db88 size 128 | libevent_malloc: new ptr-libevent@0x55564d86dc38 size 16 | setup callback for interface eth0 192.1.3.34:500 fd 451 | add_fd_read_event_handler: new ethX-pe@0x55564d86dc78 | libevent_malloc: new ptr-libevent@0x55564d86dce8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86dd98 size 16 | setup callback for interface eth0 192.1.3.35:4500 fd 450 | add_fd_read_event_handler: new ethX-pe@0x55564d86ddd8 | libevent_malloc: new ptr-libevent@0x55564d86de48 size 128 | libevent_malloc: new ptr-libevent@0x55564d86def8 size 16 | setup callback for interface eth0 192.1.3.35:500 fd 449 | add_fd_read_event_handler: new ethX-pe@0x55564d86df38 | libevent_malloc: new ptr-libevent@0x55564d86dfa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e058 size 16 | setup callback for interface eth0 192.1.3.36:4500 fd 448 | add_fd_read_event_handler: new ethX-pe@0x55564d86e098 | libevent_malloc: new ptr-libevent@0x55564d86e108 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e1b8 size 16 | setup callback for interface eth0 192.1.3.36:500 fd 447 | add_fd_read_event_handler: new ethX-pe@0x55564d86e1f8 | libevent_malloc: new ptr-libevent@0x55564d86e268 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e318 size 16 | setup callback for interface eth0 192.1.3.37:4500 fd 446 | add_fd_read_event_handler: new ethX-pe@0x55564d86e358 | libevent_malloc: new ptr-libevent@0x55564d86e3c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e478 size 16 | setup callback for interface eth0 192.1.3.37:500 fd 445 | add_fd_read_event_handler: new ethX-pe@0x55564d86e4b8 | libevent_malloc: new ptr-libevent@0x55564d86e528 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e5d8 size 16 | setup callback for interface eth0 192.1.3.38:4500 fd 444 | add_fd_read_event_handler: new ethX-pe@0x55564d86e618 | libevent_malloc: new ptr-libevent@0x55564d86e688 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e738 size 16 | setup callback for interface eth0 192.1.3.38:500 fd 443 | add_fd_read_event_handler: new ethX-pe@0x55564d86e778 | libevent_malloc: new ptr-libevent@0x55564d86e7e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e898 size 16 | setup callback for interface eth0 192.1.3.39:4500 fd 442 | add_fd_read_event_handler: new ethX-pe@0x55564d86e8d8 | libevent_malloc: new ptr-libevent@0x55564d86e948 size 128 | libevent_malloc: new ptr-libevent@0x55564d86e9f8 size 16 | setup callback for interface eth0 192.1.3.39:500 fd 441 | add_fd_read_event_handler: new ethX-pe@0x55564d86ea38 | libevent_malloc: new ptr-libevent@0x55564d86eaa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86eb58 size 16 | setup callback for interface eth0 192.1.3.40:4500 fd 440 | add_fd_read_event_handler: new ethX-pe@0x55564d86eb98 | libevent_malloc: new ptr-libevent@0x55564d86ec08 size 128 | libevent_malloc: new ptr-libevent@0x55564d86ecb8 size 16 | setup callback for interface eth0 192.1.3.40:500 fd 439 | add_fd_read_event_handler: new ethX-pe@0x55564d86ecf8 | libevent_malloc: new ptr-libevent@0x55564d86ed68 size 128 | libevent_malloc: new ptr-libevent@0x55564d86ee18 size 16 | setup callback for interface eth0 192.1.3.41:4500 fd 438 | add_fd_read_event_handler: new ethX-pe@0x55564d86ee58 | libevent_malloc: new ptr-libevent@0x55564d86eec8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86ef78 size 16 | setup callback for interface eth0 192.1.3.41:500 fd 437 | add_fd_read_event_handler: new ethX-pe@0x55564d86efb8 | libevent_malloc: new ptr-libevent@0x55564d86f028 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f0d8 size 16 | setup callback for interface eth0 192.1.3.42:4500 fd 436 | add_fd_read_event_handler: new ethX-pe@0x55564d86f118 | libevent_malloc: new ptr-libevent@0x55564d86f188 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f238 size 16 | setup callback for interface eth0 192.1.3.42:500 fd 435 | add_fd_read_event_handler: new ethX-pe@0x55564d86f278 | libevent_malloc: new ptr-libevent@0x55564d86f2e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f398 size 16 | setup callback for interface eth0 192.1.3.43:4500 fd 434 | add_fd_read_event_handler: new ethX-pe@0x55564d86f3d8 | libevent_malloc: new ptr-libevent@0x55564d86f448 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f4f8 size 16 | setup callback for interface eth0 192.1.3.43:500 fd 433 | add_fd_read_event_handler: new ethX-pe@0x55564d86f538 | libevent_malloc: new ptr-libevent@0x55564d86f5a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f658 size 16 | setup callback for interface eth0 192.1.3.44:4500 fd 432 | add_fd_read_event_handler: new ethX-pe@0x55564d86f698 | libevent_malloc: new ptr-libevent@0x55564d86f708 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f7b8 size 16 | setup callback for interface eth0 192.1.3.44:500 fd 431 | add_fd_read_event_handler: new ethX-pe@0x55564d86f7f8 | libevent_malloc: new ptr-libevent@0x55564d86f868 size 128 | libevent_malloc: new ptr-libevent@0x55564d86f918 size 16 | setup callback for interface eth0 192.1.3.45:4500 fd 430 | add_fd_read_event_handler: new ethX-pe@0x55564d86f958 | libevent_malloc: new ptr-libevent@0x55564d86f9c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86fa78 size 16 | setup callback for interface eth0 192.1.3.45:500 fd 429 | add_fd_read_event_handler: new ethX-pe@0x55564d86fab8 | libevent_malloc: new ptr-libevent@0x55564d86fb28 size 128 | libevent_malloc: new ptr-libevent@0x55564d86fbd8 size 16 | setup callback for interface eth0 192.1.3.46:4500 fd 428 | add_fd_read_event_handler: new ethX-pe@0x55564d86fc18 | libevent_malloc: new ptr-libevent@0x55564d86fc88 size 128 | libevent_malloc: new ptr-libevent@0x55564d86fd38 size 16 | setup callback for interface eth0 192.1.3.46:500 fd 427 | add_fd_read_event_handler: new ethX-pe@0x55564d86fd78 | libevent_malloc: new ptr-libevent@0x55564d86fde8 size 128 | libevent_malloc: new ptr-libevent@0x55564d86fe98 size 16 | setup callback for interface eth0 192.1.3.47:4500 fd 426 | add_fd_read_event_handler: new ethX-pe@0x55564d86fed8 | libevent_malloc: new ptr-libevent@0x55564d86ff48 size 128 | libevent_malloc: new ptr-libevent@0x55564d86fff8 size 16 | setup callback for interface eth0 192.1.3.47:500 fd 425 | add_fd_read_event_handler: new ethX-pe@0x55564d870038 | libevent_malloc: new ptr-libevent@0x55564d8700a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d870158 size 16 | setup callback for interface eth0 192.1.3.48:4500 fd 424 | add_fd_read_event_handler: new ethX-pe@0x55564d870198 | libevent_malloc: new ptr-libevent@0x55564d870208 size 128 | libevent_malloc: new ptr-libevent@0x55564d8702b8 size 16 | setup callback for interface eth0 192.1.3.48:500 fd 423 | add_fd_read_event_handler: new ethX-pe@0x55564d8702f8 | libevent_malloc: new ptr-libevent@0x55564d870368 size 128 | libevent_malloc: new ptr-libevent@0x55564d870418 size 16 | setup callback for interface eth0 192.1.3.49:4500 fd 422 | add_fd_read_event_handler: new ethX-pe@0x55564d870458 | libevent_malloc: new ptr-libevent@0x55564d8704c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d870578 size 16 | setup callback for interface eth0 192.1.3.49:500 fd 421 | add_fd_read_event_handler: new ethX-pe@0x55564d8705b8 | libevent_malloc: new ptr-libevent@0x55564d870628 size 128 | libevent_malloc: new ptr-libevent@0x55564d8706d8 size 16 | setup callback for interface eth0 192.1.3.50:4500 fd 420 | add_fd_read_event_handler: new ethX-pe@0x55564d870718 | libevent_malloc: new ptr-libevent@0x55564d870788 size 128 | libevent_malloc: new ptr-libevent@0x55564d870838 size 16 | setup callback for interface eth0 192.1.3.50:500 fd 419 | add_fd_read_event_handler: new ethX-pe@0x55564d870878 | libevent_malloc: new ptr-libevent@0x55564d8708e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d870998 size 16 | setup callback for interface eth0 192.1.3.51:4500 fd 418 | add_fd_read_event_handler: new ethX-pe@0x55564d8709d8 | libevent_malloc: new ptr-libevent@0x55564d870a48 size 128 | libevent_malloc: new ptr-libevent@0x55564d870af8 size 16 | setup callback for interface eth0 192.1.3.51:500 fd 417 | add_fd_read_event_handler: new ethX-pe@0x55564d870b38 | libevent_malloc: new ptr-libevent@0x55564d870ba8 size 128 | libevent_malloc: new ptr-libevent@0x55564d870c58 size 16 | setup callback for interface eth0 192.1.3.52:4500 fd 416 | add_fd_read_event_handler: new ethX-pe@0x55564d870c98 | libevent_malloc: new ptr-libevent@0x55564d870d08 size 128 | libevent_malloc: new ptr-libevent@0x55564d870db8 size 16 | setup callback for interface eth0 192.1.3.52:500 fd 415 | add_fd_read_event_handler: new ethX-pe@0x55564d870df8 | libevent_malloc: new ptr-libevent@0x55564d870e68 size 128 | libevent_malloc: new ptr-libevent@0x55564d870f18 size 16 | setup callback for interface eth0 192.1.3.53:4500 fd 414 | add_fd_read_event_handler: new ethX-pe@0x55564d870f58 | libevent_malloc: new ptr-libevent@0x55564d870fc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d871078 size 16 | setup callback for interface eth0 192.1.3.53:500 fd 413 | add_fd_read_event_handler: new ethX-pe@0x55564d8710b8 | libevent_malloc: new ptr-libevent@0x55564d871128 size 128 | libevent_malloc: new ptr-libevent@0x55564d8711d8 size 16 | setup callback for interface eth0 192.1.3.54:4500 fd 412 | add_fd_read_event_handler: new ethX-pe@0x55564d871218 | libevent_malloc: new ptr-libevent@0x55564d871288 size 128 | libevent_malloc: new ptr-libevent@0x55564d871338 size 16 | setup callback for interface eth0 192.1.3.54:500 fd 411 | add_fd_read_event_handler: new ethX-pe@0x55564d871378 | libevent_malloc: new ptr-libevent@0x55564d8713e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d871498 size 16 | setup callback for interface eth0 192.1.3.55:4500 fd 410 | add_fd_read_event_handler: new ethX-pe@0x55564d8714d8 | libevent_malloc: new ptr-libevent@0x55564d871548 size 128 | libevent_malloc: new ptr-libevent@0x55564d8715f8 size 16 | setup callback for interface eth0 192.1.3.55:500 fd 409 | add_fd_read_event_handler: new ethX-pe@0x55564d871638 | libevent_malloc: new ptr-libevent@0x55564d8716a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d871758 size 16 | setup callback for interface eth0 192.1.3.56:4500 fd 408 | add_fd_read_event_handler: new ethX-pe@0x55564d871798 | libevent_malloc: new ptr-libevent@0x55564d871808 size 128 | libevent_malloc: new ptr-libevent@0x55564d8718b8 size 16 | setup callback for interface eth0 192.1.3.56:500 fd 407 | add_fd_read_event_handler: new ethX-pe@0x55564d8718f8 | libevent_malloc: new ptr-libevent@0x55564d871968 size 128 | libevent_malloc: new ptr-libevent@0x55564d871a18 size 16 | setup callback for interface eth0 192.1.3.57:4500 fd 406 | add_fd_read_event_handler: new ethX-pe@0x55564d871a58 | libevent_malloc: new ptr-libevent@0x55564d871ac8 size 128 | libevent_malloc: new ptr-libevent@0x55564d871b78 size 16 | setup callback for interface eth0 192.1.3.57:500 fd 405 | add_fd_read_event_handler: new ethX-pe@0x55564d871bb8 | libevent_malloc: new ptr-libevent@0x55564d871c28 size 128 | libevent_malloc: new ptr-libevent@0x55564d871cd8 size 16 | setup callback for interface eth0 192.1.3.58:4500 fd 404 | add_fd_read_event_handler: new ethX-pe@0x55564d871d18 | libevent_malloc: new ptr-libevent@0x55564d871d88 size 128 | libevent_malloc: new ptr-libevent@0x55564d871e38 size 16 | setup callback for interface eth0 192.1.3.58:500 fd 403 | add_fd_read_event_handler: new ethX-pe@0x55564d871e78 | libevent_malloc: new ptr-libevent@0x55564d871ee8 size 128 | libevent_malloc: new ptr-libevent@0x55564d871f98 size 16 | setup callback for interface eth0 192.1.3.59:4500 fd 402 | add_fd_read_event_handler: new ethX-pe@0x55564d871fd8 | libevent_malloc: new ptr-libevent@0x55564d872048 size 128 | libevent_malloc: new ptr-libevent@0x55564d8720f8 size 16 | setup callback for interface eth0 192.1.3.59:500 fd 401 | add_fd_read_event_handler: new ethX-pe@0x55564d872138 | libevent_malloc: new ptr-libevent@0x55564d8721a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d872258 size 16 | setup callback for interface eth0 192.1.3.60:4500 fd 400 | add_fd_read_event_handler: new ethX-pe@0x55564d872298 | libevent_malloc: new ptr-libevent@0x55564d872308 size 128 | libevent_malloc: new ptr-libevent@0x55564d8723b8 size 16 | setup callback for interface eth0 192.1.3.60:500 fd 399 | add_fd_read_event_handler: new ethX-pe@0x55564d8723f8 | libevent_malloc: new ptr-libevent@0x55564d872468 size 128 | libevent_malloc: new ptr-libevent@0x55564d872518 size 16 | setup callback for interface eth0 192.1.3.61:4500 fd 398 | add_fd_read_event_handler: new ethX-pe@0x55564d872558 | libevent_malloc: new ptr-libevent@0x55564d8725c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d872678 size 16 | setup callback for interface eth0 192.1.3.61:500 fd 397 | add_fd_read_event_handler: new ethX-pe@0x55564d8726b8 | libevent_malloc: new ptr-libevent@0x55564d872728 size 128 | libevent_malloc: new ptr-libevent@0x55564d8727d8 size 16 | setup callback for interface eth0 192.1.3.62:4500 fd 396 | add_fd_read_event_handler: new ethX-pe@0x55564d872818 | libevent_malloc: new ptr-libevent@0x55564d872888 size 128 | libevent_malloc: new ptr-libevent@0x55564d872938 size 16 | setup callback for interface eth0 192.1.3.62:500 fd 395 | add_fd_read_event_handler: new ethX-pe@0x55564d872978 | libevent_malloc: new ptr-libevent@0x55564d8729e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d872a98 size 16 | setup callback for interface eth0 192.1.3.63:4500 fd 394 | add_fd_read_event_handler: new ethX-pe@0x55564d872ad8 | libevent_malloc: new ptr-libevent@0x55564d872b48 size 128 | libevent_malloc: new ptr-libevent@0x55564d872bf8 size 16 | setup callback for interface eth0 192.1.3.63:500 fd 393 | add_fd_read_event_handler: new ethX-pe@0x55564d872c38 | libevent_malloc: new ptr-libevent@0x55564d872ca8 size 128 | libevent_malloc: new ptr-libevent@0x55564d872d58 size 16 | setup callback for interface eth0 192.1.3.64:4500 fd 392 | add_fd_read_event_handler: new ethX-pe@0x55564d872d98 | libevent_malloc: new ptr-libevent@0x55564d872e08 size 128 | libevent_malloc: new ptr-libevent@0x55564d872eb8 size 16 | setup callback for interface eth0 192.1.3.64:500 fd 391 | add_fd_read_event_handler: new ethX-pe@0x55564d872ef8 | libevent_malloc: new ptr-libevent@0x55564d872f68 size 128 | libevent_malloc: new ptr-libevent@0x55564d873018 size 16 | setup callback for interface eth0 192.1.3.65:4500 fd 390 | add_fd_read_event_handler: new ethX-pe@0x55564d873058 | libevent_malloc: new ptr-libevent@0x55564d8730c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d873178 size 16 | setup callback for interface eth0 192.1.3.65:500 fd 389 | add_fd_read_event_handler: new ethX-pe@0x55564d8731b8 | libevent_malloc: new ptr-libevent@0x55564d873228 size 128 | libevent_malloc: new ptr-libevent@0x55564d8732d8 size 16 | setup callback for interface eth0 192.1.3.66:4500 fd 388 | add_fd_read_event_handler: new ethX-pe@0x55564d873318 | libevent_malloc: new ptr-libevent@0x55564d873388 size 128 | libevent_malloc: new ptr-libevent@0x55564d873438 size 16 | setup callback for interface eth0 192.1.3.66:500 fd 387 | add_fd_read_event_handler: new ethX-pe@0x55564d873478 | libevent_malloc: new ptr-libevent@0x55564d8734e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d873598 size 16 | setup callback for interface eth0 192.1.3.67:4500 fd 386 | add_fd_read_event_handler: new ethX-pe@0x55564d8735d8 | libevent_malloc: new ptr-libevent@0x55564d873648 size 128 | libevent_malloc: new ptr-libevent@0x55564d8736f8 size 16 | setup callback for interface eth0 192.1.3.67:500 fd 385 | add_fd_read_event_handler: new ethX-pe@0x55564d873738 | libevent_malloc: new ptr-libevent@0x55564d8737a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d873858 size 16 | setup callback for interface eth0 192.1.3.68:4500 fd 384 | add_fd_read_event_handler: new ethX-pe@0x55564d873898 | libevent_malloc: new ptr-libevent@0x55564d873908 size 128 | libevent_malloc: new ptr-libevent@0x55564d8739b8 size 16 | setup callback for interface eth0 192.1.3.68:500 fd 383 | add_fd_read_event_handler: new ethX-pe@0x55564d8739f8 | libevent_malloc: new ptr-libevent@0x55564d873a68 size 128 | libevent_malloc: new ptr-libevent@0x55564d873b18 size 16 | setup callback for interface eth0 192.1.3.69:4500 fd 382 | add_fd_read_event_handler: new ethX-pe@0x55564d873b58 | libevent_malloc: new ptr-libevent@0x55564d873bc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d873c78 size 16 | setup callback for interface eth0 192.1.3.69:500 fd 381 | add_fd_read_event_handler: new ethX-pe@0x55564d873cb8 | libevent_malloc: new ptr-libevent@0x55564d873d28 size 128 | libevent_malloc: new ptr-libevent@0x55564d873dd8 size 16 | setup callback for interface eth0 192.1.3.70:4500 fd 380 | add_fd_read_event_handler: new ethX-pe@0x55564d873e18 | libevent_malloc: new ptr-libevent@0x55564d873e88 size 128 | libevent_malloc: new ptr-libevent@0x55564d873f38 size 16 | setup callback for interface eth0 192.1.3.70:500 fd 379 | add_fd_read_event_handler: new ethX-pe@0x55564d873f78 | libevent_malloc: new ptr-libevent@0x55564d873fe8 size 128 | libevent_malloc: new ptr-libevent@0x55564d874098 size 16 | setup callback for interface eth0 192.1.3.71:4500 fd 378 | add_fd_read_event_handler: new ethX-pe@0x55564d8740d8 | libevent_malloc: new ptr-libevent@0x55564d874148 size 128 | libevent_malloc: new ptr-libevent@0x55564d8741f8 size 16 | setup callback for interface eth0 192.1.3.71:500 fd 377 | add_fd_read_event_handler: new ethX-pe@0x55564d874238 | libevent_malloc: new ptr-libevent@0x55564d8742a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d874358 size 16 | setup callback for interface eth0 192.1.3.72:4500 fd 376 | add_fd_read_event_handler: new ethX-pe@0x55564d874398 | libevent_malloc: new ptr-libevent@0x55564d874408 size 128 | libevent_malloc: new ptr-libevent@0x55564d8744b8 size 16 | setup callback for interface eth0 192.1.3.72:500 fd 375 | add_fd_read_event_handler: new ethX-pe@0x55564d8744f8 | libevent_malloc: new ptr-libevent@0x55564d874568 size 128 | libevent_malloc: new ptr-libevent@0x55564d874618 size 16 | setup callback for interface eth0 192.1.3.73:4500 fd 374 | add_fd_read_event_handler: new ethX-pe@0x55564d874658 | libevent_malloc: new ptr-libevent@0x55564d8746c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d874778 size 16 | setup callback for interface eth0 192.1.3.73:500 fd 373 | add_fd_read_event_handler: new ethX-pe@0x55564d8747b8 | libevent_malloc: new ptr-libevent@0x55564d874828 size 128 | libevent_malloc: new ptr-libevent@0x55564d8748d8 size 16 | setup callback for interface eth0 192.1.3.74:4500 fd 372 | add_fd_read_event_handler: new ethX-pe@0x55564d874918 | libevent_malloc: new ptr-libevent@0x55564d874988 size 128 | libevent_malloc: new ptr-libevent@0x55564d874a38 size 16 | setup callback for interface eth0 192.1.3.74:500 fd 371 | add_fd_read_event_handler: new ethX-pe@0x55564d874a78 | libevent_malloc: new ptr-libevent@0x55564d874ae8 size 128 | libevent_malloc: new ptr-libevent@0x55564d874b98 size 16 | setup callback for interface eth0 192.1.3.75:4500 fd 370 | add_fd_read_event_handler: new ethX-pe@0x55564d874bd8 | libevent_malloc: new ptr-libevent@0x55564d874c48 size 128 | libevent_malloc: new ptr-libevent@0x55564d874cf8 size 16 | setup callback for interface eth0 192.1.3.75:500 fd 369 | add_fd_read_event_handler: new ethX-pe@0x55564d874d38 | libevent_malloc: new ptr-libevent@0x55564d874da8 size 128 | libevent_malloc: new ptr-libevent@0x55564d874e58 size 16 | setup callback for interface eth0 192.1.3.76:4500 fd 368 | add_fd_read_event_handler: new ethX-pe@0x55564d874e98 | libevent_malloc: new ptr-libevent@0x55564d874f08 size 128 | libevent_malloc: new ptr-libevent@0x55564d874fb8 size 16 | setup callback for interface eth0 192.1.3.76:500 fd 367 | add_fd_read_event_handler: new ethX-pe@0x55564d874ff8 | libevent_malloc: new ptr-libevent@0x55564d875068 size 128 | libevent_malloc: new ptr-libevent@0x55564d875118 size 16 | setup callback for interface eth0 192.1.3.77:4500 fd 366 | add_fd_read_event_handler: new ethX-pe@0x55564d875158 | libevent_malloc: new ptr-libevent@0x55564d8751c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d875278 size 16 | setup callback for interface eth0 192.1.3.77:500 fd 365 | add_fd_read_event_handler: new ethX-pe@0x55564d8752b8 | libevent_malloc: new ptr-libevent@0x55564d875328 size 128 | libevent_malloc: new ptr-libevent@0x55564d8753d8 size 16 | setup callback for interface eth0 192.1.3.78:4500 fd 364 | add_fd_read_event_handler: new ethX-pe@0x55564d875418 | libevent_malloc: new ptr-libevent@0x55564d875488 size 128 | libevent_malloc: new ptr-libevent@0x55564d875538 size 16 | setup callback for interface eth0 192.1.3.78:500 fd 363 | add_fd_read_event_handler: new ethX-pe@0x55564d875578 | libevent_malloc: new ptr-libevent@0x55564d8755e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d875698 size 16 | setup callback for interface eth0 192.1.3.79:4500 fd 362 | add_fd_read_event_handler: new ethX-pe@0x55564d8756d8 | libevent_malloc: new ptr-libevent@0x55564d875748 size 128 | libevent_malloc: new ptr-libevent@0x55564d8757f8 size 16 | setup callback for interface eth0 192.1.3.79:500 fd 361 | add_fd_read_event_handler: new ethX-pe@0x55564d875838 | libevent_malloc: new ptr-libevent@0x55564d8758a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d875958 size 16 | setup callback for interface eth0 192.1.3.80:4500 fd 360 | add_fd_read_event_handler: new ethX-pe@0x55564d875998 | libevent_malloc: new ptr-libevent@0x55564d875a08 size 128 | libevent_malloc: new ptr-libevent@0x55564d875ab8 size 16 | setup callback for interface eth0 192.1.3.80:500 fd 359 | add_fd_read_event_handler: new ethX-pe@0x55564d875af8 | libevent_malloc: new ptr-libevent@0x55564d875b68 size 128 | libevent_malloc: new ptr-libevent@0x55564d875c18 size 16 | setup callback for interface eth0 192.1.3.81:4500 fd 358 | add_fd_read_event_handler: new ethX-pe@0x55564d875c58 | libevent_malloc: new ptr-libevent@0x55564d875cc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d875d78 size 16 | setup callback for interface eth0 192.1.3.81:500 fd 357 | add_fd_read_event_handler: new ethX-pe@0x55564d875db8 | libevent_malloc: new ptr-libevent@0x55564d875e28 size 128 | libevent_malloc: new ptr-libevent@0x55564d875ed8 size 16 | setup callback for interface eth0 192.1.3.82:4500 fd 356 | add_fd_read_event_handler: new ethX-pe@0x55564d875f18 | libevent_malloc: new ptr-libevent@0x55564d875f88 size 128 | libevent_malloc: new ptr-libevent@0x55564d876038 size 16 | setup callback for interface eth0 192.1.3.82:500 fd 355 | add_fd_read_event_handler: new ethX-pe@0x55564d876078 | libevent_malloc: new ptr-libevent@0x55564d8760e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d876198 size 16 | setup callback for interface eth0 192.1.3.83:4500 fd 354 | add_fd_read_event_handler: new ethX-pe@0x55564d8761d8 | libevent_malloc: new ptr-libevent@0x55564d876248 size 128 | libevent_malloc: new ptr-libevent@0x55564d8762f8 size 16 | setup callback for interface eth0 192.1.3.83:500 fd 353 | add_fd_read_event_handler: new ethX-pe@0x55564d876338 | libevent_malloc: new ptr-libevent@0x55564d8763a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d876458 size 16 | setup callback for interface eth0 192.1.3.84:4500 fd 352 | add_fd_read_event_handler: new ethX-pe@0x55564d876498 | libevent_malloc: new ptr-libevent@0x55564d876508 size 128 | libevent_malloc: new ptr-libevent@0x55564d8765b8 size 16 | setup callback for interface eth0 192.1.3.84:500 fd 351 | add_fd_read_event_handler: new ethX-pe@0x55564d8765f8 | libevent_malloc: new ptr-libevent@0x55564d876668 size 128 | libevent_malloc: new ptr-libevent@0x55564d876718 size 16 | setup callback for interface eth0 192.1.3.85:4500 fd 350 | add_fd_read_event_handler: new ethX-pe@0x55564d876758 | libevent_malloc: new ptr-libevent@0x55564d8767c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d876878 size 16 | setup callback for interface eth0 192.1.3.85:500 fd 349 | add_fd_read_event_handler: new ethX-pe@0x55564d8768b8 | libevent_malloc: new ptr-libevent@0x55564d876928 size 128 | libevent_malloc: new ptr-libevent@0x55564d8769d8 size 16 | setup callback for interface eth0 192.1.3.86:4500 fd 348 | add_fd_read_event_handler: new ethX-pe@0x55564d876a18 | libevent_malloc: new ptr-libevent@0x55564d876a88 size 128 | libevent_malloc: new ptr-libevent@0x55564d876b38 size 16 | setup callback for interface eth0 192.1.3.86:500 fd 347 | add_fd_read_event_handler: new ethX-pe@0x55564d876b78 | libevent_malloc: new ptr-libevent@0x55564d876be8 size 128 | libevent_malloc: new ptr-libevent@0x55564d876c98 size 16 | setup callback for interface eth0 192.1.3.87:4500 fd 346 | add_fd_read_event_handler: new ethX-pe@0x55564d876cd8 | libevent_malloc: new ptr-libevent@0x55564d876d48 size 128 | libevent_malloc: new ptr-libevent@0x55564d876df8 size 16 | setup callback for interface eth0 192.1.3.87:500 fd 345 | add_fd_read_event_handler: new ethX-pe@0x55564d876e38 | libevent_malloc: new ptr-libevent@0x55564d876ea8 size 128 | libevent_malloc: new ptr-libevent@0x55564d876f58 size 16 | setup callback for interface eth0 192.1.3.88:4500 fd 344 | add_fd_read_event_handler: new ethX-pe@0x55564d876f98 | libevent_malloc: new ptr-libevent@0x55564d877008 size 128 | libevent_malloc: new ptr-libevent@0x55564d8770b8 size 16 | setup callback for interface eth0 192.1.3.88:500 fd 343 | add_fd_read_event_handler: new ethX-pe@0x55564d8770f8 | libevent_malloc: new ptr-libevent@0x55564d877168 size 128 | libevent_malloc: new ptr-libevent@0x55564d877218 size 16 | setup callback for interface eth0 192.1.3.89:4500 fd 342 | add_fd_read_event_handler: new ethX-pe@0x55564d877258 | libevent_malloc: new ptr-libevent@0x55564d8772c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d877378 size 16 | setup callback for interface eth0 192.1.3.89:500 fd 341 | add_fd_read_event_handler: new ethX-pe@0x55564d8773b8 | libevent_malloc: new ptr-libevent@0x55564d877428 size 128 | libevent_malloc: new ptr-libevent@0x55564d8774d8 size 16 | setup callback for interface eth0 192.1.3.90:4500 fd 340 | add_fd_read_event_handler: new ethX-pe@0x55564d877518 | libevent_malloc: new ptr-libevent@0x55564d877588 size 128 | libevent_malloc: new ptr-libevent@0x55564d877638 size 16 | setup callback for interface eth0 192.1.3.90:500 fd 339 | add_fd_read_event_handler: new ethX-pe@0x55564d877678 | libevent_malloc: new ptr-libevent@0x55564d8776e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d877798 size 16 | setup callback for interface eth0 192.1.3.91:4500 fd 338 | add_fd_read_event_handler: new ethX-pe@0x55564d8777d8 | libevent_malloc: new ptr-libevent@0x55564d877848 size 128 | libevent_malloc: new ptr-libevent@0x55564d8778f8 size 16 | setup callback for interface eth0 192.1.3.91:500 fd 337 | add_fd_read_event_handler: new ethX-pe@0x55564d877938 | libevent_malloc: new ptr-libevent@0x55564d8779a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d877a58 size 16 | setup callback for interface eth0 192.1.3.92:4500 fd 336 | add_fd_read_event_handler: new ethX-pe@0x55564d877a98 | libevent_malloc: new ptr-libevent@0x55564d877b08 size 128 | libevent_malloc: new ptr-libevent@0x55564d877bb8 size 16 | setup callback for interface eth0 192.1.3.92:500 fd 335 | add_fd_read_event_handler: new ethX-pe@0x55564d877bf8 | libevent_malloc: new ptr-libevent@0x55564d877c68 size 128 | libevent_malloc: new ptr-libevent@0x55564d877d18 size 16 | setup callback for interface eth0 192.1.3.93:4500 fd 334 | add_fd_read_event_handler: new ethX-pe@0x55564d877d58 | libevent_malloc: new ptr-libevent@0x55564d877dc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d877e78 size 16 | setup callback for interface eth0 192.1.3.93:500 fd 333 | add_fd_read_event_handler: new ethX-pe@0x55564d877eb8 | libevent_malloc: new ptr-libevent@0x55564d877f28 size 128 | libevent_malloc: new ptr-libevent@0x55564d877fd8 size 16 | setup callback for interface eth0 192.1.3.94:4500 fd 332 | add_fd_read_event_handler: new ethX-pe@0x55564d878018 | libevent_malloc: new ptr-libevent@0x55564d878088 size 128 | libevent_malloc: new ptr-libevent@0x55564d878138 size 16 | setup callback for interface eth0 192.1.3.94:500 fd 331 | add_fd_read_event_handler: new ethX-pe@0x55564d878178 | libevent_malloc: new ptr-libevent@0x55564d8781e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d878298 size 16 | setup callback for interface eth0 192.1.3.95:4500 fd 330 | add_fd_read_event_handler: new ethX-pe@0x55564d8782d8 | libevent_malloc: new ptr-libevent@0x55564d878348 size 128 | libevent_malloc: new ptr-libevent@0x55564d8783f8 size 16 | setup callback for interface eth0 192.1.3.95:500 fd 329 | add_fd_read_event_handler: new ethX-pe@0x55564d878438 | libevent_malloc: new ptr-libevent@0x55564d8784a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d878558 size 16 | setup callback for interface eth0 192.1.3.96:4500 fd 328 | add_fd_read_event_handler: new ethX-pe@0x55564d878598 | libevent_malloc: new ptr-libevent@0x55564d878608 size 128 | libevent_malloc: new ptr-libevent@0x55564d8786b8 size 16 | setup callback for interface eth0 192.1.3.96:500 fd 327 | add_fd_read_event_handler: new ethX-pe@0x55564d8786f8 | libevent_malloc: new ptr-libevent@0x55564d878768 size 128 | libevent_malloc: new ptr-libevent@0x55564d878818 size 16 | setup callback for interface eth0 192.1.3.97:4500 fd 326 | add_fd_read_event_handler: new ethX-pe@0x55564d878858 | libevent_malloc: new ptr-libevent@0x55564d8788c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d878978 size 16 | setup callback for interface eth0 192.1.3.97:500 fd 325 | add_fd_read_event_handler: new ethX-pe@0x55564d8789b8 | libevent_malloc: new ptr-libevent@0x55564d878a28 size 128 | libevent_malloc: new ptr-libevent@0x55564d878ad8 size 16 | setup callback for interface eth0 192.1.3.98:4500 fd 324 | add_fd_read_event_handler: new ethX-pe@0x55564d878b18 | libevent_malloc: new ptr-libevent@0x55564d878b88 size 128 | libevent_malloc: new ptr-libevent@0x55564d878c38 size 16 | setup callback for interface eth0 192.1.3.98:500 fd 323 | add_fd_read_event_handler: new ethX-pe@0x55564d878c78 | libevent_malloc: new ptr-libevent@0x55564d878ce8 size 128 | libevent_malloc: new ptr-libevent@0x55564d878d98 size 16 | setup callback for interface eth0 192.1.3.99:4500 fd 322 | add_fd_read_event_handler: new ethX-pe@0x55564d878dd8 | libevent_malloc: new ptr-libevent@0x55564d878e48 size 128 | libevent_malloc: new ptr-libevent@0x55564d878ef8 size 16 | setup callback for interface eth0 192.1.3.99:500 fd 321 | add_fd_read_event_handler: new ethX-pe@0x55564d878f38 | libevent_malloc: new ptr-libevent@0x55564d878fa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d879058 size 16 | setup callback for interface eth0 192.1.3.100:4500 fd 320 | add_fd_read_event_handler: new ethX-pe@0x55564d879098 | libevent_malloc: new ptr-libevent@0x55564d879108 size 128 | libevent_malloc: new ptr-libevent@0x55564d8791b8 size 16 | setup callback for interface eth0 192.1.3.100:500 fd 319 | add_fd_read_event_handler: new ethX-pe@0x55564d8791f8 | libevent_malloc: new ptr-libevent@0x55564d879268 size 128 | libevent_malloc: new ptr-libevent@0x55564d879318 size 16 | setup callback for interface eth0 192.1.3.101:4500 fd 318 | add_fd_read_event_handler: new ethX-pe@0x55564d879358 | libevent_malloc: new ptr-libevent@0x55564d8793c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d879478 size 16 | setup callback for interface eth0 192.1.3.101:500 fd 317 | add_fd_read_event_handler: new ethX-pe@0x55564d8794b8 | libevent_malloc: new ptr-libevent@0x55564d879528 size 128 | libevent_malloc: new ptr-libevent@0x55564d8795d8 size 16 | setup callback for interface eth0 192.1.3.102:4500 fd 316 | add_fd_read_event_handler: new ethX-pe@0x55564d879618 | libevent_malloc: new ptr-libevent@0x55564d879688 size 128 | libevent_malloc: new ptr-libevent@0x55564d879738 size 16 | setup callback for interface eth0 192.1.3.102:500 fd 315 | add_fd_read_event_handler: new ethX-pe@0x55564d879778 | libevent_malloc: new ptr-libevent@0x55564d8797e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d879898 size 16 | setup callback for interface eth0 192.1.3.103:4500 fd 314 | add_fd_read_event_handler: new ethX-pe@0x55564d8798d8 | libevent_malloc: new ptr-libevent@0x55564d879948 size 128 | libevent_malloc: new ptr-libevent@0x55564d8799f8 size 16 | setup callback for interface eth0 192.1.3.103:500 fd 313 | add_fd_read_event_handler: new ethX-pe@0x55564d879a38 | libevent_malloc: new ptr-libevent@0x55564d879aa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d879b58 size 16 | setup callback for interface eth0 192.1.3.104:4500 fd 312 | add_fd_read_event_handler: new ethX-pe@0x55564d879b98 | libevent_malloc: new ptr-libevent@0x55564d879c08 size 128 | libevent_malloc: new ptr-libevent@0x55564d879cb8 size 16 | setup callback for interface eth0 192.1.3.104:500 fd 311 | add_fd_read_event_handler: new ethX-pe@0x55564d879cf8 | libevent_malloc: new ptr-libevent@0x55564d879d68 size 128 | libevent_malloc: new ptr-libevent@0x55564d879e18 size 16 | setup callback for interface eth0 192.1.3.105:4500 fd 310 | add_fd_read_event_handler: new ethX-pe@0x55564d879e58 | libevent_malloc: new ptr-libevent@0x55564d879ec8 size 128 | libevent_malloc: new ptr-libevent@0x55564d879f78 size 16 | setup callback for interface eth0 192.1.3.105:500 fd 309 | add_fd_read_event_handler: new ethX-pe@0x55564d879fb8 | libevent_malloc: new ptr-libevent@0x55564d87a028 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a0d8 size 16 | setup callback for interface eth0 192.1.3.106:4500 fd 308 | add_fd_read_event_handler: new ethX-pe@0x55564d87a118 | libevent_malloc: new ptr-libevent@0x55564d87a188 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a238 size 16 | setup callback for interface eth0 192.1.3.106:500 fd 307 | add_fd_read_event_handler: new ethX-pe@0x55564d87a278 | libevent_malloc: new ptr-libevent@0x55564d87a2e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a398 size 16 | setup callback for interface eth0 192.1.3.107:4500 fd 306 | add_fd_read_event_handler: new ethX-pe@0x55564d87a3d8 | libevent_malloc: new ptr-libevent@0x55564d87a448 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a4f8 size 16 | setup callback for interface eth0 192.1.3.107:500 fd 305 | add_fd_read_event_handler: new ethX-pe@0x55564d87a538 | libevent_malloc: new ptr-libevent@0x55564d87a5a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a658 size 16 | setup callback for interface eth0 192.1.3.108:4500 fd 304 | add_fd_read_event_handler: new ethX-pe@0x55564d87a698 | libevent_malloc: new ptr-libevent@0x55564d87a708 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a7b8 size 16 | setup callback for interface eth0 192.1.3.108:500 fd 303 | add_fd_read_event_handler: new ethX-pe@0x55564d87a7f8 | libevent_malloc: new ptr-libevent@0x55564d87a868 size 128 | libevent_malloc: new ptr-libevent@0x55564d87a918 size 16 | setup callback for interface eth0 192.1.3.109:4500 fd 302 | add_fd_read_event_handler: new ethX-pe@0x55564d87a958 | libevent_malloc: new ptr-libevent@0x55564d87a9c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87aa78 size 16 | setup callback for interface eth0 192.1.3.109:500 fd 301 | add_fd_read_event_handler: new ethX-pe@0x55564d87aab8 | libevent_malloc: new ptr-libevent@0x55564d87ab28 size 128 | libevent_malloc: new ptr-libevent@0x55564d87abd8 size 16 | setup callback for interface eth0 192.1.3.110:4500 fd 300 | add_fd_read_event_handler: new ethX-pe@0x55564d87ac18 | libevent_malloc: new ptr-libevent@0x55564d87ac88 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ad38 size 16 | setup callback for interface eth0 192.1.3.110:500 fd 299 | add_fd_read_event_handler: new ethX-pe@0x55564d87ad78 | libevent_malloc: new ptr-libevent@0x55564d87ade8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ae98 size 16 | setup callback for interface eth0 192.1.3.111:4500 fd 298 | add_fd_read_event_handler: new ethX-pe@0x55564d87aed8 | libevent_malloc: new ptr-libevent@0x55564d87af48 size 128 | libevent_malloc: new ptr-libevent@0x55564d87aff8 size 16 | setup callback for interface eth0 192.1.3.111:500 fd 297 | add_fd_read_event_handler: new ethX-pe@0x55564d87b038 | libevent_malloc: new ptr-libevent@0x55564d87b0a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b158 size 16 | setup callback for interface eth0 192.1.3.112:4500 fd 296 | add_fd_read_event_handler: new ethX-pe@0x55564d87b198 | libevent_malloc: new ptr-libevent@0x55564d87b208 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b2b8 size 16 | setup callback for interface eth0 192.1.3.112:500 fd 295 | add_fd_read_event_handler: new ethX-pe@0x55564d87b2f8 | libevent_malloc: new ptr-libevent@0x55564d87b368 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b418 size 16 | setup callback for interface eth0 192.1.3.113:4500 fd 294 | add_fd_read_event_handler: new ethX-pe@0x55564d87b458 | libevent_malloc: new ptr-libevent@0x55564d87b4c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b578 size 16 | setup callback for interface eth0 192.1.3.113:500 fd 293 | add_fd_read_event_handler: new ethX-pe@0x55564d87b5b8 | libevent_malloc: new ptr-libevent@0x55564d87b628 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b6d8 size 16 | setup callback for interface eth0 192.1.3.114:4500 fd 292 | add_fd_read_event_handler: new ethX-pe@0x55564d87b718 | libevent_malloc: new ptr-libevent@0x55564d87b788 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b838 size 16 | setup callback for interface eth0 192.1.3.114:500 fd 291 | add_fd_read_event_handler: new ethX-pe@0x55564d87b878 | libevent_malloc: new ptr-libevent@0x55564d87b8e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87b998 size 16 | setup callback for interface eth0 192.1.3.115:4500 fd 290 | add_fd_read_event_handler: new ethX-pe@0x55564d87b9d8 | libevent_malloc: new ptr-libevent@0x55564d87ba48 size 128 | libevent_malloc: new ptr-libevent@0x55564d87baf8 size 16 | setup callback for interface eth0 192.1.3.115:500 fd 289 | add_fd_read_event_handler: new ethX-pe@0x55564d87bb38 | libevent_malloc: new ptr-libevent@0x55564d87bba8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87bc58 size 16 | setup callback for interface eth0 192.1.3.116:4500 fd 288 | add_fd_read_event_handler: new ethX-pe@0x55564d87bc98 | libevent_malloc: new ptr-libevent@0x55564d87bd08 size 128 | libevent_malloc: new ptr-libevent@0x55564d87bdb8 size 16 | setup callback for interface eth0 192.1.3.116:500 fd 287 | add_fd_read_event_handler: new ethX-pe@0x55564d87bdf8 | libevent_malloc: new ptr-libevent@0x55564d87be68 size 128 | libevent_malloc: new ptr-libevent@0x55564d87bf18 size 16 | setup callback for interface eth0 192.1.3.117:4500 fd 286 | add_fd_read_event_handler: new ethX-pe@0x55564d87bf58 | libevent_malloc: new ptr-libevent@0x55564d87bfc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c078 size 16 | setup callback for interface eth0 192.1.3.117:500 fd 285 | add_fd_read_event_handler: new ethX-pe@0x55564d87c0b8 | libevent_malloc: new ptr-libevent@0x55564d87c128 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c1d8 size 16 | setup callback for interface eth0 192.1.3.118:4500 fd 284 | add_fd_read_event_handler: new ethX-pe@0x55564d87c218 | libevent_malloc: new ptr-libevent@0x55564d87c288 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c338 size 16 | setup callback for interface eth0 192.1.3.118:500 fd 283 | add_fd_read_event_handler: new ethX-pe@0x55564d87c378 | libevent_malloc: new ptr-libevent@0x55564d87c3e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c498 size 16 | setup callback for interface eth0 192.1.3.119:4500 fd 282 | add_fd_read_event_handler: new ethX-pe@0x55564d87c4d8 | libevent_malloc: new ptr-libevent@0x55564d87c548 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c5f8 size 16 | setup callback for interface eth0 192.1.3.119:500 fd 281 | add_fd_read_event_handler: new ethX-pe@0x55564d87c638 | libevent_malloc: new ptr-libevent@0x55564d87c6a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c758 size 16 | setup callback for interface eth0 192.1.3.120:4500 fd 280 | add_fd_read_event_handler: new ethX-pe@0x55564d87c798 | libevent_malloc: new ptr-libevent@0x55564d87c808 size 128 | libevent_malloc: new ptr-libevent@0x55564d87c8b8 size 16 | setup callback for interface eth0 192.1.3.120:500 fd 279 | add_fd_read_event_handler: new ethX-pe@0x55564d87c8f8 | libevent_malloc: new ptr-libevent@0x55564d87c968 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ca18 size 16 | setup callback for interface eth0 192.1.3.121:4500 fd 278 | add_fd_read_event_handler: new ethX-pe@0x55564d87ca58 | libevent_malloc: new ptr-libevent@0x55564d87cac8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87cb78 size 16 | setup callback for interface eth0 192.1.3.121:500 fd 277 | add_fd_read_event_handler: new ethX-pe@0x55564d87cbb8 | libevent_malloc: new ptr-libevent@0x55564d87cc28 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ccd8 size 16 | setup callback for interface eth0 192.1.3.122:4500 fd 276 | add_fd_read_event_handler: new ethX-pe@0x55564d87cd18 | libevent_malloc: new ptr-libevent@0x55564d87cd88 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ce38 size 16 | setup callback for interface eth0 192.1.3.122:500 fd 275 | add_fd_read_event_handler: new ethX-pe@0x55564d87ce78 | libevent_malloc: new ptr-libevent@0x55564d87cee8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87cf98 size 16 | setup callback for interface eth0 192.1.3.123:4500 fd 274 | add_fd_read_event_handler: new ethX-pe@0x55564d87cfd8 | libevent_malloc: new ptr-libevent@0x55564d87d048 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d0f8 size 16 | setup callback for interface eth0 192.1.3.123:500 fd 273 | add_fd_read_event_handler: new ethX-pe@0x55564d87d138 | libevent_malloc: new ptr-libevent@0x55564d87d1a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d258 size 16 | setup callback for interface eth0 192.1.3.124:4500 fd 272 | add_fd_read_event_handler: new ethX-pe@0x55564d87d298 | libevent_malloc: new ptr-libevent@0x55564d87d308 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d3b8 size 16 | setup callback for interface eth0 192.1.3.124:500 fd 271 | add_fd_read_event_handler: new ethX-pe@0x55564d87d3f8 | libevent_malloc: new ptr-libevent@0x55564d87d468 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d518 size 16 | setup callback for interface eth0 192.1.3.125:4500 fd 270 | add_fd_read_event_handler: new ethX-pe@0x55564d87d558 | libevent_malloc: new ptr-libevent@0x55564d87d5c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d678 size 16 | setup callback for interface eth0 192.1.3.125:500 fd 269 | add_fd_read_event_handler: new ethX-pe@0x55564d87d6b8 | libevent_malloc: new ptr-libevent@0x55564d87d728 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d7d8 size 16 | setup callback for interface eth0 192.1.3.126:4500 fd 268 | add_fd_read_event_handler: new ethX-pe@0x55564d87d818 | libevent_malloc: new ptr-libevent@0x55564d87d888 size 128 | libevent_malloc: new ptr-libevent@0x55564d87d938 size 16 | setup callback for interface eth0 192.1.3.126:500 fd 267 | add_fd_read_event_handler: new ethX-pe@0x55564d87d978 | libevent_malloc: new ptr-libevent@0x55564d87d9e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87da98 size 16 | setup callback for interface eth0 192.1.3.127:4500 fd 266 | add_fd_read_event_handler: new ethX-pe@0x55564d87dad8 | libevent_malloc: new ptr-libevent@0x55564d87db48 size 128 | libevent_malloc: new ptr-libevent@0x55564d87dbf8 size 16 | setup callback for interface eth0 192.1.3.127:500 fd 265 | add_fd_read_event_handler: new ethX-pe@0x55564d87dc38 | libevent_malloc: new ptr-libevent@0x55564d87dca8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87dd58 size 16 | setup callback for interface eth0 192.1.3.128:4500 fd 264 | add_fd_read_event_handler: new ethX-pe@0x55564d87dd98 | libevent_malloc: new ptr-libevent@0x55564d87de08 size 128 | libevent_malloc: new ptr-libevent@0x55564d87deb8 size 16 | setup callback for interface eth0 192.1.3.128:500 fd 263 | add_fd_read_event_handler: new ethX-pe@0x55564d87def8 | libevent_malloc: new ptr-libevent@0x55564d87df68 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e018 size 16 | setup callback for interface eth0 192.1.3.129:4500 fd 262 | add_fd_read_event_handler: new ethX-pe@0x55564d87e058 | libevent_malloc: new ptr-libevent@0x55564d87e0c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e178 size 16 | setup callback for interface eth0 192.1.3.129:500 fd 261 | add_fd_read_event_handler: new ethX-pe@0x55564d87e1b8 | libevent_malloc: new ptr-libevent@0x55564d87e228 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e2d8 size 16 | setup callback for interface eth0 192.1.3.130:4500 fd 260 | add_fd_read_event_handler: new ethX-pe@0x55564d87e318 | libevent_malloc: new ptr-libevent@0x55564d87e388 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e438 size 16 | setup callback for interface eth0 192.1.3.130:500 fd 259 | add_fd_read_event_handler: new ethX-pe@0x55564d87e478 | libevent_malloc: new ptr-libevent@0x55564d87e4e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e598 size 16 | setup callback for interface eth0 192.1.3.131:4500 fd 258 | add_fd_read_event_handler: new ethX-pe@0x55564d87e5d8 | libevent_malloc: new ptr-libevent@0x55564d87e648 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e6f8 size 16 | setup callback for interface eth0 192.1.3.131:500 fd 257 | add_fd_read_event_handler: new ethX-pe@0x55564d87e738 | libevent_malloc: new ptr-libevent@0x55564d87e7a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e858 size 16 | setup callback for interface eth0 192.1.3.132:4500 fd 256 | add_fd_read_event_handler: new ethX-pe@0x55564d87e898 | libevent_malloc: new ptr-libevent@0x55564d87e908 size 128 | libevent_malloc: new ptr-libevent@0x55564d87e9b8 size 16 | setup callback for interface eth0 192.1.3.132:500 fd 255 | add_fd_read_event_handler: new ethX-pe@0x55564d87e9f8 | libevent_malloc: new ptr-libevent@0x55564d87ea68 size 128 | libevent_malloc: new ptr-libevent@0x55564d87eb18 size 16 | setup callback for interface eth0 192.1.3.133:4500 fd 254 | add_fd_read_event_handler: new ethX-pe@0x55564d87eb58 | libevent_malloc: new ptr-libevent@0x55564d87ebc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ec78 size 16 | setup callback for interface eth0 192.1.3.133:500 fd 253 | add_fd_read_event_handler: new ethX-pe@0x55564d87ecb8 | libevent_malloc: new ptr-libevent@0x55564d87ed28 size 128 | libevent_malloc: new ptr-libevent@0x55564d87edd8 size 16 | setup callback for interface eth0 192.1.3.134:4500 fd 252 | add_fd_read_event_handler: new ethX-pe@0x55564d87ee18 | libevent_malloc: new ptr-libevent@0x55564d87ee88 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ef38 size 16 | setup callback for interface eth0 192.1.3.134:500 fd 251 | add_fd_read_event_handler: new ethX-pe@0x55564d87ef78 | libevent_malloc: new ptr-libevent@0x55564d87efe8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f098 size 16 | setup callback for interface eth0 192.1.3.135:4500 fd 250 | add_fd_read_event_handler: new ethX-pe@0x55564d87f0d8 | libevent_malloc: new ptr-libevent@0x55564d87f148 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f1f8 size 16 | setup callback for interface eth0 192.1.3.135:500 fd 249 | add_fd_read_event_handler: new ethX-pe@0x55564d87f238 | libevent_malloc: new ptr-libevent@0x55564d87f2a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f358 size 16 | setup callback for interface eth0 192.1.3.136:4500 fd 248 | add_fd_read_event_handler: new ethX-pe@0x55564d87f398 | libevent_malloc: new ptr-libevent@0x55564d87f408 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f4b8 size 16 | setup callback for interface eth0 192.1.3.136:500 fd 247 | add_fd_read_event_handler: new ethX-pe@0x55564d87f4f8 | libevent_malloc: new ptr-libevent@0x55564d87f568 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f618 size 16 | setup callback for interface eth0 192.1.3.137:4500 fd 246 | add_fd_read_event_handler: new ethX-pe@0x55564d87f658 | libevent_malloc: new ptr-libevent@0x55564d87f6c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f778 size 16 | setup callback for interface eth0 192.1.3.137:500 fd 245 | add_fd_read_event_handler: new ethX-pe@0x55564d87f7b8 | libevent_malloc: new ptr-libevent@0x55564d87f828 size 128 | libevent_malloc: new ptr-libevent@0x55564d87f8d8 size 16 | setup callback for interface eth0 192.1.3.138:4500 fd 244 | add_fd_read_event_handler: new ethX-pe@0x55564d87f918 | libevent_malloc: new ptr-libevent@0x55564d87f988 size 128 | libevent_malloc: new ptr-libevent@0x55564d87fa38 size 16 | setup callback for interface eth0 192.1.3.138:500 fd 243 | add_fd_read_event_handler: new ethX-pe@0x55564d87fa78 | libevent_malloc: new ptr-libevent@0x55564d87fae8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87fb98 size 16 | setup callback for interface eth0 192.1.3.139:4500 fd 242 | add_fd_read_event_handler: new ethX-pe@0x55564d87fbd8 | libevent_malloc: new ptr-libevent@0x55564d87fc48 size 128 | libevent_malloc: new ptr-libevent@0x55564d87fcf8 size 16 | setup callback for interface eth0 192.1.3.139:500 fd 241 | add_fd_read_event_handler: new ethX-pe@0x55564d87fd38 | libevent_malloc: new ptr-libevent@0x55564d87fda8 size 128 | libevent_malloc: new ptr-libevent@0x55564d87fe58 size 16 | setup callback for interface eth0 192.1.3.140:4500 fd 240 | add_fd_read_event_handler: new ethX-pe@0x55564d87fe98 | libevent_malloc: new ptr-libevent@0x55564d87ff08 size 128 | libevent_malloc: new ptr-libevent@0x55564d87ffb8 size 16 | setup callback for interface eth0 192.1.3.140:500 fd 239 | add_fd_read_event_handler: new ethX-pe@0x55564d87fff8 | libevent_malloc: new ptr-libevent@0x55564d880068 size 128 | libevent_malloc: new ptr-libevent@0x55564d880118 size 16 | setup callback for interface eth0 192.1.3.141:4500 fd 238 | add_fd_read_event_handler: new ethX-pe@0x55564d880158 | libevent_malloc: new ptr-libevent@0x55564d8801c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d880278 size 16 | setup callback for interface eth0 192.1.3.141:500 fd 237 | add_fd_read_event_handler: new ethX-pe@0x55564d8802b8 | libevent_malloc: new ptr-libevent@0x55564d880328 size 128 | libevent_malloc: new ptr-libevent@0x55564d8803d8 size 16 | setup callback for interface eth0 192.1.3.142:4500 fd 236 | add_fd_read_event_handler: new ethX-pe@0x55564d880418 | libevent_malloc: new ptr-libevent@0x55564d880488 size 128 | libevent_malloc: new ptr-libevent@0x55564d880538 size 16 | setup callback for interface eth0 192.1.3.142:500 fd 235 | add_fd_read_event_handler: new ethX-pe@0x55564d880578 | libevent_malloc: new ptr-libevent@0x55564d8805e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d880698 size 16 | setup callback for interface eth0 192.1.3.143:4500 fd 234 | add_fd_read_event_handler: new ethX-pe@0x55564d8806d8 | libevent_malloc: new ptr-libevent@0x55564d880748 size 128 | libevent_malloc: new ptr-libevent@0x55564d8807f8 size 16 | setup callback for interface eth0 192.1.3.143:500 fd 233 | add_fd_read_event_handler: new ethX-pe@0x55564d880838 | libevent_malloc: new ptr-libevent@0x55564d8808a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d880958 size 16 | setup callback for interface eth0 192.1.3.144:4500 fd 232 | add_fd_read_event_handler: new ethX-pe@0x55564d880998 | libevent_malloc: new ptr-libevent@0x55564d880a08 size 128 | libevent_malloc: new ptr-libevent@0x55564d880ab8 size 16 | setup callback for interface eth0 192.1.3.144:500 fd 231 | add_fd_read_event_handler: new ethX-pe@0x55564d880af8 | libevent_malloc: new ptr-libevent@0x55564d880b68 size 128 | libevent_malloc: new ptr-libevent@0x55564d880c18 size 16 | setup callback for interface eth0 192.1.3.145:4500 fd 230 | add_fd_read_event_handler: new ethX-pe@0x55564d880c58 | libevent_malloc: new ptr-libevent@0x55564d880cc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d880d78 size 16 | setup callback for interface eth0 192.1.3.145:500 fd 229 | add_fd_read_event_handler: new ethX-pe@0x55564d880db8 | libevent_malloc: new ptr-libevent@0x55564d880e28 size 128 | libevent_malloc: new ptr-libevent@0x55564d880ed8 size 16 | setup callback for interface eth0 192.1.3.146:4500 fd 228 | add_fd_read_event_handler: new ethX-pe@0x55564d880f18 | libevent_malloc: new ptr-libevent@0x55564d880f88 size 128 | libevent_malloc: new ptr-libevent@0x55564d881038 size 16 | setup callback for interface eth0 192.1.3.146:500 fd 227 | add_fd_read_event_handler: new ethX-pe@0x55564d881078 | libevent_malloc: new ptr-libevent@0x55564d8810e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d881198 size 16 | setup callback for interface eth0 192.1.3.147:4500 fd 226 | add_fd_read_event_handler: new ethX-pe@0x55564d8811d8 | libevent_malloc: new ptr-libevent@0x55564d881248 size 128 | libevent_malloc: new ptr-libevent@0x55564d8812f8 size 16 | setup callback for interface eth0 192.1.3.147:500 fd 225 | add_fd_read_event_handler: new ethX-pe@0x55564d881338 | libevent_malloc: new ptr-libevent@0x55564d8813a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d881458 size 16 | setup callback for interface eth0 192.1.3.148:4500 fd 224 | add_fd_read_event_handler: new ethX-pe@0x55564d881498 | libevent_malloc: new ptr-libevent@0x55564d881508 size 128 | libevent_malloc: new ptr-libevent@0x55564d8815b8 size 16 | setup callback for interface eth0 192.1.3.148:500 fd 223 | add_fd_read_event_handler: new ethX-pe@0x55564d8815f8 | libevent_malloc: new ptr-libevent@0x55564d881668 size 128 | libevent_malloc: new ptr-libevent@0x55564d881718 size 16 | setup callback for interface eth0 192.1.3.149:4500 fd 222 | add_fd_read_event_handler: new ethX-pe@0x55564d881758 | libevent_malloc: new ptr-libevent@0x55564d8817c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d881878 size 16 | setup callback for interface eth0 192.1.3.149:500 fd 221 | add_fd_read_event_handler: new ethX-pe@0x55564d8818b8 | libevent_malloc: new ptr-libevent@0x55564d881928 size 128 | libevent_malloc: new ptr-libevent@0x55564d8819d8 size 16 | setup callback for interface eth0 192.1.3.150:4500 fd 220 | add_fd_read_event_handler: new ethX-pe@0x55564d881a18 | libevent_malloc: new ptr-libevent@0x55564d881a88 size 128 | libevent_malloc: new ptr-libevent@0x55564d881b38 size 16 | setup callback for interface eth0 192.1.3.150:500 fd 219 | add_fd_read_event_handler: new ethX-pe@0x55564d881b78 | libevent_malloc: new ptr-libevent@0x55564d881be8 size 128 | libevent_malloc: new ptr-libevent@0x55564d881c98 size 16 | setup callback for interface eth0 192.1.3.151:4500 fd 218 | add_fd_read_event_handler: new ethX-pe@0x55564d881cd8 | libevent_malloc: new ptr-libevent@0x55564d881d48 size 128 | libevent_malloc: new ptr-libevent@0x55564d881df8 size 16 | setup callback for interface eth0 192.1.3.151:500 fd 217 | add_fd_read_event_handler: new ethX-pe@0x55564d881e38 | libevent_malloc: new ptr-libevent@0x55564d881ea8 size 128 | libevent_malloc: new ptr-libevent@0x55564d881f58 size 16 | setup callback for interface eth0 192.1.3.152:4500 fd 216 | add_fd_read_event_handler: new ethX-pe@0x55564d881f98 | libevent_malloc: new ptr-libevent@0x55564d882008 size 128 | libevent_malloc: new ptr-libevent@0x55564d8820b8 size 16 | setup callback for interface eth0 192.1.3.152:500 fd 215 | add_fd_read_event_handler: new ethX-pe@0x55564d8820f8 | libevent_malloc: new ptr-libevent@0x55564d882168 size 128 | libevent_malloc: new ptr-libevent@0x55564d882218 size 16 | setup callback for interface eth0 192.1.3.153:4500 fd 214 | add_fd_read_event_handler: new ethX-pe@0x55564d882258 | libevent_malloc: new ptr-libevent@0x55564d8822c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d882378 size 16 | setup callback for interface eth0 192.1.3.153:500 fd 213 | add_fd_read_event_handler: new ethX-pe@0x55564d8823b8 | libevent_malloc: new ptr-libevent@0x55564d882428 size 128 | libevent_malloc: new ptr-libevent@0x55564d8824d8 size 16 | setup callback for interface eth0 192.1.3.154:4500 fd 212 | add_fd_read_event_handler: new ethX-pe@0x55564d882518 | libevent_malloc: new ptr-libevent@0x55564d882588 size 128 | libevent_malloc: new ptr-libevent@0x55564d882638 size 16 | setup callback for interface eth0 192.1.3.154:500 fd 211 | add_fd_read_event_handler: new ethX-pe@0x55564d882678 | libevent_malloc: new ptr-libevent@0x55564d8826e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d882798 size 16 | setup callback for interface eth0 192.1.3.155:4500 fd 210 | add_fd_read_event_handler: new ethX-pe@0x55564d8827d8 | libevent_malloc: new ptr-libevent@0x55564d882848 size 128 | libevent_malloc: new ptr-libevent@0x55564d8828f8 size 16 | setup callback for interface eth0 192.1.3.155:500 fd 209 | add_fd_read_event_handler: new ethX-pe@0x55564d882938 | libevent_malloc: new ptr-libevent@0x55564d8829a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d882a58 size 16 | setup callback for interface eth0 192.1.3.156:4500 fd 208 | add_fd_read_event_handler: new ethX-pe@0x55564d882a98 | libevent_malloc: new ptr-libevent@0x55564d882b08 size 128 | libevent_malloc: new ptr-libevent@0x55564d882bb8 size 16 | setup callback for interface eth0 192.1.3.156:500 fd 207 | add_fd_read_event_handler: new ethX-pe@0x55564d882bf8 | libevent_malloc: new ptr-libevent@0x55564d882c68 size 128 | libevent_malloc: new ptr-libevent@0x55564d882d18 size 16 | setup callback for interface eth0 192.1.3.157:4500 fd 206 | add_fd_read_event_handler: new ethX-pe@0x55564d882d58 | libevent_malloc: new ptr-libevent@0x55564d882dc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d882e78 size 16 | setup callback for interface eth0 192.1.3.157:500 fd 205 | add_fd_read_event_handler: new ethX-pe@0x55564d882eb8 | libevent_malloc: new ptr-libevent@0x55564d882f28 size 128 | libevent_malloc: new ptr-libevent@0x55564d882fd8 size 16 | setup callback for interface eth0 192.1.3.158:4500 fd 204 | add_fd_read_event_handler: new ethX-pe@0x55564d883018 | libevent_malloc: new ptr-libevent@0x55564d883088 size 128 | libevent_malloc: new ptr-libevent@0x55564d883138 size 16 | setup callback for interface eth0 192.1.3.158:500 fd 203 | add_fd_read_event_handler: new ethX-pe@0x55564d883178 | libevent_malloc: new ptr-libevent@0x55564d8831e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d883298 size 16 | setup callback for interface eth0 192.1.3.159:4500 fd 202 | add_fd_read_event_handler: new ethX-pe@0x55564d8832d8 | libevent_malloc: new ptr-libevent@0x55564d883348 size 128 | libevent_malloc: new ptr-libevent@0x55564d8833f8 size 16 | setup callback for interface eth0 192.1.3.159:500 fd 201 | add_fd_read_event_handler: new ethX-pe@0x55564d883438 | libevent_malloc: new ptr-libevent@0x55564d8834a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d883558 size 16 | setup callback for interface eth0 192.1.3.160:4500 fd 200 | add_fd_read_event_handler: new ethX-pe@0x55564d883598 | libevent_malloc: new ptr-libevent@0x55564d883608 size 128 | libevent_malloc: new ptr-libevent@0x55564d8836b8 size 16 | setup callback for interface eth0 192.1.3.160:500 fd 199 | add_fd_read_event_handler: new ethX-pe@0x55564d8836f8 | libevent_malloc: new ptr-libevent@0x55564d883768 size 128 | libevent_malloc: new ptr-libevent@0x55564d883818 size 16 | setup callback for interface eth0 192.1.3.161:4500 fd 198 | add_fd_read_event_handler: new ethX-pe@0x55564d883858 | libevent_malloc: new ptr-libevent@0x55564d8838c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d883978 size 16 | setup callback for interface eth0 192.1.3.161:500 fd 197 | add_fd_read_event_handler: new ethX-pe@0x55564d8839b8 | libevent_malloc: new ptr-libevent@0x55564d883a28 size 128 | libevent_malloc: new ptr-libevent@0x55564d883ad8 size 16 | setup callback for interface eth0 192.1.3.162:4500 fd 196 | add_fd_read_event_handler: new ethX-pe@0x55564d883b18 | libevent_malloc: new ptr-libevent@0x55564d883b88 size 128 | libevent_malloc: new ptr-libevent@0x55564d883c38 size 16 | setup callback for interface eth0 192.1.3.162:500 fd 195 | add_fd_read_event_handler: new ethX-pe@0x55564d883c78 | libevent_malloc: new ptr-libevent@0x55564d883ce8 size 128 | libevent_malloc: new ptr-libevent@0x55564d883d98 size 16 | setup callback for interface eth0 192.1.3.163:4500 fd 194 | add_fd_read_event_handler: new ethX-pe@0x55564d883dd8 | libevent_malloc: new ptr-libevent@0x55564d883e48 size 128 | libevent_malloc: new ptr-libevent@0x55564d883ef8 size 16 | setup callback for interface eth0 192.1.3.163:500 fd 193 | add_fd_read_event_handler: new ethX-pe@0x55564d883f38 | libevent_malloc: new ptr-libevent@0x55564d883fa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d884058 size 16 | setup callback for interface eth0 192.1.3.164:4500 fd 192 | add_fd_read_event_handler: new ethX-pe@0x55564d884098 | libevent_malloc: new ptr-libevent@0x55564d884108 size 128 | libevent_malloc: new ptr-libevent@0x55564d8841b8 size 16 | setup callback for interface eth0 192.1.3.164:500 fd 191 | add_fd_read_event_handler: new ethX-pe@0x55564d8841f8 | libevent_malloc: new ptr-libevent@0x55564d884268 size 128 | libevent_malloc: new ptr-libevent@0x55564d884318 size 16 | setup callback for interface eth0 192.1.3.165:4500 fd 190 | add_fd_read_event_handler: new ethX-pe@0x55564d884358 | libevent_malloc: new ptr-libevent@0x55564d8843c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d884478 size 16 | setup callback for interface eth0 192.1.3.165:500 fd 189 | add_fd_read_event_handler: new ethX-pe@0x55564d8844b8 | libevent_malloc: new ptr-libevent@0x55564d884528 size 128 | libevent_malloc: new ptr-libevent@0x55564d8845d8 size 16 | setup callback for interface eth0 192.1.3.166:4500 fd 188 | add_fd_read_event_handler: new ethX-pe@0x55564d884618 | libevent_malloc: new ptr-libevent@0x55564d884688 size 128 | libevent_malloc: new ptr-libevent@0x55564d884738 size 16 | setup callback for interface eth0 192.1.3.166:500 fd 187 | add_fd_read_event_handler: new ethX-pe@0x55564d884778 | libevent_malloc: new ptr-libevent@0x55564d8847e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d884898 size 16 | setup callback for interface eth0 192.1.3.167:4500 fd 186 | add_fd_read_event_handler: new ethX-pe@0x55564d8848d8 | libevent_malloc: new ptr-libevent@0x55564d884948 size 128 | libevent_malloc: new ptr-libevent@0x55564d8849f8 size 16 | setup callback for interface eth0 192.1.3.167:500 fd 185 | add_fd_read_event_handler: new ethX-pe@0x55564d884a38 | libevent_malloc: new ptr-libevent@0x55564d884aa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d884b58 size 16 | setup callback for interface eth0 192.1.3.168:4500 fd 184 | add_fd_read_event_handler: new ethX-pe@0x55564d884b98 | libevent_malloc: new ptr-libevent@0x55564d884c08 size 128 | libevent_malloc: new ptr-libevent@0x55564d884cb8 size 16 | setup callback for interface eth0 192.1.3.168:500 fd 183 | add_fd_read_event_handler: new ethX-pe@0x55564d884cf8 | libevent_malloc: new ptr-libevent@0x55564d884d68 size 128 | libevent_malloc: new ptr-libevent@0x55564d884e18 size 16 | setup callback for interface eth0 192.1.3.169:4500 fd 182 | add_fd_read_event_handler: new ethX-pe@0x55564d884e58 | libevent_malloc: new ptr-libevent@0x55564d884ec8 size 128 | libevent_malloc: new ptr-libevent@0x55564d884f78 size 16 | setup callback for interface eth0 192.1.3.169:500 fd 181 | add_fd_read_event_handler: new ethX-pe@0x55564d884fb8 | libevent_malloc: new ptr-libevent@0x55564d885028 size 128 | libevent_malloc: new ptr-libevent@0x55564d8850d8 size 16 | setup callback for interface eth0 192.1.3.170:4500 fd 180 | add_fd_read_event_handler: new ethX-pe@0x55564d885118 | libevent_malloc: new ptr-libevent@0x55564d885188 size 128 | libevent_malloc: new ptr-libevent@0x55564d885238 size 16 | setup callback for interface eth0 192.1.3.170:500 fd 179 | add_fd_read_event_handler: new ethX-pe@0x55564d885278 | libevent_malloc: new ptr-libevent@0x55564d8852e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d885398 size 16 | setup callback for interface eth0 192.1.3.171:4500 fd 178 | add_fd_read_event_handler: new ethX-pe@0x55564d8853d8 | libevent_malloc: new ptr-libevent@0x55564d885448 size 128 | libevent_malloc: new ptr-libevent@0x55564d8854f8 size 16 | setup callback for interface eth0 192.1.3.171:500 fd 177 | add_fd_read_event_handler: new ethX-pe@0x55564d885538 | libevent_malloc: new ptr-libevent@0x55564d8855a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d885658 size 16 | setup callback for interface eth0 192.1.3.172:4500 fd 176 | add_fd_read_event_handler: new ethX-pe@0x55564d885698 | libevent_malloc: new ptr-libevent@0x55564d885708 size 128 | libevent_malloc: new ptr-libevent@0x55564d8857b8 size 16 | setup callback for interface eth0 192.1.3.172:500 fd 175 | add_fd_read_event_handler: new ethX-pe@0x55564d8857f8 | libevent_malloc: new ptr-libevent@0x55564d885868 size 128 | libevent_malloc: new ptr-libevent@0x55564d885918 size 16 | setup callback for interface eth0 192.1.3.173:4500 fd 174 | add_fd_read_event_handler: new ethX-pe@0x55564d885958 | libevent_malloc: new ptr-libevent@0x55564d8859c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d885a78 size 16 | setup callback for interface eth0 192.1.3.173:500 fd 173 | add_fd_read_event_handler: new ethX-pe@0x55564d885ab8 | libevent_malloc: new ptr-libevent@0x55564d885b28 size 128 | libevent_malloc: new ptr-libevent@0x55564d885bd8 size 16 | setup callback for interface eth0 192.1.3.174:4500 fd 172 | add_fd_read_event_handler: new ethX-pe@0x55564d885c18 | libevent_malloc: new ptr-libevent@0x55564d885c88 size 128 | libevent_malloc: new ptr-libevent@0x55564d885d38 size 16 | setup callback for interface eth0 192.1.3.174:500 fd 171 | add_fd_read_event_handler: new ethX-pe@0x55564d885d78 | libevent_malloc: new ptr-libevent@0x55564d885de8 size 128 | libevent_malloc: new ptr-libevent@0x55564d885e98 size 16 | setup callback for interface eth0 192.1.3.175:4500 fd 170 | add_fd_read_event_handler: new ethX-pe@0x55564d885ed8 | libevent_malloc: new ptr-libevent@0x55564d885f48 size 128 | libevent_malloc: new ptr-libevent@0x55564d885ff8 size 16 | setup callback for interface eth0 192.1.3.175:500 fd 169 | add_fd_read_event_handler: new ethX-pe@0x55564d886038 | libevent_malloc: new ptr-libevent@0x55564d8860a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d886158 size 16 | setup callback for interface eth0 192.1.3.176:4500 fd 168 | add_fd_read_event_handler: new ethX-pe@0x55564d886198 | libevent_malloc: new ptr-libevent@0x55564d886208 size 128 | libevent_malloc: new ptr-libevent@0x55564d8862b8 size 16 | setup callback for interface eth0 192.1.3.176:500 fd 167 | add_fd_read_event_handler: new ethX-pe@0x55564d8862f8 | libevent_malloc: new ptr-libevent@0x55564d886368 size 128 | libevent_malloc: new ptr-libevent@0x55564d886418 size 16 | setup callback for interface eth0 192.1.3.177:4500 fd 166 | add_fd_read_event_handler: new ethX-pe@0x55564d886458 | libevent_malloc: new ptr-libevent@0x55564d8864c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d886578 size 16 | setup callback for interface eth0 192.1.3.177:500 fd 165 | add_fd_read_event_handler: new ethX-pe@0x55564d8865b8 | libevent_malloc: new ptr-libevent@0x55564d886628 size 128 | libevent_malloc: new ptr-libevent@0x55564d8866d8 size 16 | setup callback for interface eth0 192.1.3.178:4500 fd 164 | add_fd_read_event_handler: new ethX-pe@0x55564d886718 | libevent_malloc: new ptr-libevent@0x55564d886788 size 128 | libevent_malloc: new ptr-libevent@0x55564d886838 size 16 | setup callback for interface eth0 192.1.3.178:500 fd 163 | add_fd_read_event_handler: new ethX-pe@0x55564d886878 | libevent_malloc: new ptr-libevent@0x55564d8868e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d886998 size 16 | setup callback for interface eth0 192.1.3.179:4500 fd 162 | add_fd_read_event_handler: new ethX-pe@0x55564d8869d8 | libevent_malloc: new ptr-libevent@0x55564d886a48 size 128 | libevent_malloc: new ptr-libevent@0x55564d886af8 size 16 | setup callback for interface eth0 192.1.3.179:500 fd 161 | add_fd_read_event_handler: new ethX-pe@0x55564d886b38 | libevent_malloc: new ptr-libevent@0x55564d886ba8 size 128 | libevent_malloc: new ptr-libevent@0x55564d886c58 size 16 | setup callback for interface eth0 192.1.3.180:4500 fd 160 | add_fd_read_event_handler: new ethX-pe@0x55564d886c98 | libevent_malloc: new ptr-libevent@0x55564d886d08 size 128 | libevent_malloc: new ptr-libevent@0x55564d886db8 size 16 | setup callback for interface eth0 192.1.3.180:500 fd 159 | add_fd_read_event_handler: new ethX-pe@0x55564d886df8 | libevent_malloc: new ptr-libevent@0x55564d886e68 size 128 | libevent_malloc: new ptr-libevent@0x55564d886f18 size 16 | setup callback for interface eth0 192.1.3.181:4500 fd 158 | add_fd_read_event_handler: new ethX-pe@0x55564d886f58 | libevent_malloc: new ptr-libevent@0x55564d886fc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d887078 size 16 | setup callback for interface eth0 192.1.3.181:500 fd 157 | add_fd_read_event_handler: new ethX-pe@0x55564d8870b8 | libevent_malloc: new ptr-libevent@0x55564d887128 size 128 | libevent_malloc: new ptr-libevent@0x55564d8871d8 size 16 | setup callback for interface eth0 192.1.3.182:4500 fd 156 | add_fd_read_event_handler: new ethX-pe@0x55564d887218 | libevent_malloc: new ptr-libevent@0x55564d887288 size 128 | libevent_malloc: new ptr-libevent@0x55564d887338 size 16 | setup callback for interface eth0 192.1.3.182:500 fd 155 | add_fd_read_event_handler: new ethX-pe@0x55564d887378 | libevent_malloc: new ptr-libevent@0x55564d8873e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d887498 size 16 | setup callback for interface eth0 192.1.3.183:4500 fd 154 | add_fd_read_event_handler: new ethX-pe@0x55564d8874d8 | libevent_malloc: new ptr-libevent@0x55564d887548 size 128 | libevent_malloc: new ptr-libevent@0x55564d8875f8 size 16 | setup callback for interface eth0 192.1.3.183:500 fd 153 | add_fd_read_event_handler: new ethX-pe@0x55564d887638 | libevent_malloc: new ptr-libevent@0x55564d8876a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d887758 size 16 | setup callback for interface eth0 192.1.3.184:4500 fd 152 | add_fd_read_event_handler: new ethX-pe@0x55564d887798 | libevent_malloc: new ptr-libevent@0x55564d887808 size 128 | libevent_malloc: new ptr-libevent@0x55564d8878b8 size 16 | setup callback for interface eth0 192.1.3.184:500 fd 151 | add_fd_read_event_handler: new ethX-pe@0x55564d8878f8 | libevent_malloc: new ptr-libevent@0x55564d887968 size 128 | libevent_malloc: new ptr-libevent@0x55564d887a18 size 16 | setup callback for interface eth0 192.1.3.185:4500 fd 150 | add_fd_read_event_handler: new ethX-pe@0x55564d887a58 | libevent_malloc: new ptr-libevent@0x55564d887ac8 size 128 | libevent_malloc: new ptr-libevent@0x55564d887b78 size 16 | setup callback for interface eth0 192.1.3.185:500 fd 149 | add_fd_read_event_handler: new ethX-pe@0x55564d887bb8 | libevent_malloc: new ptr-libevent@0x55564d887c28 size 128 | libevent_malloc: new ptr-libevent@0x55564d887cd8 size 16 | setup callback for interface eth0 192.1.3.186:4500 fd 148 | add_fd_read_event_handler: new ethX-pe@0x55564d887d18 | libevent_malloc: new ptr-libevent@0x55564d887d88 size 128 | libevent_malloc: new ptr-libevent@0x55564d887e38 size 16 | setup callback for interface eth0 192.1.3.186:500 fd 147 | add_fd_read_event_handler: new ethX-pe@0x55564d887e78 | libevent_malloc: new ptr-libevent@0x55564d887ee8 size 128 | libevent_malloc: new ptr-libevent@0x55564d887f98 size 16 | setup callback for interface eth0 192.1.3.187:4500 fd 146 | add_fd_read_event_handler: new ethX-pe@0x55564d887fd8 | libevent_malloc: new ptr-libevent@0x55564d888048 size 128 | libevent_malloc: new ptr-libevent@0x55564d8880f8 size 16 | setup callback for interface eth0 192.1.3.187:500 fd 145 | add_fd_read_event_handler: new ethX-pe@0x55564d888138 | libevent_malloc: new ptr-libevent@0x55564d8881a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d888258 size 16 | setup callback for interface eth0 192.1.3.188:4500 fd 144 | add_fd_read_event_handler: new ethX-pe@0x55564d888298 | libevent_malloc: new ptr-libevent@0x55564d888308 size 128 | libevent_malloc: new ptr-libevent@0x55564d8883b8 size 16 | setup callback for interface eth0 192.1.3.188:500 fd 143 | add_fd_read_event_handler: new ethX-pe@0x55564d8883f8 | libevent_malloc: new ptr-libevent@0x55564d888468 size 128 | libevent_malloc: new ptr-libevent@0x55564d888518 size 16 | setup callback for interface eth0 192.1.3.189:4500 fd 142 | add_fd_read_event_handler: new ethX-pe@0x55564d888558 | libevent_malloc: new ptr-libevent@0x55564d8885c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d888678 size 16 | setup callback for interface eth0 192.1.3.189:500 fd 141 | add_fd_read_event_handler: new ethX-pe@0x55564d8886b8 | libevent_malloc: new ptr-libevent@0x55564d888728 size 128 | libevent_malloc: new ptr-libevent@0x55564d8887d8 size 16 | setup callback for interface eth0 192.1.3.190:4500 fd 140 | add_fd_read_event_handler: new ethX-pe@0x55564d888818 | libevent_malloc: new ptr-libevent@0x55564d888888 size 128 | libevent_malloc: new ptr-libevent@0x55564d888938 size 16 | setup callback for interface eth0 192.1.3.190:500 fd 139 | add_fd_read_event_handler: new ethX-pe@0x55564d888978 | libevent_malloc: new ptr-libevent@0x55564d8889e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d888a98 size 16 | setup callback for interface eth0 192.1.3.191:4500 fd 138 | add_fd_read_event_handler: new ethX-pe@0x55564d888ad8 | libevent_malloc: new ptr-libevent@0x55564d888b48 size 128 | libevent_malloc: new ptr-libevent@0x55564d888bf8 size 16 | setup callback for interface eth0 192.1.3.191:500 fd 137 | add_fd_read_event_handler: new ethX-pe@0x55564d888c38 | libevent_malloc: new ptr-libevent@0x55564d888ca8 size 128 | libevent_malloc: new ptr-libevent@0x55564d888d58 size 16 | setup callback for interface eth0 192.1.3.192:4500 fd 136 | add_fd_read_event_handler: new ethX-pe@0x55564d888d98 | libevent_malloc: new ptr-libevent@0x55564d888e08 size 128 | libevent_malloc: new ptr-libevent@0x55564d888eb8 size 16 | setup callback for interface eth0 192.1.3.192:500 fd 135 | add_fd_read_event_handler: new ethX-pe@0x55564d888ef8 | libevent_malloc: new ptr-libevent@0x55564d888f68 size 128 | libevent_malloc: new ptr-libevent@0x55564d889018 size 16 | setup callback for interface eth0 192.1.3.193:4500 fd 134 | add_fd_read_event_handler: new ethX-pe@0x55564d889058 | libevent_malloc: new ptr-libevent@0x55564d8890c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d889178 size 16 | setup callback for interface eth0 192.1.3.193:500 fd 133 | add_fd_read_event_handler: new ethX-pe@0x55564d8891b8 | libevent_malloc: new ptr-libevent@0x55564d889228 size 128 | libevent_malloc: new ptr-libevent@0x55564d8892d8 size 16 | setup callback for interface eth0 192.1.3.194:4500 fd 132 | add_fd_read_event_handler: new ethX-pe@0x55564d889318 | libevent_malloc: new ptr-libevent@0x55564d889388 size 128 | libevent_malloc: new ptr-libevent@0x55564d889438 size 16 | setup callback for interface eth0 192.1.3.194:500 fd 131 | add_fd_read_event_handler: new ethX-pe@0x55564d889478 | libevent_malloc: new ptr-libevent@0x55564d8894e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d889598 size 16 | setup callback for interface eth0 192.1.3.195:4500 fd 130 | add_fd_read_event_handler: new ethX-pe@0x55564d8895d8 | libevent_malloc: new ptr-libevent@0x55564d889648 size 128 | libevent_malloc: new ptr-libevent@0x55564d8896f8 size 16 | setup callback for interface eth0 192.1.3.195:500 fd 129 | add_fd_read_event_handler: new ethX-pe@0x55564d889738 | libevent_malloc: new ptr-libevent@0x55564d8897a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d889858 size 16 | setup callback for interface eth0 192.1.3.196:4500 fd 128 | add_fd_read_event_handler: new ethX-pe@0x55564d889898 | libevent_malloc: new ptr-libevent@0x55564d889908 size 128 | libevent_malloc: new ptr-libevent@0x55564d8899b8 size 16 | setup callback for interface eth0 192.1.3.196:500 fd 127 | add_fd_read_event_handler: new ethX-pe@0x55564d8899f8 | libevent_malloc: new ptr-libevent@0x55564d889a68 size 128 | libevent_malloc: new ptr-libevent@0x55564d889b18 size 16 | setup callback for interface eth0 192.1.3.197:4500 fd 126 | add_fd_read_event_handler: new ethX-pe@0x55564d889b58 | libevent_malloc: new ptr-libevent@0x55564d889bc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d889c78 size 16 | setup callback for interface eth0 192.1.3.197:500 fd 125 | add_fd_read_event_handler: new ethX-pe@0x55564d889cb8 | libevent_malloc: new ptr-libevent@0x55564d889d28 size 128 | libevent_malloc: new ptr-libevent@0x55564d889dd8 size 16 | setup callback for interface eth0 192.1.3.198:4500 fd 124 | add_fd_read_event_handler: new ethX-pe@0x55564d889e18 | libevent_malloc: new ptr-libevent@0x55564d889e88 size 128 | libevent_malloc: new ptr-libevent@0x55564d889f38 size 16 | setup callback for interface eth0 192.1.3.198:500 fd 123 | add_fd_read_event_handler: new ethX-pe@0x55564d889f78 | libevent_malloc: new ptr-libevent@0x55564d889fe8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a098 size 16 | setup callback for interface eth0 192.1.3.199:4500 fd 122 | add_fd_read_event_handler: new ethX-pe@0x55564d88a0d8 | libevent_malloc: new ptr-libevent@0x55564d88a148 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a1f8 size 16 | setup callback for interface eth0 192.1.3.199:500 fd 121 | add_fd_read_event_handler: new ethX-pe@0x55564d88a238 | libevent_malloc: new ptr-libevent@0x55564d88a2a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a358 size 16 | setup callback for interface eth0 192.1.3.200:4500 fd 120 | add_fd_read_event_handler: new ethX-pe@0x55564d88a398 | libevent_malloc: new ptr-libevent@0x55564d88a408 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a4b8 size 16 | setup callback for interface eth0 192.1.3.200:500 fd 119 | add_fd_read_event_handler: new ethX-pe@0x55564d88a4f8 | libevent_malloc: new ptr-libevent@0x55564d88a568 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a618 size 16 | setup callback for interface eth0 192.1.3.201:4500 fd 118 | add_fd_read_event_handler: new ethX-pe@0x55564d88a658 | libevent_malloc: new ptr-libevent@0x55564d88a6c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a778 size 16 | setup callback for interface eth0 192.1.3.201:500 fd 117 | add_fd_read_event_handler: new ethX-pe@0x55564d88a7b8 | libevent_malloc: new ptr-libevent@0x55564d88a828 size 128 | libevent_malloc: new ptr-libevent@0x55564d88a8d8 size 16 | setup callback for interface eth0 192.1.3.202:4500 fd 116 | add_fd_read_event_handler: new ethX-pe@0x55564d88a918 | libevent_malloc: new ptr-libevent@0x55564d88a988 size 128 | libevent_malloc: new ptr-libevent@0x55564d88aa38 size 16 | setup callback for interface eth0 192.1.3.202:500 fd 115 | add_fd_read_event_handler: new ethX-pe@0x55564d88aa78 | libevent_malloc: new ptr-libevent@0x55564d88aae8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88ab98 size 16 | setup callback for interface eth0 192.1.3.203:4500 fd 114 | add_fd_read_event_handler: new ethX-pe@0x55564d88abd8 | libevent_malloc: new ptr-libevent@0x55564d88ac48 size 128 | libevent_malloc: new ptr-libevent@0x55564d88acf8 size 16 | setup callback for interface eth0 192.1.3.203:500 fd 113 | add_fd_read_event_handler: new ethX-pe@0x55564d88ad38 | libevent_malloc: new ptr-libevent@0x55564d88ada8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88ae58 size 16 | setup callback for interface eth0 192.1.3.204:4500 fd 112 | add_fd_read_event_handler: new ethX-pe@0x55564d88ae98 | libevent_malloc: new ptr-libevent@0x55564d88af08 size 128 | libevent_malloc: new ptr-libevent@0x55564d88afb8 size 16 | setup callback for interface eth0 192.1.3.204:500 fd 111 | add_fd_read_event_handler: new ethX-pe@0x55564d88aff8 | libevent_malloc: new ptr-libevent@0x55564d88b068 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b118 size 16 | setup callback for interface eth0 192.1.3.205:4500 fd 110 | add_fd_read_event_handler: new ethX-pe@0x55564d88b158 | libevent_malloc: new ptr-libevent@0x55564d88b1c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b278 size 16 | setup callback for interface eth0 192.1.3.205:500 fd 109 | add_fd_read_event_handler: new ethX-pe@0x55564d88b2b8 | libevent_malloc: new ptr-libevent@0x55564d88b328 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b3d8 size 16 | setup callback for interface eth0 192.1.3.206:4500 fd 108 | add_fd_read_event_handler: new ethX-pe@0x55564d88b418 | libevent_malloc: new ptr-libevent@0x55564d88b488 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b538 size 16 | setup callback for interface eth0 192.1.3.206:500 fd 107 | add_fd_read_event_handler: new ethX-pe@0x55564d88b578 | libevent_malloc: new ptr-libevent@0x55564d88b5e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b698 size 16 | setup callback for interface eth0 192.1.3.207:4500 fd 106 | add_fd_read_event_handler: new ethX-pe@0x55564d88b6d8 | libevent_malloc: new ptr-libevent@0x55564d88b748 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b7f8 size 16 | setup callback for interface eth0 192.1.3.207:500 fd 105 | add_fd_read_event_handler: new ethX-pe@0x55564d88b838 | libevent_malloc: new ptr-libevent@0x55564d88b8a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88b958 size 16 | setup callback for interface eth0 192.1.3.208:4500 fd 104 | add_fd_read_event_handler: new ethX-pe@0x55564d88b998 | libevent_malloc: new ptr-libevent@0x55564d88ba08 size 128 | libevent_malloc: new ptr-libevent@0x55564d88bab8 size 16 | setup callback for interface eth0 192.1.3.208:500 fd 103 | add_fd_read_event_handler: new ethX-pe@0x55564d88baf8 | libevent_malloc: new ptr-libevent@0x55564d88bb68 size 128 | libevent_malloc: new ptr-libevent@0x55564d88bc18 size 16 | setup callback for interface eth0 192.1.3.210:4500 fd 102 | add_fd_read_event_handler: new ethX-pe@0x55564d88bc58 | libevent_malloc: new ptr-libevent@0x55564d88bcc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88bd78 size 16 | setup callback for interface eth0 192.1.3.210:500 fd 101 | add_fd_read_event_handler: new ethX-pe@0x55564d88bdb8 | libevent_malloc: new ptr-libevent@0x55564d88be28 size 128 | libevent_malloc: new ptr-libevent@0x55564d88bed8 size 16 | setup callback for interface eth0 192.1.3.211:4500 fd 100 | add_fd_read_event_handler: new ethX-pe@0x55564d88bf18 | libevent_malloc: new ptr-libevent@0x55564d88bf88 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c038 size 16 | setup callback for interface eth0 192.1.3.211:500 fd 99 | add_fd_read_event_handler: new ethX-pe@0x55564d88c078 | libevent_malloc: new ptr-libevent@0x55564d88c0e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c198 size 16 | setup callback for interface eth0 192.1.3.212:4500 fd 98 | add_fd_read_event_handler: new ethX-pe@0x55564d88c1d8 | libevent_malloc: new ptr-libevent@0x55564d88c248 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c2f8 size 16 | setup callback for interface eth0 192.1.3.212:500 fd 97 | add_fd_read_event_handler: new ethX-pe@0x55564d88c338 | libevent_malloc: new ptr-libevent@0x55564d88c3a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c458 size 16 | setup callback for interface eth0 192.1.3.213:4500 fd 96 | add_fd_read_event_handler: new ethX-pe@0x55564d88c498 | libevent_malloc: new ptr-libevent@0x55564d88c508 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c5b8 size 16 | setup callback for interface eth0 192.1.3.213:500 fd 95 | add_fd_read_event_handler: new ethX-pe@0x55564d88c5f8 | libevent_malloc: new ptr-libevent@0x55564d88c668 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c718 size 16 | setup callback for interface eth0 192.1.3.214:4500 fd 94 | add_fd_read_event_handler: new ethX-pe@0x55564d88c758 | libevent_malloc: new ptr-libevent@0x55564d88c7c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c878 size 16 | setup callback for interface eth0 192.1.3.214:500 fd 93 | add_fd_read_event_handler: new ethX-pe@0x55564d88c8b8 | libevent_malloc: new ptr-libevent@0x55564d88c928 size 128 | libevent_malloc: new ptr-libevent@0x55564d88c9d8 size 16 | setup callback for interface eth0 192.1.3.215:4500 fd 92 | add_fd_read_event_handler: new ethX-pe@0x55564d88ca18 | libevent_malloc: new ptr-libevent@0x55564d88ca88 size 128 | libevent_malloc: new ptr-libevent@0x55564d88cb38 size 16 | setup callback for interface eth0 192.1.3.215:500 fd 91 | add_fd_read_event_handler: new ethX-pe@0x55564d88cb78 | libevent_malloc: new ptr-libevent@0x55564d88cbe8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88cc98 size 16 | setup callback for interface eth0 192.1.3.216:4500 fd 90 | add_fd_read_event_handler: new ethX-pe@0x55564d88ccd8 | libevent_malloc: new ptr-libevent@0x55564d88cd48 size 128 | libevent_malloc: new ptr-libevent@0x55564d88cdf8 size 16 | setup callback for interface eth0 192.1.3.216:500 fd 89 | add_fd_read_event_handler: new ethX-pe@0x55564d88ce38 | libevent_malloc: new ptr-libevent@0x55564d88cea8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88cf58 size 16 | setup callback for interface eth0 192.1.3.217:4500 fd 88 | add_fd_read_event_handler: new ethX-pe@0x55564d88cf98 | libevent_malloc: new ptr-libevent@0x55564d88d008 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d0b8 size 16 | setup callback for interface eth0 192.1.3.217:500 fd 87 | add_fd_read_event_handler: new ethX-pe@0x55564d88d0f8 | libevent_malloc: new ptr-libevent@0x55564d88d168 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d218 size 16 | setup callback for interface eth0 192.1.3.218:4500 fd 86 | add_fd_read_event_handler: new ethX-pe@0x55564d88d258 | libevent_malloc: new ptr-libevent@0x55564d88d2c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d378 size 16 | setup callback for interface eth0 192.1.3.218:500 fd 85 | add_fd_read_event_handler: new ethX-pe@0x55564d88d3b8 | libevent_malloc: new ptr-libevent@0x55564d88d428 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d4d8 size 16 | setup callback for interface eth0 192.1.3.219:4500 fd 84 | add_fd_read_event_handler: new ethX-pe@0x55564d88d518 | libevent_malloc: new ptr-libevent@0x55564d88d588 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d638 size 16 | setup callback for interface eth0 192.1.3.219:500 fd 83 | add_fd_read_event_handler: new ethX-pe@0x55564d88d678 | libevent_malloc: new ptr-libevent@0x55564d88d6e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d798 size 16 | setup callback for interface eth0 192.1.3.220:4500 fd 82 | add_fd_read_event_handler: new ethX-pe@0x55564d88d7d8 | libevent_malloc: new ptr-libevent@0x55564d88d848 size 128 | libevent_malloc: new ptr-libevent@0x55564d88d8f8 size 16 | setup callback for interface eth0 192.1.3.220:500 fd 81 | add_fd_read_event_handler: new ethX-pe@0x55564d88d938 | libevent_malloc: new ptr-libevent@0x55564d88d9a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88da58 size 16 | setup callback for interface eth0 192.1.3.221:4500 fd 80 | add_fd_read_event_handler: new ethX-pe@0x55564d88da98 | libevent_malloc: new ptr-libevent@0x55564d88db08 size 128 | libevent_malloc: new ptr-libevent@0x55564d88dbb8 size 16 | setup callback for interface eth0 192.1.3.221:500 fd 79 | add_fd_read_event_handler: new ethX-pe@0x55564d88dbf8 | libevent_malloc: new ptr-libevent@0x55564d88dc68 size 128 | libevent_malloc: new ptr-libevent@0x55564d88dd18 size 16 | setup callback for interface eth0 192.1.3.222:4500 fd 78 | add_fd_read_event_handler: new ethX-pe@0x55564d88dd58 | libevent_malloc: new ptr-libevent@0x55564d88ddc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88de78 size 16 | setup callback for interface eth0 192.1.3.222:500 fd 77 | add_fd_read_event_handler: new ethX-pe@0x55564d88deb8 | libevent_malloc: new ptr-libevent@0x55564d88df28 size 128 | libevent_malloc: new ptr-libevent@0x55564d88dfd8 size 16 | setup callback for interface eth0 192.1.3.223:4500 fd 76 | add_fd_read_event_handler: new ethX-pe@0x55564d88e018 | libevent_malloc: new ptr-libevent@0x55564d88e088 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e138 size 16 | setup callback for interface eth0 192.1.3.223:500 fd 75 | add_fd_read_event_handler: new ethX-pe@0x55564d88e178 | libevent_malloc: new ptr-libevent@0x55564d88e1e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e298 size 16 | setup callback for interface eth0 192.1.3.224:4500 fd 74 | add_fd_read_event_handler: new ethX-pe@0x55564d88e2d8 | libevent_malloc: new ptr-libevent@0x55564d88e348 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e3f8 size 16 | setup callback for interface eth0 192.1.3.224:500 fd 73 | add_fd_read_event_handler: new ethX-pe@0x55564d88e438 | libevent_malloc: new ptr-libevent@0x55564d88e4a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e558 size 16 | setup callback for interface eth0 192.1.3.225:4500 fd 72 | add_fd_read_event_handler: new ethX-pe@0x55564d88e598 | libevent_malloc: new ptr-libevent@0x55564d88e608 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e6b8 size 16 | setup callback for interface eth0 192.1.3.225:500 fd 71 | add_fd_read_event_handler: new ethX-pe@0x55564d88e6f8 | libevent_malloc: new ptr-libevent@0x55564d88e768 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e818 size 16 | setup callback for interface eth0 192.1.3.226:4500 fd 70 | add_fd_read_event_handler: new ethX-pe@0x55564d88e858 | libevent_malloc: new ptr-libevent@0x55564d88e8c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88e978 size 16 | setup callback for interface eth0 192.1.3.226:500 fd 69 | add_fd_read_event_handler: new ethX-pe@0x55564d88e9b8 | libevent_malloc: new ptr-libevent@0x55564d88ea28 size 128 | libevent_malloc: new ptr-libevent@0x55564d88ead8 size 16 | setup callback for interface eth0 192.1.3.227:4500 fd 68 | add_fd_read_event_handler: new ethX-pe@0x55564d88eb18 | libevent_malloc: new ptr-libevent@0x55564d88eb88 size 128 | libevent_malloc: new ptr-libevent@0x55564d88ec38 size 16 | setup callback for interface eth0 192.1.3.227:500 fd 67 | add_fd_read_event_handler: new ethX-pe@0x55564d88ec78 | libevent_malloc: new ptr-libevent@0x55564d88ece8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88ed98 size 16 | setup callback for interface eth0 192.1.3.228:4500 fd 66 | add_fd_read_event_handler: new ethX-pe@0x55564d88edd8 | libevent_malloc: new ptr-libevent@0x55564d88ee48 size 128 | libevent_malloc: new ptr-libevent@0x55564d88eef8 size 16 | setup callback for interface eth0 192.1.3.228:500 fd 65 | add_fd_read_event_handler: new ethX-pe@0x55564d88ef38 | libevent_malloc: new ptr-libevent@0x55564d88efa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f058 size 16 | setup callback for interface eth0 192.1.3.229:4500 fd 64 | add_fd_read_event_handler: new ethX-pe@0x55564d88f098 | libevent_malloc: new ptr-libevent@0x55564d88f108 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f1b8 size 16 | setup callback for interface eth0 192.1.3.229:500 fd 63 | add_fd_read_event_handler: new ethX-pe@0x55564d88f1f8 | libevent_malloc: new ptr-libevent@0x55564d88f268 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f318 size 16 | setup callback for interface eth0 192.1.3.230:4500 fd 62 | add_fd_read_event_handler: new ethX-pe@0x55564d88f358 | libevent_malloc: new ptr-libevent@0x55564d88f3c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f478 size 16 | setup callback for interface eth0 192.1.3.230:500 fd 61 | add_fd_read_event_handler: new ethX-pe@0x55564d88f4b8 | libevent_malloc: new ptr-libevent@0x55564d88f528 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f5d8 size 16 | setup callback for interface eth0 192.1.3.231:4500 fd 60 | add_fd_read_event_handler: new ethX-pe@0x55564d88f618 | libevent_malloc: new ptr-libevent@0x55564d88f688 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f738 size 16 | setup callback for interface eth0 192.1.3.231:500 fd 59 | add_fd_read_event_handler: new ethX-pe@0x55564d88f778 | libevent_malloc: new ptr-libevent@0x55564d88f7e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f898 size 16 | setup callback for interface eth0 192.1.3.232:4500 fd 58 | add_fd_read_event_handler: new ethX-pe@0x55564d88f8d8 | libevent_malloc: new ptr-libevent@0x55564d88f948 size 128 | libevent_malloc: new ptr-libevent@0x55564d88f9f8 size 16 | setup callback for interface eth0 192.1.3.232:500 fd 57 | add_fd_read_event_handler: new ethX-pe@0x55564d88fa38 | libevent_malloc: new ptr-libevent@0x55564d88faa8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88fb58 size 16 | setup callback for interface eth0 192.1.3.233:4500 fd 56 | add_fd_read_event_handler: new ethX-pe@0x55564d88fb98 | libevent_malloc: new ptr-libevent@0x55564d88fc08 size 128 | libevent_malloc: new ptr-libevent@0x55564d88fcb8 size 16 | setup callback for interface eth0 192.1.3.233:500 fd 55 | add_fd_read_event_handler: new ethX-pe@0x55564d88fcf8 | libevent_malloc: new ptr-libevent@0x55564d88fd68 size 128 | libevent_malloc: new ptr-libevent@0x55564d88fe18 size 16 | setup callback for interface eth0 192.1.3.234:4500 fd 54 | add_fd_read_event_handler: new ethX-pe@0x55564d88fe58 | libevent_malloc: new ptr-libevent@0x55564d88fec8 size 128 | libevent_malloc: new ptr-libevent@0x55564d88ff78 size 16 | setup callback for interface eth0 192.1.3.234:500 fd 53 | add_fd_read_event_handler: new ethX-pe@0x55564d88ffb8 | libevent_malloc: new ptr-libevent@0x55564d890028 size 128 | libevent_malloc: new ptr-libevent@0x55564d8900d8 size 16 | setup callback for interface eth0 192.1.3.235:4500 fd 52 | add_fd_read_event_handler: new ethX-pe@0x55564d890118 | libevent_malloc: new ptr-libevent@0x55564d890188 size 128 | libevent_malloc: new ptr-libevent@0x55564d890238 size 16 | setup callback for interface eth0 192.1.3.235:500 fd 51 | add_fd_read_event_handler: new ethX-pe@0x55564d890278 | libevent_malloc: new ptr-libevent@0x55564d8902e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d890398 size 16 | setup callback for interface eth0 192.1.3.236:4500 fd 50 | add_fd_read_event_handler: new ethX-pe@0x55564d8903d8 | libevent_malloc: new ptr-libevent@0x55564d890448 size 128 | libevent_malloc: new ptr-libevent@0x55564d8904f8 size 16 | setup callback for interface eth0 192.1.3.236:500 fd 49 | add_fd_read_event_handler: new ethX-pe@0x55564d890538 | libevent_malloc: new ptr-libevent@0x55564d8905a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d890658 size 16 | setup callback for interface eth0 192.1.3.237:4500 fd 48 | add_fd_read_event_handler: new ethX-pe@0x55564d890698 | libevent_malloc: new ptr-libevent@0x55564d890708 size 128 | libevent_malloc: new ptr-libevent@0x55564d8907b8 size 16 | setup callback for interface eth0 192.1.3.237:500 fd 47 | add_fd_read_event_handler: new ethX-pe@0x55564d8907f8 | libevent_malloc: new ptr-libevent@0x55564d890868 size 128 | libevent_malloc: new ptr-libevent@0x55564d890918 size 16 | setup callback for interface eth0 192.1.3.238:4500 fd 46 | add_fd_read_event_handler: new ethX-pe@0x55564d890958 | libevent_malloc: new ptr-libevent@0x55564d8909c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d890a78 size 16 | setup callback for interface eth0 192.1.3.238:500 fd 45 | add_fd_read_event_handler: new ethX-pe@0x55564d890ab8 | libevent_malloc: new ptr-libevent@0x55564d890b28 size 128 | libevent_malloc: new ptr-libevent@0x55564d890bd8 size 16 | setup callback for interface eth0 192.1.3.239:4500 fd 44 | add_fd_read_event_handler: new ethX-pe@0x55564d890c18 | libevent_malloc: new ptr-libevent@0x55564d890c88 size 128 | libevent_malloc: new ptr-libevent@0x55564d890d38 size 16 | setup callback for interface eth0 192.1.3.239:500 fd 43 | add_fd_read_event_handler: new ethX-pe@0x55564d890d78 | libevent_malloc: new ptr-libevent@0x55564d890de8 size 128 | libevent_malloc: new ptr-libevent@0x55564d890e98 size 16 | setup callback for interface eth0 192.1.3.240:4500 fd 42 | add_fd_read_event_handler: new ethX-pe@0x55564d890ed8 | libevent_malloc: new ptr-libevent@0x55564d890f48 size 128 | libevent_malloc: new ptr-libevent@0x55564d890ff8 size 16 | setup callback for interface eth0 192.1.3.240:500 fd 41 | add_fd_read_event_handler: new ethX-pe@0x55564d891038 | libevent_malloc: new ptr-libevent@0x55564d8910a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d891158 size 16 | setup callback for interface eth0 192.1.3.241:4500 fd 40 | add_fd_read_event_handler: new ethX-pe@0x55564d891198 | libevent_malloc: new ptr-libevent@0x55564d891208 size 128 | libevent_malloc: new ptr-libevent@0x55564d8912b8 size 16 | setup callback for interface eth0 192.1.3.241:500 fd 39 | add_fd_read_event_handler: new ethX-pe@0x55564d8912f8 | libevent_malloc: new ptr-libevent@0x55564d891368 size 128 | libevent_malloc: new ptr-libevent@0x55564d891418 size 16 | setup callback for interface eth0 192.1.3.242:4500 fd 38 | add_fd_read_event_handler: new ethX-pe@0x55564d891458 | libevent_malloc: new ptr-libevent@0x55564d8914c8 size 128 | libevent_malloc: new ptr-libevent@0x55564d891578 size 16 | setup callback for interface eth0 192.1.3.242:500 fd 37 | add_fd_read_event_handler: new ethX-pe@0x55564d8915b8 | libevent_malloc: new ptr-libevent@0x55564d891628 size 128 | libevent_malloc: new ptr-libevent@0x55564d8916d8 size 16 | setup callback for interface eth0 192.1.3.243:4500 fd 36 | add_fd_read_event_handler: new ethX-pe@0x55564d891718 | libevent_malloc: new ptr-libevent@0x55564d891788 size 128 | libevent_malloc: new ptr-libevent@0x55564d891838 size 16 | setup callback for interface eth0 192.1.3.243:500 fd 35 | add_fd_read_event_handler: new ethX-pe@0x55564d891878 | libevent_malloc: new ptr-libevent@0x55564d8918e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d891998 size 16 | setup callback for interface eth0 192.1.3.244:4500 fd 34 | add_fd_read_event_handler: new ethX-pe@0x55564d8919d8 | libevent_malloc: new ptr-libevent@0x55564d891a48 size 128 | libevent_malloc: new ptr-libevent@0x55564d891af8 size 16 | setup callback for interface eth0 192.1.3.244:500 fd 33 | add_fd_read_event_handler: new ethX-pe@0x55564d891b38 | libevent_malloc: new ptr-libevent@0x55564d891ba8 size 128 | libevent_malloc: new ptr-libevent@0x55564d891c58 size 16 | setup callback for interface eth0 192.1.3.245:4500 fd 32 | add_fd_read_event_handler: new ethX-pe@0x55564d891c98 | libevent_malloc: new ptr-libevent@0x55564d891d08 size 128 | libevent_malloc: new ptr-libevent@0x55564d891db8 size 16 | setup callback for interface eth0 192.1.3.245:500 fd 31 | add_fd_read_event_handler: new ethX-pe@0x55564d891df8 | libevent_malloc: new ptr-libevent@0x55564d891e68 size 128 | libevent_malloc: new ptr-libevent@0x55564d891f18 size 16 | setup callback for interface eth0 192.1.3.246:4500 fd 30 | add_fd_read_event_handler: new ethX-pe@0x55564d891f58 | libevent_malloc: new ptr-libevent@0x55564d891fc8 size 128 | libevent_malloc: new ptr-libevent@0x55564d892078 size 16 | setup callback for interface eth0 192.1.3.246:500 fd 29 | add_fd_read_event_handler: new ethX-pe@0x55564d8920b8 | libevent_malloc: new ptr-libevent@0x55564d892128 size 128 | libevent_malloc: new ptr-libevent@0x55564d8921d8 size 16 | setup callback for interface eth0 192.1.3.247:4500 fd 28 | add_fd_read_event_handler: new ethX-pe@0x55564d892218 | libevent_malloc: new ptr-libevent@0x55564d892288 size 128 | libevent_malloc: new ptr-libevent@0x55564d892338 size 16 | setup callback for interface eth0 192.1.3.247:500 fd 27 | add_fd_read_event_handler: new ethX-pe@0x55564d892378 | libevent_malloc: new ptr-libevent@0x55564d8923e8 size 128 | libevent_malloc: new ptr-libevent@0x55564d892498 size 16 | setup callback for interface eth0 192.1.3.248:4500 fd 26 | add_fd_read_event_handler: new ethX-pe@0x55564d8924d8 | libevent_malloc: new ptr-libevent@0x55564d892548 size 128 | libevent_malloc: new ptr-libevent@0x55564d8925f8 size 16 | setup callback for interface eth0 192.1.3.248:500 fd 25 | add_fd_read_event_handler: new ethX-pe@0x55564d892638 | libevent_malloc: new ptr-libevent@0x55564d8926a8 size 128 | libevent_malloc: new ptr-libevent@0x55564d892758 size 16 | setup callback for interface eth0 192.1.3.249:4500 fd 24 | add_fd_read_event_handler: new ethX-pe@0x55564d892798 | libevent_malloc: new ptr-libevent@0x55564d892808 size 128 | libevent_malloc: new ptr-libevent@0x55564d8928b8 size 16 | setup callback for interface eth0 192.1.3.249:500 fd 23 | add_fd_read_event_handler: new ethX-pe@0x55564d8928f8 | libevent_malloc: new ptr-libevent@0x55564d892968 size 128 | libevent_malloc: new ptr-libevent@0x55564d892a18 size 16 | setup callback for interface eth0 192.1.3.250:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x55564d892a58 | libevent_malloc: new ptr-libevent@0x55564d892ac8 size 128 | libevent_malloc: new ptr-libevent@0x55564d892b78 size 16 | setup callback for interface eth0 192.1.3.250:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x55564d892bb8 | libevent_malloc: new ptr-libevent@0x55564d892c28 size 128 | libevent_malloc: new ptr-libevent@0x55564d892cd8 size 16 | setup callback for interface eth0 192.1.3.251:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x55564d892d18 | libevent_malloc: new ptr-libevent@0x55564d892d88 size 128 | libevent_malloc: new ptr-libevent@0x55564d892e38 size 16 | setup callback for interface eth0 192.1.3.251:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x55564d892e78 | libevent_malloc: new ptr-libevent@0x55564d892ee8 size 128 | libevent_malloc: new ptr-libevent@0x55564d892f98 size 16 | setup callback for interface eth0 192.1.3.252:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x55564d892fd8 | libevent_malloc: new ptr-libevent@0x55564d893048 size 128 | libevent_malloc: new ptr-libevent@0x55564d8930f8 size 16 | setup callback for interface eth0 192.1.3.252:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | Processing PSK at line 1: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 22.8 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-base with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for (none) is 15 | counting wild cards for @east is 0 | based upon policy, the connection is a template. added connection description "road-eastnet-nonat-base" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.2.23<192.1.2.23>[@east]...0.0.0.0---%any | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.143 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-1 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.1 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.1:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d894f68 added connection description "road-eastnet-nonat-1" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.1<192.1.3.1>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.133 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-2 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.2 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.2:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d895e88 added connection description "road-eastnet-nonat-2" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.2<192.1.3.2>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.135 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-3 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.3 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.3:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d896da8 added connection description "road-eastnet-nonat-3" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.3<192.1.3.3>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-4 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.4 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.4:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d897cc8 added connection description "road-eastnet-nonat-4" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.4<192.1.3.4>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-5 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.5 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.5:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d898be8 added connection description "road-eastnet-nonat-5" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.5<192.1.3.5>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-6 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.6 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.6:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d899b08 added connection description "road-eastnet-nonat-6" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.6<192.1.3.6>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0809 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-7 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.7 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.7:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d89aa28 added connection description "road-eastnet-nonat-7" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.7<192.1.3.7>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0746 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-8 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.8 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.8:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d89b948 added connection description "road-eastnet-nonat-8" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.8<192.1.3.8>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.105 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-9 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.9 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.9:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d89c868 added connection description "road-eastnet-nonat-9" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.9<192.1.3.9>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0845 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-10 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.10 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.10:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d89d788 added connection description "road-eastnet-nonat-10" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.10<192.1.3.10>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0789 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-11 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.11 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.11:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d89e6a8 added connection description "road-eastnet-nonat-11" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.11<192.1.3.11>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.08 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-12 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.12 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.12:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d89f5c8 added connection description "road-eastnet-nonat-12" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.12<192.1.3.12>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0806 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-13 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.13 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.13:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a04e8 added connection description "road-eastnet-nonat-13" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.13<192.1.3.13>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0782 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-14 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.14 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.14:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a1408 added connection description "road-eastnet-nonat-14" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.14<192.1.3.14>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0821 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-15 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.15 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.15:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a2328 added connection description "road-eastnet-nonat-15" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.15<192.1.3.15>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0796 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-16 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.16 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.16:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a3248 added connection description "road-eastnet-nonat-16" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.16<192.1.3.16>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0781 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-17 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.17 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.17:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a4168 added connection description "road-eastnet-nonat-17" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.17<192.1.3.17>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-18 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.18 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.18:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a5088 added connection description "road-eastnet-nonat-18" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.18<192.1.3.18>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-19 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.19 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.19:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a5fa8 added connection description "road-eastnet-nonat-19" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.19<192.1.3.19>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-20 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.20 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.20:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a6ec8 added connection description "road-eastnet-nonat-20" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.20<192.1.3.20>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-21 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.21 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.21:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a7de8 added connection description "road-eastnet-nonat-21" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.21<192.1.3.21>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-22 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.22 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.22:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a8d08 added connection description "road-eastnet-nonat-22" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.22<192.1.3.22>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-23 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.23 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.23:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8a9c28 added connection description "road-eastnet-nonat-23" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.23<192.1.3.23>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-24 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.24 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.24:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8aab48 added connection description "road-eastnet-nonat-24" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.24<192.1.3.24>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-25 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.25 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.25:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8aba68 added connection description "road-eastnet-nonat-25" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.25<192.1.3.25>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-26 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.26 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.26:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ac988 added connection description "road-eastnet-nonat-26" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.26<192.1.3.26>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-27 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.27 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.27:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ad8a8 added connection description "road-eastnet-nonat-27" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.27<192.1.3.27>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-28 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.28 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.28:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ae7c8 added connection description "road-eastnet-nonat-28" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.28<192.1.3.28>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-29 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.29 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.29:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8af6e8 added connection description "road-eastnet-nonat-29" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.29<192.1.3.29>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-30 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.30 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.30:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b0608 added connection description "road-eastnet-nonat-30" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.30<192.1.3.30>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-31 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.31 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.31:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b1528 added connection description "road-eastnet-nonat-31" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.31<192.1.3.31>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-32 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.32 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.32:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b2448 added connection description "road-eastnet-nonat-32" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.32<192.1.3.32>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-33 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.33 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b3368 added connection description "road-eastnet-nonat-33" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.33<192.1.3.33>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-34 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.34 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.34:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b4288 added connection description "road-eastnet-nonat-34" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.34<192.1.3.34>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.105 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-35 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.35 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.35:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b51a8 added connection description "road-eastnet-nonat-35" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.35<192.1.3.35>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0799 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-36 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.36 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.36:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b60c8 added connection description "road-eastnet-nonat-36" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.36<192.1.3.36>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0751 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-37 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.37 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.37:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b6fe8 added connection description "road-eastnet-nonat-37" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.37<192.1.3.37>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0755 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-38 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.38 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.38:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b7f08 added connection description "road-eastnet-nonat-38" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.38<192.1.3.38>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0721 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-39 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.39 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.39:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b8e28 added connection description "road-eastnet-nonat-39" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.39<192.1.3.39>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-40 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.40 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.40:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8b9d48 added connection description "road-eastnet-nonat-40" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.40<192.1.3.40>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-41 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.41 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.41:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8bac68 added connection description "road-eastnet-nonat-41" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.41<192.1.3.41>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-42 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.42 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.42:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8bbb88 added connection description "road-eastnet-nonat-42" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.42<192.1.3.42>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-43 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.43 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.43:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8bcaa8 added connection description "road-eastnet-nonat-43" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.43<192.1.3.43>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-44 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.44 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.44:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8bd9c8 added connection description "road-eastnet-nonat-44" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.44<192.1.3.44>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-45 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.45 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.45:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8be8e8 added connection description "road-eastnet-nonat-45" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.45<192.1.3.45>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-46 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.46 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.46:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8bf808 added connection description "road-eastnet-nonat-46" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.46<192.1.3.46>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-47 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.47 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.47:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c0728 added connection description "road-eastnet-nonat-47" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.47<192.1.3.47>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-48 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.48 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.48:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c1648 added connection description "road-eastnet-nonat-48" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.48<192.1.3.48>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0765 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-49 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.49 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.49:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c2568 added connection description "road-eastnet-nonat-49" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.49<192.1.3.49>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0778 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-50 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.50 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.50:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c3488 added connection description "road-eastnet-nonat-50" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.50<192.1.3.50>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0799 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-51 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.51 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.51:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c43a8 added connection description "road-eastnet-nonat-51" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.51<192.1.3.51>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.101 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-52 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.52 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.52:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c52c8 added connection description "road-eastnet-nonat-52" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.52<192.1.3.52>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0837 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-53 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.53 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.53:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c61e8 added connection description "road-eastnet-nonat-53" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.53<192.1.3.53>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0832 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-54 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.54 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.54:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c7108 added connection description "road-eastnet-nonat-54" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.54<192.1.3.54>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0744 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-55 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.55 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.55:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c8028 added connection description "road-eastnet-nonat-55" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.55<192.1.3.55>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0734 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-56 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.56 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.56:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c8f48 added connection description "road-eastnet-nonat-56" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.56<192.1.3.56>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0734 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-57 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.57 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.57:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8c9e68 added connection description "road-eastnet-nonat-57" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.57<192.1.3.57>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0734 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-58 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.58 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.58:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8cad88 added connection description "road-eastnet-nonat-58" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.58<192.1.3.58>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0728 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-59 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.59 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.59:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8cbca8 added connection description "road-eastnet-nonat-59" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.59<192.1.3.59>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.193 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-60 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.60 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.60:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ccbc8 added connection description "road-eastnet-nonat-60" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.60<192.1.3.60>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.164 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-61 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.61 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.61:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8cdae8 added connection description "road-eastnet-nonat-61" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.61<192.1.3.61>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.152 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-62 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.62 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.62:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8cea08 added connection description "road-eastnet-nonat-62" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.62<192.1.3.62>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-63 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.63 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.63:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8cf928 added connection description "road-eastnet-nonat-63" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.63<192.1.3.63>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-64 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.64 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.64:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d0848 added connection description "road-eastnet-nonat-64" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.64<192.1.3.64>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-65 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.65 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.65:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d1768 added connection description "road-eastnet-nonat-65" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.65<192.1.3.65>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-66 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.66 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.66:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d2688 added connection description "road-eastnet-nonat-66" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.66<192.1.3.66>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-67 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.67 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.67:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d35a8 added connection description "road-eastnet-nonat-67" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.67<192.1.3.67>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-68 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.68 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.68:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d44c8 added connection description "road-eastnet-nonat-68" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.68<192.1.3.68>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-69 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.69 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.69:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d53e8 added connection description "road-eastnet-nonat-69" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.69<192.1.3.69>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.172 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-70 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.70 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.70:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d6308 added connection description "road-eastnet-nonat-70" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.70<192.1.3.70>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0974 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-71 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.71 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.71:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d7228 added connection description "road-eastnet-nonat-71" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.71<192.1.3.71>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.11 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-72 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.72 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.72:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d8148 added connection description "road-eastnet-nonat-72" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.72<192.1.3.72>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0949 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-73 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.73 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.73:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d9068 added connection description "road-eastnet-nonat-73" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.73<192.1.3.73>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0951 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-74 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.74 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.74:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8d9f88 added connection description "road-eastnet-nonat-74" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.74<192.1.3.74>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0797 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-75 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.75 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.75:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8daea8 added connection description "road-eastnet-nonat-75" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.75<192.1.3.75>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0783 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-76 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.76 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.76:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8dbdc8 added connection description "road-eastnet-nonat-76" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.76<192.1.3.76>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0745 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-77 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.77 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.77:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8dcce8 added connection description "road-eastnet-nonat-77" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.77<192.1.3.77>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0739 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-78 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.78 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.78:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ddc08 added connection description "road-eastnet-nonat-78" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.78<192.1.3.78>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0759 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-79 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.79 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.79:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8deb28 added connection description "road-eastnet-nonat-79" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.79<192.1.3.79>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0788 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-80 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.80 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.80:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8dfa48 added connection description "road-eastnet-nonat-80" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.80<192.1.3.80>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0737 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-81 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.81 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.81:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e0968 added connection description "road-eastnet-nonat-81" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.81<192.1.3.81>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0767 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-82 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.82 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.82:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e1888 added connection description "road-eastnet-nonat-82" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.82<192.1.3.82>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0745 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-83 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.83 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.83:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e27a8 added connection description "road-eastnet-nonat-83" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.83<192.1.3.83>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0735 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-84 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.84 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.84:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e36c8 added connection description "road-eastnet-nonat-84" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.84<192.1.3.84>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0785 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-85 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.85 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.85:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e45e8 added connection description "road-eastnet-nonat-85" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.85<192.1.3.85>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0744 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-86 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.86 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.86:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e5508 added connection description "road-eastnet-nonat-86" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.86<192.1.3.86>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0745 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-87 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.87 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.87:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e6428 added connection description "road-eastnet-nonat-87" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.87<192.1.3.87>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.074 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-88 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.88 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.88:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e7348 added connection description "road-eastnet-nonat-88" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.88<192.1.3.88>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0754 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-89 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.89 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.89:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e8268 added connection description "road-eastnet-nonat-89" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.89<192.1.3.89>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0739 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-90 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.90 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.90:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8e9188 added connection description "road-eastnet-nonat-90" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.90<192.1.3.90>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-91 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.91 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.91:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ea0a8 added connection description "road-eastnet-nonat-91" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.91<192.1.3.91>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-92 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.92 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.92:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8eafc8 added connection description "road-eastnet-nonat-92" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.92<192.1.3.92>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-93 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.93 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.93:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ebee8 added connection description "road-eastnet-nonat-93" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.93<192.1.3.93>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-94 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.94 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.94:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ece08 added connection description "road-eastnet-nonat-94" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.94<192.1.3.94>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-95 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.95 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.95:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8edd28 added connection description "road-eastnet-nonat-95" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.95<192.1.3.95>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-96 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.96 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.96:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8eec48 added connection description "road-eastnet-nonat-96" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.96<192.1.3.96>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-97 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.97 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.97:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8efb68 added connection description "road-eastnet-nonat-97" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.97<192.1.3.97>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.133 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-98 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.98 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.98:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f0a88 added connection description "road-eastnet-nonat-98" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.98<192.1.3.98>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.132 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-99 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.99 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.99:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f19a8 added connection description "road-eastnet-nonat-99" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.99<192.1.3.99>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-100 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.100 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.100:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f28c8 added connection description "road-eastnet-nonat-100" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.100<192.1.3.100>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-101 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.101 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.101:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f37e8 added connection description "road-eastnet-nonat-101" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.101<192.1.3.101>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-102 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.102 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.102:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f4708 added connection description "road-eastnet-nonat-102" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.102<192.1.3.102>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0807 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-103 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.103 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.103:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f5628 added connection description "road-eastnet-nonat-103" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.103<192.1.3.103>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0843 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-104 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.104 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.104:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f6548 added connection description "road-eastnet-nonat-104" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.104<192.1.3.104>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.151 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-105 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.105 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.105:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f7468 added connection description "road-eastnet-nonat-105" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.105<192.1.3.105>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-106 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.106 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.106:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f8388 added connection description "road-eastnet-nonat-106" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.106<192.1.3.106>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.102 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-107 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.107 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.107:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8f92a8 added connection description "road-eastnet-nonat-107" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.107<192.1.3.107>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0882 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-108 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.108 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.108:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8fa1c8 added connection description "road-eastnet-nonat-108" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.108<192.1.3.108>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0881 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-109 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.109 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.109:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8fb0e8 added connection description "road-eastnet-nonat-109" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.109<192.1.3.109>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.102 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-110 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.110 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.110:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8fc008 added connection description "road-eastnet-nonat-110" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.110<192.1.3.110>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.147 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-111 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.111 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.111:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8fcf28 added connection description "road-eastnet-nonat-111" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.111<192.1.3.111>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-112 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.112 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.112:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8fde48 added connection description "road-eastnet-nonat-112" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.112<192.1.3.112>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-113 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.113 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.113:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8fed68 added connection description "road-eastnet-nonat-113" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.113<192.1.3.113>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-114 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.114 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.114:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d8ffc88 added connection description "road-eastnet-nonat-114" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.114<192.1.3.114>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0894 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-115 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.115 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.115:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d900ba8 added connection description "road-eastnet-nonat-115" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.115<192.1.3.115>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0828 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-116 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.116 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.116:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d901ac8 added connection description "road-eastnet-nonat-116" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.116<192.1.3.116>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0801 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-117 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.117 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.117:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9029e8 added connection description "road-eastnet-nonat-117" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.117<192.1.3.117>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0798 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-118 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.118 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.118:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d903908 added connection description "road-eastnet-nonat-118" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.118<192.1.3.118>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0761 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-119 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.119 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.119:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d904828 added connection description "road-eastnet-nonat-119" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.119<192.1.3.119>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0934 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-120 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.120 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.120:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d905748 added connection description "road-eastnet-nonat-120" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.120<192.1.3.120>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0853 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-121 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.121 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.121:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d906668 added connection description "road-eastnet-nonat-121" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.121<192.1.3.121>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0833 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-122 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.122 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.122:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d907588 added connection description "road-eastnet-nonat-122" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.122<192.1.3.122>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0863 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-123 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.123 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.123:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9084a8 added connection description "road-eastnet-nonat-123" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.123<192.1.3.123>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0878 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-124 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.124 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.124:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9093c8 added connection description "road-eastnet-nonat-124" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.124<192.1.3.124>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0842 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-125 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.125 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.125:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90a2e8 added connection description "road-eastnet-nonat-125" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.125<192.1.3.125>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0853 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-126 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.126 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.126:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90b208 added connection description "road-eastnet-nonat-126" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.126<192.1.3.126>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0833 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-127 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.127 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.127:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90c128 added connection description "road-eastnet-nonat-127" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.127<192.1.3.127>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0831 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-128 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.128 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.128:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90d048 added connection description "road-eastnet-nonat-128" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.128<192.1.3.128>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.086 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-129 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.129 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.129:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90df68 added connection description "road-eastnet-nonat-129" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.129<192.1.3.129>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0872 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-130 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.130 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.130:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90ee88 added connection description "road-eastnet-nonat-130" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.130<192.1.3.130>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0815 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-131 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.131 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.131:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d90fda8 added connection description "road-eastnet-nonat-131" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.131<192.1.3.131>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0831 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-132 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.132 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.132:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d910cc8 added connection description "road-eastnet-nonat-132" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.132<192.1.3.132>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.085 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-133 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.133 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.133:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d911be8 added connection description "road-eastnet-nonat-133" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.133<192.1.3.133>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0832 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-134 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.134 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.134:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d912b08 added connection description "road-eastnet-nonat-134" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.134<192.1.3.134>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0831 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-135 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.135 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.135:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d913a28 added connection description "road-eastnet-nonat-135" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.135<192.1.3.135>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0857 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-136 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.136 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.136:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d914948 added connection description "road-eastnet-nonat-136" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.136<192.1.3.136>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0835 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-137 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.137 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.137:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d915868 added connection description "road-eastnet-nonat-137" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.137<192.1.3.137>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0837 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-138 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.138 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.138:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d916788 added connection description "road-eastnet-nonat-138" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.138<192.1.3.138>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0929 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-139 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.139 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.139:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9176a8 added connection description "road-eastnet-nonat-139" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.139<192.1.3.139>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0843 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-140 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.140 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.140:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9185c8 added connection description "road-eastnet-nonat-140" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.140<192.1.3.140>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0863 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-141 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.141 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.141:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9194e8 added connection description "road-eastnet-nonat-141" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.141<192.1.3.141>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0939 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-142 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.142 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.142:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91a408 added connection description "road-eastnet-nonat-142" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.142<192.1.3.142>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0927 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-143 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.143 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.143:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91b328 added connection description "road-eastnet-nonat-143" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.143<192.1.3.143>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0847 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-144 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.144 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.144:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91c248 added connection description "road-eastnet-nonat-144" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.144<192.1.3.144>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0908 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-145 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.145 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.145:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91d168 added connection description "road-eastnet-nonat-145" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.145<192.1.3.145>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0851 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-146 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.146 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.146:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91e088 added connection description "road-eastnet-nonat-146" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.146<192.1.3.146>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0884 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-147 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.147 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.147:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91efa8 added connection description "road-eastnet-nonat-147" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.147<192.1.3.147>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0911 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-148 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.148 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.148:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d91fec8 added connection description "road-eastnet-nonat-148" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.148<192.1.3.148>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0834 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-149 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.149 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.149:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d920de8 added connection description "road-eastnet-nonat-149" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.149<192.1.3.149>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0849 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-150 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.150 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.150:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d921d08 added connection description "road-eastnet-nonat-150" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.150<192.1.3.150>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.085 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-151 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.151 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.151:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d922c28 added connection description "road-eastnet-nonat-151" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.151<192.1.3.151>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0845 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-152 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.152 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.152:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d923b48 added connection description "road-eastnet-nonat-152" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.152<192.1.3.152>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.084 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-153 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.153 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.153:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d924a68 added connection description "road-eastnet-nonat-153" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.153<192.1.3.153>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0844 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-154 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.154 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.154:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d925988 added connection description "road-eastnet-nonat-154" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.154<192.1.3.154>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-155 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.155 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.155:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9268a8 added connection description "road-eastnet-nonat-155" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.155<192.1.3.155>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-156 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.156 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.156:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9277c8 added connection description "road-eastnet-nonat-156" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.156<192.1.3.156>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.1 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-157 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.157 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.157:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9286e8 added connection description "road-eastnet-nonat-157" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.157<192.1.3.157>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-158 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.158 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.158:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d929608 added connection description "road-eastnet-nonat-158" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.158<192.1.3.158>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.165 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-159 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.159 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.159:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92a528 added connection description "road-eastnet-nonat-159" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.159<192.1.3.159>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.151 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-160 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.160 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.160:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92b448 added connection description "road-eastnet-nonat-160" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.160<192.1.3.160>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-161 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.161 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.161:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92c368 added connection description "road-eastnet-nonat-161" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.161<192.1.3.161>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.141 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-162 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.162 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.162:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92d288 added connection description "road-eastnet-nonat-162" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.162<192.1.3.162>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-163 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.163 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.163:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92e1a8 added connection description "road-eastnet-nonat-163" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.163<192.1.3.163>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-164 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.164 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.164:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92f0c8 added connection description "road-eastnet-nonat-164" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.164<192.1.3.164>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-165 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.165 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.165:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d92ffe8 added connection description "road-eastnet-nonat-165" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.165<192.1.3.165>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-166 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.166 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.166:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d930f08 added connection description "road-eastnet-nonat-166" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.166<192.1.3.166>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-167 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.167 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.167:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d931e28 added connection description "road-eastnet-nonat-167" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.167<192.1.3.167>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-168 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.168 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.168:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d932d48 added connection description "road-eastnet-nonat-168" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.168<192.1.3.168>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-169 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.169 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.169:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d933c68 added connection description "road-eastnet-nonat-169" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.169<192.1.3.169>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-170 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.170 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.170:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d934b88 added connection description "road-eastnet-nonat-170" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.170<192.1.3.170>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-171 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.171 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.171:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d935aa8 added connection description "road-eastnet-nonat-171" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.171<192.1.3.171>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-172 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.172 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.172:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9369c8 added connection description "road-eastnet-nonat-172" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.172<192.1.3.172>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-173 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.173 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.173:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9378e8 added connection description "road-eastnet-nonat-173" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.173<192.1.3.173>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-174 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.174 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.174:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d938808 added connection description "road-eastnet-nonat-174" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.174<192.1.3.174>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-175 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.175 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.175:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d939728 added connection description "road-eastnet-nonat-175" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.175<192.1.3.175>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-176 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.176 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.176:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d93a648 added connection description "road-eastnet-nonat-176" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.176<192.1.3.176>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-177 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.177 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.177:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d93b568 added connection description "road-eastnet-nonat-177" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.177<192.1.3.177>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-178 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.178 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.178:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d93c488 added connection description "road-eastnet-nonat-178" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.178<192.1.3.178>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-179 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.179 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.179:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d93d3a8 added connection description "road-eastnet-nonat-179" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.179<192.1.3.179>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-180 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.180 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.180:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d93e2c8 added connection description "road-eastnet-nonat-180" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.180<192.1.3.180>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-181 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.181 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.181:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d93f1e8 added connection description "road-eastnet-nonat-181" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.181<192.1.3.181>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-182 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.182 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.182:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d940108 added connection description "road-eastnet-nonat-182" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.182<192.1.3.182>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-183 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.183 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.183:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d941028 added connection description "road-eastnet-nonat-183" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.183<192.1.3.183>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-184 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.184 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.184:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d941f48 added connection description "road-eastnet-nonat-184" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.184<192.1.3.184>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-185 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.185 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.185:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d942e68 added connection description "road-eastnet-nonat-185" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.185<192.1.3.185>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.134 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-186 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.186 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.186:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d943d88 added connection description "road-eastnet-nonat-186" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.186<192.1.3.186>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-187 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.187 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.187:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d944ca8 added connection description "road-eastnet-nonat-187" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.187<192.1.3.187>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-188 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.188 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.188:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d945bc8 added connection description "road-eastnet-nonat-188" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.188<192.1.3.188>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.139 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-189 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.189 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.189:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d946ae8 added connection description "road-eastnet-nonat-189" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.189<192.1.3.189>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.137 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-190 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.190 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.190:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d947a08 added connection description "road-eastnet-nonat-190" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.190<192.1.3.190>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-191 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.191 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.191:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d948928 added connection description "road-eastnet-nonat-191" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.191<192.1.3.191>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.132 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-192 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.192 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.192:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d949848 added connection description "road-eastnet-nonat-192" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.192<192.1.3.192>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-193 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.193 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.193:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d94a768 added connection description "road-eastnet-nonat-193" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.193<192.1.3.193>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.151 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-194 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.194 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.194:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d94b688 added connection description "road-eastnet-nonat-194" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.194<192.1.3.194>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.135 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-195 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.195 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.195:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d94c5a8 added connection description "road-eastnet-nonat-195" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.195<192.1.3.195>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-196 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.196 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.196:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d94d4c8 added connection description "road-eastnet-nonat-196" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.196<192.1.3.196>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-197 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.197 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.197:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d94e3e8 added connection description "road-eastnet-nonat-197" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.197<192.1.3.197>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-198 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.198 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.198:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d94f308 added connection description "road-eastnet-nonat-198" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.198<192.1.3.198>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-199 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.199 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.199:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d950228 added connection description "road-eastnet-nonat-199" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.199<192.1.3.199>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-200 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.200 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.200:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d951148 added connection description "road-eastnet-nonat-200" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.200<192.1.3.200>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-201 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.201 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.201:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d952068 added connection description "road-eastnet-nonat-201" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.201<192.1.3.201>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-202 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.202 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.202:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d952f88 added connection description "road-eastnet-nonat-202" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.202<192.1.3.202>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-203 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.203 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.203:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d953ea8 added connection description "road-eastnet-nonat-203" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.203<192.1.3.203>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-204 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.204 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.204:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d954dc8 added connection description "road-eastnet-nonat-204" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.204<192.1.3.204>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-205 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.205 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.205:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d955ce8 added connection description "road-eastnet-nonat-205" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.205<192.1.3.205>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-206 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.206 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.206:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d956c08 added connection description "road-eastnet-nonat-206" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.206<192.1.3.206>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-207 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.207 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.207:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d957b28 added connection description "road-eastnet-nonat-207" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.207<192.1.3.207>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-208 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.208 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.208:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d958a48 added connection description "road-eastnet-nonat-208" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.208<192.1.3.208>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-209 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.209 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d959968 added connection description "road-eastnet-nonat-209" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.209<192.1.3.209>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-210 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.210 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.210:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d95a888 added connection description "road-eastnet-nonat-210" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.210<192.1.3.210>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-211 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.211 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.211:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d95b7a8 added connection description "road-eastnet-nonat-211" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.211<192.1.3.211>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-212 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.212 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.212:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d95c6c8 added connection description "road-eastnet-nonat-212" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.212<192.1.3.212>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-213 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.213 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.213:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d95d5e8 added connection description "road-eastnet-nonat-213" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.213<192.1.3.213>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-214 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.214 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.214:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d95e508 added connection description "road-eastnet-nonat-214" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.214<192.1.3.214>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-215 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.215 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.215:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d95f428 added connection description "road-eastnet-nonat-215" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.215<192.1.3.215>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-216 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.216 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.216:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d960348 added connection description "road-eastnet-nonat-216" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.216<192.1.3.216>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-217 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.217 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.217:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d961268 added connection description "road-eastnet-nonat-217" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.217<192.1.3.217>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-218 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.218 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.218:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d962188 added connection description "road-eastnet-nonat-218" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.218<192.1.3.218>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-219 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.219 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.219:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9630a8 added connection description "road-eastnet-nonat-219" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.219<192.1.3.219>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-220 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.220 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.220:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d963fc8 added connection description "road-eastnet-nonat-220" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.220<192.1.3.220>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-221 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.221 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.221:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d964ee8 added connection description "road-eastnet-nonat-221" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.221<192.1.3.221>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-222 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.222 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.222:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d965e08 added connection description "road-eastnet-nonat-222" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.222<192.1.3.222>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-223 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.223 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.223:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d966d28 added connection description "road-eastnet-nonat-223" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.223<192.1.3.223>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-224 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.224 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.224:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d967c48 added connection description "road-eastnet-nonat-224" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.224<192.1.3.224>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-225 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.225 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.225:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d968b68 added connection description "road-eastnet-nonat-225" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.225<192.1.3.225>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-226 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.226 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.226:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d969a88 added connection description "road-eastnet-nonat-226" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.226<192.1.3.226>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-227 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.227 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.227:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d96a9a8 added connection description "road-eastnet-nonat-227" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.227<192.1.3.227>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-228 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.228 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.228:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d96b8c8 added connection description "road-eastnet-nonat-228" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.228<192.1.3.228>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-229 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.229 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.229:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d96c7e8 added connection description "road-eastnet-nonat-229" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.229<192.1.3.229>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-230 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.230 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.230:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d96d708 added connection description "road-eastnet-nonat-230" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.230<192.1.3.230>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-231 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.231 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.231:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d96e628 added connection description "road-eastnet-nonat-231" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.231<192.1.3.231>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-232 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.232 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.232:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d96f548 added connection description "road-eastnet-nonat-232" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.232<192.1.3.232>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-233 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.233 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.233:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d970468 added connection description "road-eastnet-nonat-233" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.233<192.1.3.233>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-234 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.234 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.234:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d971388 added connection description "road-eastnet-nonat-234" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.234<192.1.3.234>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-235 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.235 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.235:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9722a8 added connection description "road-eastnet-nonat-235" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.235<192.1.3.235>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-236 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.236 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.236:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9731c8 added connection description "road-eastnet-nonat-236" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.236<192.1.3.236>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.142 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-237 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.237 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.237:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9740e8 added connection description "road-eastnet-nonat-237" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.237<192.1.3.237>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-238 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.238 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.238:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d975008 added connection description "road-eastnet-nonat-238" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.238<192.1.3.238>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-239 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.239 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.239:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d975f28 added connection description "road-eastnet-nonat-239" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.239<192.1.3.239>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-240 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.240 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.240:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d976e48 added connection description "road-eastnet-nonat-240" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.240<192.1.3.240>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-241 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.241 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.241:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d977d68 added connection description "road-eastnet-nonat-241" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.241<192.1.3.241>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-242 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.242 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.242:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d978c88 added connection description "road-eastnet-nonat-242" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.242<192.1.3.242>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0909 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-243 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.243 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.243:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d979ba8 added connection description "road-eastnet-nonat-243" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.243<192.1.3.243>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0981 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-244 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.244 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.244:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d97aac8 added connection description "road-eastnet-nonat-244" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.244<192.1.3.244>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.132 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-245 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.245 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.245:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d97b9e8 added connection description "road-eastnet-nonat-245" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.245<192.1.3.245>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.136 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-246 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.246 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.246:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d97c908 added connection description "road-eastnet-nonat-246" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.246<192.1.3.246>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.142 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-247 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.247 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.247:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d97d828 added connection description "road-eastnet-nonat-247" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.247<192.1.3.247>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.143 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-248 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.248 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.248:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d97e748 added connection description "road-eastnet-nonat-248" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.248<192.1.3.248>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.139 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-249 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.249 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.249:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d97f668 added connection description "road-eastnet-nonat-249" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.249<192.1.3.249>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.135 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-250 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.250 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.250:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d980588 added connection description "road-eastnet-nonat-250" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.250<192.1.3.250>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.137 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-251 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.251 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.251:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9814a8 added connection description "road-eastnet-nonat-251" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.251<192.1.3.251>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.148 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-252 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.252 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.252:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x55564d9823c8 added connection description "road-eastnet-nonat-252" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.252<192.1.3.252>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.15 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | Inspecting interface eth0 | found eth0 with address 192.1.3.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.2 | Inspecting interface eth0 | found eth0 with address 192.1.3.3 | Inspecting interface eth0 | found eth0 with address 192.1.3.4 | Inspecting interface eth0 | found eth0 with address 192.1.3.5 | Inspecting interface eth0 | found eth0 with address 192.1.3.6 | Inspecting interface eth0 | found eth0 with address 192.1.3.7 | Inspecting interface eth0 | found eth0 with address 192.1.3.8 | Inspecting interface eth0 | found eth0 with address 192.1.3.9 | Inspecting interface eth0 | found eth0 with address 192.1.3.10 | Inspecting interface eth0 | found eth0 with address 192.1.3.11 | Inspecting interface eth0 | found eth0 with address 192.1.3.12 | Inspecting interface eth0 | found eth0 with address 192.1.3.13 | Inspecting interface eth0 | found eth0 with address 192.1.3.14 | Inspecting interface eth0 | found eth0 with address 192.1.3.15 | Inspecting interface eth0 | found eth0 with address 192.1.3.16 | Inspecting interface eth0 | found eth0 with address 192.1.3.17 | Inspecting interface eth0 | found eth0 with address 192.1.3.18 | Inspecting interface eth0 | found eth0 with address 192.1.3.19 | Inspecting interface eth0 | found eth0 with address 192.1.3.20 | Inspecting interface eth0 | found eth0 with address 192.1.3.21 | Inspecting interface eth0 | found eth0 with address 192.1.3.22 | Inspecting interface eth0 | found eth0 with address 192.1.3.23 | Inspecting interface eth0 | found eth0 with address 192.1.3.24 | Inspecting interface eth0 | found eth0 with address 192.1.3.25 | Inspecting interface eth0 | found eth0 with address 192.1.3.26 | Inspecting interface eth0 | found eth0 with address 192.1.3.27 | Inspecting interface eth0 | found eth0 with address 192.1.3.28 | Inspecting interface eth0 | found eth0 with address 192.1.3.29 | Inspecting interface eth0 | found eth0 with address 192.1.3.30 | Inspecting interface eth0 | found eth0 with address 192.1.3.31 | Inspecting interface eth0 | found eth0 with address 192.1.3.32 | Inspecting interface eth0 | found eth0 with address 192.1.3.33 | Inspecting interface eth0 | found eth0 with address 192.1.3.34 | Inspecting interface eth0 | found eth0 with address 192.1.3.35 | Inspecting interface eth0 | found eth0 with address 192.1.3.36 | Inspecting interface eth0 | found eth0 with address 192.1.3.37 | Inspecting interface eth0 | found eth0 with address 192.1.3.38 | Inspecting interface eth0 | found eth0 with address 192.1.3.39 | Inspecting interface eth0 | found eth0 with address 192.1.3.40 | Inspecting interface eth0 | found eth0 with address 192.1.3.41 | Inspecting interface eth0 | found eth0 with address 192.1.3.42 | Inspecting interface eth0 | found eth0 with address 192.1.3.43 | Inspecting interface eth0 | found eth0 with address 192.1.3.44 | Inspecting interface eth0 | found eth0 with address 192.1.3.45 | Inspecting interface eth0 | found eth0 with address 192.1.3.46 | Inspecting interface eth0 | found eth0 with address 192.1.3.47 | Inspecting interface eth0 | found eth0 with address 192.1.3.48 | Inspecting interface eth0 | found eth0 with address 192.1.3.49 | Inspecting interface eth0 | found eth0 with address 192.1.3.50 | Inspecting interface eth0 | found eth0 with address 192.1.3.51 | Inspecting interface eth0 | found eth0 with address 192.1.3.52 | Inspecting interface eth0 | found eth0 with address 192.1.3.53 | Inspecting interface eth0 | found eth0 with address 192.1.3.54 | Inspecting interface eth0 | found eth0 with address 192.1.3.55 | Inspecting interface eth0 | found eth0 with address 192.1.3.56 | Inspecting interface eth0 | found eth0 with address 192.1.3.57 | Inspecting interface eth0 | found eth0 with address 192.1.3.58 | Inspecting interface eth0 | found eth0 with address 192.1.3.59 | Inspecting interface eth0 | found eth0 with address 192.1.3.60 | Inspecting interface eth0 | found eth0 with address 192.1.3.61 | Inspecting interface eth0 | found eth0 with address 192.1.3.62 | Inspecting interface eth0 | found eth0 with address 192.1.3.63 | Inspecting interface eth0 | found eth0 with address 192.1.3.64 | Inspecting interface eth0 | found eth0 with address 192.1.3.65 | Inspecting interface eth0 | found eth0 with address 192.1.3.66 | Inspecting interface eth0 | found eth0 with address 192.1.3.67 | Inspecting interface eth0 | found eth0 with address 192.1.3.68 | Inspecting interface eth0 | found eth0 with address 192.1.3.69 | Inspecting interface eth0 | found eth0 with address 192.1.3.70 | Inspecting interface eth0 | found eth0 with address 192.1.3.71 | Inspecting interface eth0 | found eth0 with address 192.1.3.72 | Inspecting interface eth0 | found eth0 with address 192.1.3.73 | Inspecting interface eth0 | found eth0 with address 192.1.3.74 | Inspecting interface eth0 | found eth0 with address 192.1.3.75 | Inspecting interface eth0 | found eth0 with address 192.1.3.76 | Inspecting interface eth0 | found eth0 with address 192.1.3.77 | Inspecting interface eth0 | found eth0 with address 192.1.3.78 | Inspecting interface eth0 | found eth0 with address 192.1.3.79 | Inspecting interface eth0 | found eth0 with address 192.1.3.80 | Inspecting interface eth0 | found eth0 with address 192.1.3.81 | Inspecting interface eth0 | found eth0 with address 192.1.3.82 | Inspecting interface eth0 | found eth0 with address 192.1.3.83 | Inspecting interface eth0 | found eth0 with address 192.1.3.84 | Inspecting interface eth0 | found eth0 with address 192.1.3.85 | Inspecting interface eth0 | found eth0 with address 192.1.3.86 | Inspecting interface eth0 | found eth0 with address 192.1.3.87 | Inspecting interface eth0 | found eth0 with address 192.1.3.88 | Inspecting interface eth0 | found eth0 with address 192.1.3.89 | Inspecting interface eth0 | found eth0 with address 192.1.3.90 | Inspecting interface eth0 | found eth0 with address 192.1.3.91 | Inspecting interface eth0 | found eth0 with address 192.1.3.92 | Inspecting interface eth0 | found eth0 with address 192.1.3.93 | Inspecting interface eth0 | found eth0 with address 192.1.3.94 | Inspecting interface eth0 | found eth0 with address 192.1.3.95 | Inspecting interface eth0 | found eth0 with address 192.1.3.96 | Inspecting interface eth0 | found eth0 with address 192.1.3.97 | Inspecting interface eth0 | found eth0 with address 192.1.3.98 | Inspecting interface eth0 | found eth0 with address 192.1.3.99 | Inspecting interface eth0 | found eth0 with address 192.1.3.100 | Inspecting interface eth0 | found eth0 with address 192.1.3.101 | Inspecting interface eth0 | found eth0 with address 192.1.3.102 | Inspecting interface eth0 | found eth0 with address 192.1.3.103 | Inspecting interface eth0 | found eth0 with address 192.1.3.104 | Inspecting interface eth0 | found eth0 with address 192.1.3.105 | Inspecting interface eth0 | found eth0 with address 192.1.3.106 | Inspecting interface eth0 | found eth0 with address 192.1.3.107 | Inspecting interface eth0 | found eth0 with address 192.1.3.108 | Inspecting interface eth0 | found eth0 with address 192.1.3.109 | Inspecting interface eth0 | found eth0 with address 192.1.3.110 | Inspecting interface eth0 | found eth0 with address 192.1.3.111 | Inspecting interface eth0 | found eth0 with address 192.1.3.112 | Inspecting interface eth0 | found eth0 with address 192.1.3.113 | Inspecting interface eth0 | found eth0 with address 192.1.3.114 | Inspecting interface eth0 | found eth0 with address 192.1.3.115 | Inspecting interface eth0 | found eth0 with address 192.1.3.116 | Inspecting interface eth0 | found eth0 with address 192.1.3.117 | Inspecting interface eth0 | found eth0 with address 192.1.3.118 | Inspecting interface eth0 | found eth0 with address 192.1.3.119 | Inspecting interface eth0 | found eth0 with address 192.1.3.120 | Inspecting interface eth0 | found eth0 with address 192.1.3.121 | Inspecting interface eth0 | found eth0 with address 192.1.3.122 | Inspecting interface eth0 | found eth0 with address 192.1.3.123 | Inspecting interface eth0 | found eth0 with address 192.1.3.124 | Inspecting interface eth0 | found eth0 with address 192.1.3.125 | Inspecting interface eth0 | found eth0 with address 192.1.3.126 | Inspecting interface eth0 | found eth0 with address 192.1.3.127 | Inspecting interface eth0 | found eth0 with address 192.1.3.128 | Inspecting interface eth0 | found eth0 with address 192.1.3.129 | Inspecting interface eth0 | found eth0 with address 192.1.3.130 | Inspecting interface eth0 | found eth0 with address 192.1.3.131 | Inspecting interface eth0 | found eth0 with address 192.1.3.132 | Inspecting interface eth0 | found eth0 with address 192.1.3.133 | Inspecting interface eth0 | found eth0 with address 192.1.3.134 | Inspecting interface eth0 | found eth0 with address 192.1.3.135 | Inspecting interface eth0 | found eth0 with address 192.1.3.136 | Inspecting interface eth0 | found eth0 with address 192.1.3.137 | Inspecting interface eth0 | found eth0 with address 192.1.3.138 | Inspecting interface eth0 | found eth0 with address 192.1.3.139 | Inspecting interface eth0 | found eth0 with address 192.1.3.140 | Inspecting interface eth0 | found eth0 with address 192.1.3.141 | Inspecting interface eth0 | found eth0 with address 192.1.3.142 | Inspecting interface eth0 | found eth0 with address 192.1.3.143 | Inspecting interface eth0 | found eth0 with address 192.1.3.144 | Inspecting interface eth0 | found eth0 with address 192.1.3.145 | Inspecting interface eth0 | found eth0 with address 192.1.3.146 | Inspecting interface eth0 | found eth0 with address 192.1.3.147 | Inspecting interface eth0 | found eth0 with address 192.1.3.148 | Inspecting interface eth0 | found eth0 with address 192.1.3.149 | Inspecting interface eth0 | found eth0 with address 192.1.3.150 | Inspecting interface eth0 | found eth0 with address 192.1.3.151 | Inspecting interface eth0 | found eth0 with address 192.1.3.152 | Inspecting interface eth0 | found eth0 with address 192.1.3.153 | Inspecting interface eth0 | found eth0 with address 192.1.3.154 | Inspecting interface eth0 | found eth0 with address 192.1.3.155 | Inspecting interface eth0 | found eth0 with address 192.1.3.156 | Inspecting interface eth0 | found eth0 with address 192.1.3.157 | Inspecting interface eth0 | found eth0 with address 192.1.3.158 | Inspecting interface eth0 | found eth0 with address 192.1.3.159 | Inspecting interface eth0 | found eth0 with address 192.1.3.160 | Inspecting interface eth0 | found eth0 with address 192.1.3.161 | Inspecting interface eth0 | found eth0 with address 192.1.3.162 | Inspecting interface eth0 | found eth0 with address 192.1.3.163 | Inspecting interface eth0 | found eth0 with address 192.1.3.164 | Inspecting interface eth0 | found eth0 with address 192.1.3.165 | Inspecting interface eth0 | found eth0 with address 192.1.3.166 | Inspecting interface eth0 | found eth0 with address 192.1.3.167 | Inspecting interface eth0 | found eth0 with address 192.1.3.168 | Inspecting interface eth0 | found eth0 with address 192.1.3.169 | Inspecting interface eth0 | found eth0 with address 192.1.3.170 | Inspecting interface eth0 | found eth0 with address 192.1.3.171 | Inspecting interface eth0 | found eth0 with address 192.1.3.172 | Inspecting interface eth0 | found eth0 with address 192.1.3.173 | Inspecting interface eth0 | found eth0 with address 192.1.3.174 | Inspecting interface eth0 | found eth0 with address 192.1.3.175 | Inspecting interface eth0 | found eth0 with address 192.1.3.176 | Inspecting interface eth0 | found eth0 with address 192.1.3.177 | Inspecting interface eth0 | found eth0 with address 192.1.3.178 | Inspecting interface eth0 | found eth0 with address 192.1.3.179 | Inspecting interface eth0 | found eth0 with address 192.1.3.180 | Inspecting interface eth0 | found eth0 with address 192.1.3.181 | Inspecting interface eth0 | found eth0 with address 192.1.3.182 | Inspecting interface eth0 | found eth0 with address 192.1.3.183 | Inspecting interface eth0 | found eth0 with address 192.1.3.184 | Inspecting interface eth0 | found eth0 with address 192.1.3.185 | Inspecting interface eth0 | found eth0 with address 192.1.3.186 | Inspecting interface eth0 | found eth0 with address 192.1.3.187 | Inspecting interface eth0 | found eth0 with address 192.1.3.188 | Inspecting interface eth0 | found eth0 with address 192.1.3.189 | Inspecting interface eth0 | found eth0 with address 192.1.3.190 | Inspecting interface eth0 | found eth0 with address 192.1.3.191 | Inspecting interface eth0 | found eth0 with address 192.1.3.192 | Inspecting interface eth0 | found eth0 with address 192.1.3.193 | Inspecting interface eth0 | found eth0 with address 192.1.3.194 | Inspecting interface eth0 | found eth0 with address 192.1.3.195 | Inspecting interface eth0 | found eth0 with address 192.1.3.196 | Inspecting interface eth0 | found eth0 with address 192.1.3.197 | Inspecting interface eth0 | found eth0 with address 192.1.3.198 | Inspecting interface eth0 | found eth0 with address 192.1.3.199 | Inspecting interface eth0 | found eth0 with address 192.1.3.200 | Inspecting interface eth0 | found eth0 with address 192.1.3.201 | Inspecting interface eth0 | found eth0 with address 192.1.3.202 | Inspecting interface eth0 | found eth0 with address 192.1.3.203 | Inspecting interface eth0 | found eth0 with address 192.1.3.204 | Inspecting interface eth0 | found eth0 with address 192.1.3.205 | Inspecting interface eth0 | found eth0 with address 192.1.3.206 | Inspecting interface eth0 | found eth0 with address 192.1.3.207 | Inspecting interface eth0 | found eth0 with address 192.1.3.208 | Inspecting interface eth0 | found eth0 with address 192.1.3.210 | Inspecting interface eth0 | found eth0 with address 192.1.3.211 | Inspecting interface eth0 | found eth0 with address 192.1.3.212 | Inspecting interface eth0 | found eth0 with address 192.1.3.213 | Inspecting interface eth0 | found eth0 with address 192.1.3.214 | Inspecting interface eth0 | found eth0 with address 192.1.3.215 | Inspecting interface eth0 | found eth0 with address 192.1.3.216 | Inspecting interface eth0 | found eth0 with address 192.1.3.217 | Inspecting interface eth0 | found eth0 with address 192.1.3.218 | Inspecting interface eth0 | found eth0 with address 192.1.3.219 | Inspecting interface eth0 | found eth0 with address 192.1.3.220 | Inspecting interface eth0 | found eth0 with address 192.1.3.221 | Inspecting interface eth0 | found eth0 with address 192.1.3.222 | Inspecting interface eth0 | found eth0 with address 192.1.3.223 | Inspecting interface eth0 | found eth0 with address 192.1.3.224 | Inspecting interface eth0 | found eth0 with address 192.1.3.225 | Inspecting interface eth0 | found eth0 with address 192.1.3.226 | Inspecting interface eth0 | found eth0 with address 192.1.3.227 | Inspecting interface eth0 | found eth0 with address 192.1.3.228 | Inspecting interface eth0 | found eth0 with address 192.1.3.229 | Inspecting interface eth0 | found eth0 with address 192.1.3.230 | Inspecting interface eth0 | found eth0 with address 192.1.3.231 | Inspecting interface eth0 | found eth0 with address 192.1.3.232 | Inspecting interface eth0 | found eth0 with address 192.1.3.233 | Inspecting interface eth0 | found eth0 with address 192.1.3.234 | Inspecting interface eth0 | found eth0 with address 192.1.3.235 | Inspecting interface eth0 | found eth0 with address 192.1.3.236 | Inspecting interface eth0 | found eth0 with address 192.1.3.237 | Inspecting interface eth0 | found eth0 with address 192.1.3.238 | Inspecting interface eth0 | found eth0 with address 192.1.3.239 | Inspecting interface eth0 | found eth0 with address 192.1.3.240 | Inspecting interface eth0 | found eth0 with address 192.1.3.241 | Inspecting interface eth0 | found eth0 with address 192.1.3.242 | Inspecting interface eth0 | found eth0 with address 192.1.3.243 | Inspecting interface eth0 | found eth0 with address 192.1.3.244 | Inspecting interface eth0 | found eth0 with address 192.1.3.245 | Inspecting interface eth0 | found eth0 with address 192.1.3.246 | Inspecting interface eth0 | found eth0 with address 192.1.3.247 | Inspecting interface eth0 | found eth0 with address 192.1.3.248 | Inspecting interface eth0 | found eth0 with address 192.1.3.249 | Inspecting interface eth0 | found eth0 with address 192.1.3.250 | Inspecting interface eth0 | found eth0 with address 192.1.3.251 | Inspecting interface eth0 | found eth0 with address 192.1.3.252 | no interfaces to sort | libevent_free: release ptr-libevent@0x55564d83e2f8 | free_event_entry: release EVENT_NULL-pe@0x55564d86d858 | add_fd_read_event_handler: new ethX-pe@0x55564d86d858 | libevent_malloc: new ptr-libevent@0x55564d83e2f8 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 522 | libevent_free: release ptr-libevent@0x55564d7ff388 | free_event_entry: release EVENT_NULL-pe@0x55564d754128 | add_fd_read_event_handler: new ethX-pe@0x55564d9824a8 | libevent_malloc: new ptr-libevent@0x55564d7ff388 size 128 | setup callback for interface lo 127.0.0.1:500 fd 521 | libevent_free: release ptr-libevent@0x55564d7fe748 | free_event_entry: release EVENT_NULL-pe@0x55564d849df8 | add_fd_read_event_handler: new ethX-pe@0x55564d849df8 | libevent_malloc: new ptr-libevent@0x55564d7fe748 size 128 | setup callback for interface eth0 192.1.3.209:4500 fd 520 | libevent_free: release ptr-libevent@0x55564d7fd378 | free_event_entry: release EVENT_NULL-pe@0x55564d849ea8 | add_fd_read_event_handler: new ethX-pe@0x55564d849ea8 | libevent_malloc: new ptr-libevent@0x55564d7fd378 size 128 | setup callback for interface eth0 192.1.3.209:500 fd 519 | libevent_free: release ptr-libevent@0x55564d7fd478 | free_event_entry: release EVENT_NULL-pe@0x55564d849f58 | add_fd_read_event_handler: new ethX-pe@0x55564d849f58 | libevent_malloc: new ptr-libevent@0x55564d7fd478 size 128 | setup callback for interface eth0 192.1.3.1:4500 fd 518 | libevent_free: release ptr-libevent@0x55564d7fd578 | free_event_entry: release EVENT_NULL-pe@0x55564d84a008 | add_fd_read_event_handler: new ethX-pe@0x55564d84a008 | libevent_malloc: new ptr-libevent@0x55564d7fd578 size 128 | setup callback for interface eth0 192.1.3.1:500 fd 517 | libevent_free: release ptr-libevent@0x55564d84a128 | free_event_entry: release EVENT_NULL-pe@0x55564d84a0b8 | add_fd_read_event_handler: new ethX-pe@0x55564d84a0b8 | libevent_malloc: new ptr-libevent@0x55564d84a128 size 128 | setup callback for interface eth0 192.1.3.2:4500 fd 516 | libevent_free: release ptr-libevent@0x55564d84a288 | free_event_entry: release EVENT_NULL-pe@0x55564d84a218 | add_fd_read_event_handler: new ethX-pe@0x55564d84a218 | libevent_malloc: new ptr-libevent@0x55564d84a288 size 128 | setup callback for interface eth0 192.1.3.2:500 fd 515 | libevent_free: release ptr-libevent@0x55564d84a3e8 | free_event_entry: release EVENT_NULL-pe@0x55564d84a378 | add_fd_read_event_handler: new ethX-pe@0x55564d84a378 | libevent_malloc: new ptr-libevent@0x55564d84a3e8 size 128 | setup callback for interface eth0 192.1.3.3:4500 fd 514 | libevent_free: release ptr-libevent@0x55564d84a548 | free_event_entry: release EVENT_NULL-pe@0x55564d84a4d8 | add_fd_read_event_handler: new ethX-pe@0x55564d84a4d8 | libevent_malloc: new ptr-libevent@0x55564d84a548 size 128 | setup callback for interface eth0 192.1.3.3:500 fd 513 | libevent_free: release ptr-libevent@0x55564d84f368 | free_event_entry: release EVENT_NULL-pe@0x55564d84f2f8 | add_fd_read_event_handler: new ethX-pe@0x55564d84f2f8 | libevent_malloc: new ptr-libevent@0x55564d84f368 size 128 | setup callback for interface eth0 192.1.3.4:4500 fd 512 | libevent_free: release ptr-libevent@0x55564d84f4c8 | free_event_entry: release EVENT_NULL-pe@0x55564d84f458 | add_fd_read_event_handler: new ethX-pe@0x55564d84f458 | libevent_malloc: new ptr-libevent@0x55564d84f4c8 size 128 | setup callback for interface eth0 192.1.3.4:500 fd 511 | libevent_free: release ptr-libevent@0x55564d84f628 | free_event_entry: release EVENT_NULL-pe@0x55564d84f5b8 | add_fd_read_event_handler: new ethX-pe@0x55564d84f5b8 | libevent_malloc: new ptr-libevent@0x55564d84f628 size 128 | setup callback for interface eth0 192.1.3.5:4500 fd 510 | libevent_free: release ptr-libevent@0x55564d84f788 | free_event_entry: release EVENT_NULL-pe@0x55564d84f718 | add_fd_read_event_handler: new ethX-pe@0x55564d84f718 | libevent_malloc: new ptr-libevent@0x55564d84f788 size 128 | setup callback for interface eth0 192.1.3.5:500 fd 509 | libevent_free: release ptr-libevent@0x55564d84f8e8 | free_event_entry: release EVENT_NULL-pe@0x55564d84f878 | add_fd_read_event_handler: new ethX-pe@0x55564d84f878 | libevent_malloc: new ptr-libevent@0x55564d84f8e8 size 128 | setup callback for interface eth0 192.1.3.6:4500 fd 508 | libevent_free: release ptr-libevent@0x55564d84fa48 | free_event_entry: release EVENT_NULL-pe@0x55564d84f9d8 | add_fd_read_event_handler: new ethX-pe@0x55564d84f9d8 | libevent_malloc: new ptr-libevent@0x55564d84fa48 size 128 | setup callback for interface eth0 192.1.3.6:500 fd 507 | libevent_free: release ptr-libevent@0x55564d84fba8 | free_event_entry: release EVENT_NULL-pe@0x55564d84fb38 | add_fd_read_event_handler: new ethX-pe@0x55564d84fb38 | libevent_malloc: new ptr-libevent@0x55564d84fba8 size 128 | setup callback for interface eth0 192.1.3.7:4500 fd 506 | libevent_free: release ptr-libevent@0x55564d84fd08 | free_event_entry: release EVENT_NULL-pe@0x55564d84fc98 | add_fd_read_event_handler: new ethX-pe@0x55564d84fc98 | libevent_malloc: new ptr-libevent@0x55564d84fd08 size 128 | setup callback for interface eth0 192.1.3.7:500 fd 505 | libevent_free: release ptr-libevent@0x55564d84fe68 | free_event_entry: release EVENT_NULL-pe@0x55564d84fdf8 | add_fd_read_event_handler: new ethX-pe@0x55564d84fdf8 | libevent_malloc: new ptr-libevent@0x55564d84fe68 size 128 | setup callback for interface eth0 192.1.3.8:4500 fd 504 | libevent_free: release ptr-libevent@0x55564d84ffc8 | free_event_entry: release EVENT_NULL-pe@0x55564d84ff58 | add_fd_read_event_handler: new ethX-pe@0x55564d84ff58 | libevent_malloc: new ptr-libevent@0x55564d84ffc8 size 128 | setup callback for interface eth0 192.1.3.8:500 fd 503 | libevent_free: release ptr-libevent@0x55564d850128 | free_event_entry: release EVENT_NULL-pe@0x55564d8500b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8500b8 | libevent_malloc: new ptr-libevent@0x55564d850128 size 128 | setup callback for interface eth0 192.1.3.9:4500 fd 502 | libevent_free: release ptr-libevent@0x55564d850288 | free_event_entry: release EVENT_NULL-pe@0x55564d850218 | add_fd_read_event_handler: new ethX-pe@0x55564d850218 | libevent_malloc: new ptr-libevent@0x55564d850288 size 128 | setup callback for interface eth0 192.1.3.9:500 fd 501 | libevent_free: release ptr-libevent@0x55564d8503e8 | free_event_entry: release EVENT_NULL-pe@0x55564d850378 | add_fd_read_event_handler: new ethX-pe@0x55564d850378 | libevent_malloc: new ptr-libevent@0x55564d8503e8 size 128 | setup callback for interface eth0 192.1.3.10:4500 fd 500 | libevent_free: release ptr-libevent@0x55564d850548 | free_event_entry: release EVENT_NULL-pe@0x55564d8504d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8504d8 | libevent_malloc: new ptr-libevent@0x55564d850548 size 128 | setup callback for interface eth0 192.1.3.10:500 fd 499 | libevent_free: release ptr-libevent@0x55564d8506a8 | free_event_entry: release EVENT_NULL-pe@0x55564d850638 | add_fd_read_event_handler: new ethX-pe@0x55564d850638 | libevent_malloc: new ptr-libevent@0x55564d8506a8 size 128 | setup callback for interface eth0 192.1.3.11:4500 fd 498 | libevent_free: release ptr-libevent@0x55564d850808 | free_event_entry: release EVENT_NULL-pe@0x55564d850798 | add_fd_read_event_handler: new ethX-pe@0x55564d850798 | libevent_malloc: new ptr-libevent@0x55564d850808 size 128 | setup callback for interface eth0 192.1.3.11:500 fd 497 | libevent_free: release ptr-libevent@0x55564d850968 | free_event_entry: release EVENT_NULL-pe@0x55564d8508f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8508f8 | libevent_malloc: new ptr-libevent@0x55564d850968 size 128 | setup callback for interface eth0 192.1.3.12:4500 fd 496 | libevent_free: release ptr-libevent@0x55564d850ac8 | free_event_entry: release EVENT_NULL-pe@0x55564d850a58 | add_fd_read_event_handler: new ethX-pe@0x55564d850a58 | libevent_malloc: new ptr-libevent@0x55564d850ac8 size 128 | setup callback for interface eth0 192.1.3.12:500 fd 495 | libevent_free: release ptr-libevent@0x55564d850c28 | free_event_entry: release EVENT_NULL-pe@0x55564d850bb8 | add_fd_read_event_handler: new ethX-pe@0x55564d850bb8 | libevent_malloc: new ptr-libevent@0x55564d850c28 size 128 | setup callback for interface eth0 192.1.3.13:4500 fd 494 | libevent_free: release ptr-libevent@0x55564d850d88 | free_event_entry: release EVENT_NULL-pe@0x55564d850d18 | add_fd_read_event_handler: new ethX-pe@0x55564d850d18 | libevent_malloc: new ptr-libevent@0x55564d850d88 size 128 | setup callback for interface eth0 192.1.3.13:500 fd 493 | libevent_free: release ptr-libevent@0x55564d850ee8 | free_event_entry: release EVENT_NULL-pe@0x55564d850e78 | add_fd_read_event_handler: new ethX-pe@0x55564d850e78 | libevent_malloc: new ptr-libevent@0x55564d850ee8 size 128 | setup callback for interface eth0 192.1.3.14:4500 fd 492 | libevent_free: release ptr-libevent@0x55564d851048 | free_event_entry: release EVENT_NULL-pe@0x55564d850fd8 | add_fd_read_event_handler: new ethX-pe@0x55564d850fd8 | libevent_malloc: new ptr-libevent@0x55564d851048 size 128 | setup callback for interface eth0 192.1.3.14:500 fd 491 | libevent_free: release ptr-libevent@0x55564d8511a8 | free_event_entry: release EVENT_NULL-pe@0x55564d851138 | add_fd_read_event_handler: new ethX-pe@0x55564d851138 | libevent_malloc: new ptr-libevent@0x55564d8511a8 size 128 | setup callback for interface eth0 192.1.3.15:4500 fd 490 | libevent_free: release ptr-libevent@0x55564d851308 | free_event_entry: release EVENT_NULL-pe@0x55564d851298 | add_fd_read_event_handler: new ethX-pe@0x55564d851298 | libevent_malloc: new ptr-libevent@0x55564d851308 size 128 | setup callback for interface eth0 192.1.3.15:500 fd 489 | libevent_free: release ptr-libevent@0x55564d851468 | free_event_entry: release EVENT_NULL-pe@0x55564d8513f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8513f8 | libevent_malloc: new ptr-libevent@0x55564d851468 size 128 | setup callback for interface eth0 192.1.3.16:4500 fd 488 | libevent_free: release ptr-libevent@0x55564d8515c8 | free_event_entry: release EVENT_NULL-pe@0x55564d851558 | add_fd_read_event_handler: new ethX-pe@0x55564d851558 | libevent_malloc: new ptr-libevent@0x55564d8515c8 size 128 | setup callback for interface eth0 192.1.3.16:500 fd 487 | libevent_free: release ptr-libevent@0x55564d851728 | free_event_entry: release EVENT_NULL-pe@0x55564d8516b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8516b8 | libevent_malloc: new ptr-libevent@0x55564d851728 size 128 | setup callback for interface eth0 192.1.3.17:4500 fd 486 | libevent_free: release ptr-libevent@0x55564d851888 | free_event_entry: release EVENT_NULL-pe@0x55564d851818 | add_fd_read_event_handler: new ethX-pe@0x55564d851818 | libevent_malloc: new ptr-libevent@0x55564d851888 size 128 | setup callback for interface eth0 192.1.3.17:500 fd 485 | libevent_free: release ptr-libevent@0x55564d8519e8 | free_event_entry: release EVENT_NULL-pe@0x55564d851978 | add_fd_read_event_handler: new ethX-pe@0x55564d851978 | libevent_malloc: new ptr-libevent@0x55564d8519e8 size 128 | setup callback for interface eth0 192.1.3.18:4500 fd 484 | libevent_free: release ptr-libevent@0x55564d851b48 | free_event_entry: release EVENT_NULL-pe@0x55564d851ad8 | add_fd_read_event_handler: new ethX-pe@0x55564d851ad8 | libevent_malloc: new ptr-libevent@0x55564d851b48 size 128 | setup callback for interface eth0 192.1.3.18:500 fd 483 | libevent_free: release ptr-libevent@0x55564d851ca8 | free_event_entry: release EVENT_NULL-pe@0x55564d851c38 | add_fd_read_event_handler: new ethX-pe@0x55564d851c38 | libevent_malloc: new ptr-libevent@0x55564d851ca8 size 128 | setup callback for interface eth0 192.1.3.19:4500 fd 482 | libevent_free: release ptr-libevent@0x55564d851e08 | free_event_entry: release EVENT_NULL-pe@0x55564d851d98 | add_fd_read_event_handler: new ethX-pe@0x55564d851d98 | libevent_malloc: new ptr-libevent@0x55564d851e08 size 128 | setup callback for interface eth0 192.1.3.19:500 fd 481 | libevent_free: release ptr-libevent@0x55564d851f68 | free_event_entry: release EVENT_NULL-pe@0x55564d851ef8 | add_fd_read_event_handler: new ethX-pe@0x55564d851ef8 | libevent_malloc: new ptr-libevent@0x55564d851f68 size 128 | setup callback for interface eth0 192.1.3.20:4500 fd 480 | libevent_free: release ptr-libevent@0x55564d8520c8 | free_event_entry: release EVENT_NULL-pe@0x55564d852058 | add_fd_read_event_handler: new ethX-pe@0x55564d852058 | libevent_malloc: new ptr-libevent@0x55564d8520c8 size 128 | setup callback for interface eth0 192.1.3.20:500 fd 479 | libevent_free: release ptr-libevent@0x55564d852228 | free_event_entry: release EVENT_NULL-pe@0x55564d8521b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8521b8 | libevent_malloc: new ptr-libevent@0x55564d852228 size 128 | setup callback for interface eth0 192.1.3.21:4500 fd 478 | libevent_free: release ptr-libevent@0x55564d852388 | free_event_entry: release EVENT_NULL-pe@0x55564d852318 | add_fd_read_event_handler: new ethX-pe@0x55564d852318 | libevent_malloc: new ptr-libevent@0x55564d852388 size 128 | setup callback for interface eth0 192.1.3.21:500 fd 477 | libevent_free: release ptr-libevent@0x55564d8524e8 | free_event_entry: release EVENT_NULL-pe@0x55564d852478 | add_fd_read_event_handler: new ethX-pe@0x55564d852478 | libevent_malloc: new ptr-libevent@0x55564d8524e8 size 128 | setup callback for interface eth0 192.1.3.22:4500 fd 476 | libevent_free: release ptr-libevent@0x55564d852648 | free_event_entry: release EVENT_NULL-pe@0x55564d8525d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8525d8 | libevent_malloc: new ptr-libevent@0x55564d852648 size 128 | setup callback for interface eth0 192.1.3.22:500 fd 475 | libevent_free: release ptr-libevent@0x55564d8527a8 | free_event_entry: release EVENT_NULL-pe@0x55564d852738 | add_fd_read_event_handler: new ethX-pe@0x55564d852738 | libevent_malloc: new ptr-libevent@0x55564d8527a8 size 128 | setup callback for interface eth0 192.1.3.23:4500 fd 474 | libevent_free: release ptr-libevent@0x55564d852908 | free_event_entry: release EVENT_NULL-pe@0x55564d852898 | add_fd_read_event_handler: new ethX-pe@0x55564d852898 | libevent_malloc: new ptr-libevent@0x55564d852908 size 128 | setup callback for interface eth0 192.1.3.23:500 fd 473 | libevent_free: release ptr-libevent@0x55564d852a68 | free_event_entry: release EVENT_NULL-pe@0x55564d8529f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8529f8 | libevent_malloc: new ptr-libevent@0x55564d852a68 size 128 | setup callback for interface eth0 192.1.3.24:4500 fd 472 | libevent_free: release ptr-libevent@0x55564d852bc8 | free_event_entry: release EVENT_NULL-pe@0x55564d852b58 | add_fd_read_event_handler: new ethX-pe@0x55564d852b58 | libevent_malloc: new ptr-libevent@0x55564d852bc8 size 128 | setup callback for interface eth0 192.1.3.24:500 fd 471 | libevent_free: release ptr-libevent@0x55564d852d28 | free_event_entry: release EVENT_NULL-pe@0x55564d852cb8 | add_fd_read_event_handler: new ethX-pe@0x55564d852cb8 | libevent_malloc: new ptr-libevent@0x55564d852d28 size 128 | setup callback for interface eth0 192.1.3.25:4500 fd 470 | libevent_free: release ptr-libevent@0x55564d852e88 | free_event_entry: release EVENT_NULL-pe@0x55564d852e18 | add_fd_read_event_handler: new ethX-pe@0x55564d852e18 | libevent_malloc: new ptr-libevent@0x55564d852e88 size 128 | setup callback for interface eth0 192.1.3.25:500 fd 469 | libevent_free: release ptr-libevent@0x55564d852fe8 | free_event_entry: release EVENT_NULL-pe@0x55564d852f78 | add_fd_read_event_handler: new ethX-pe@0x55564d852f78 | libevent_malloc: new ptr-libevent@0x55564d852fe8 size 128 | setup callback for interface eth0 192.1.3.26:4500 fd 468 | libevent_free: release ptr-libevent@0x55564d853148 | free_event_entry: release EVENT_NULL-pe@0x55564d8530d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8530d8 | libevent_malloc: new ptr-libevent@0x55564d853148 size 128 | setup callback for interface eth0 192.1.3.26:500 fd 467 | libevent_free: release ptr-libevent@0x55564d8532a8 | free_event_entry: release EVENT_NULL-pe@0x55564d853238 | add_fd_read_event_handler: new ethX-pe@0x55564d853238 | libevent_malloc: new ptr-libevent@0x55564d8532a8 size 128 | setup callback for interface eth0 192.1.3.27:4500 fd 466 | libevent_free: release ptr-libevent@0x55564d853408 | free_event_entry: release EVENT_NULL-pe@0x55564d853398 | add_fd_read_event_handler: new ethX-pe@0x55564d853398 | libevent_malloc: new ptr-libevent@0x55564d853408 size 128 | setup callback for interface eth0 192.1.3.27:500 fd 465 | libevent_free: release ptr-libevent@0x55564d853568 | free_event_entry: release EVENT_NULL-pe@0x55564d8534f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8534f8 | libevent_malloc: new ptr-libevent@0x55564d853568 size 128 | setup callback for interface eth0 192.1.3.28:4500 fd 464 | libevent_free: release ptr-libevent@0x55564d8536c8 | free_event_entry: release EVENT_NULL-pe@0x55564d853658 | add_fd_read_event_handler: new ethX-pe@0x55564d853658 | libevent_malloc: new ptr-libevent@0x55564d8536c8 size 128 | setup callback for interface eth0 192.1.3.28:500 fd 463 | libevent_free: release ptr-libevent@0x55564d853828 | free_event_entry: release EVENT_NULL-pe@0x55564d8537b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8537b8 | libevent_malloc: new ptr-libevent@0x55564d853828 size 128 | setup callback for interface eth0 192.1.3.29:4500 fd 462 | libevent_free: release ptr-libevent@0x55564d853988 | free_event_entry: release EVENT_NULL-pe@0x55564d853918 | add_fd_read_event_handler: new ethX-pe@0x55564d853918 | libevent_malloc: new ptr-libevent@0x55564d853988 size 128 | setup callback for interface eth0 192.1.3.29:500 fd 461 | libevent_free: release ptr-libevent@0x55564d853ae8 | free_event_entry: release EVENT_NULL-pe@0x55564d853a78 | add_fd_read_event_handler: new ethX-pe@0x55564d853a78 | libevent_malloc: new ptr-libevent@0x55564d853ae8 size 128 | setup callback for interface eth0 192.1.3.30:4500 fd 460 | libevent_free: release ptr-libevent@0x55564d853c48 | free_event_entry: release EVENT_NULL-pe@0x55564d853bd8 | add_fd_read_event_handler: new ethX-pe@0x55564d853bd8 | libevent_malloc: new ptr-libevent@0x55564d853c48 size 128 | setup callback for interface eth0 192.1.3.30:500 fd 459 | libevent_free: release ptr-libevent@0x55564d853da8 | free_event_entry: release EVENT_NULL-pe@0x55564d853d38 | add_fd_read_event_handler: new ethX-pe@0x55564d853d38 | libevent_malloc: new ptr-libevent@0x55564d853da8 size 128 | setup callback for interface eth0 192.1.3.31:4500 fd 458 | libevent_free: release ptr-libevent@0x55564d853f08 | free_event_entry: release EVENT_NULL-pe@0x55564d853e98 | add_fd_read_event_handler: new ethX-pe@0x55564d853e98 | libevent_malloc: new ptr-libevent@0x55564d853f08 size 128 | setup callback for interface eth0 192.1.3.31:500 fd 457 | libevent_free: release ptr-libevent@0x55564d854068 | free_event_entry: release EVENT_NULL-pe@0x55564d853ff8 | add_fd_read_event_handler: new ethX-pe@0x55564d853ff8 | libevent_malloc: new ptr-libevent@0x55564d854068 size 128 | setup callback for interface eth0 192.1.3.32:4500 fd 456 | libevent_free: release ptr-libevent@0x55564d8541c8 | free_event_entry: release EVENT_NULL-pe@0x55564d854158 | add_fd_read_event_handler: new ethX-pe@0x55564d854158 | libevent_malloc: new ptr-libevent@0x55564d8541c8 size 128 | setup callback for interface eth0 192.1.3.32:500 fd 455 | libevent_free: release ptr-libevent@0x55564d854328 | free_event_entry: release EVENT_NULL-pe@0x55564d8542b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8542b8 | libevent_malloc: new ptr-libevent@0x55564d854328 size 128 | setup callback for interface eth0 192.1.3.33:4500 fd 454 | libevent_free: release ptr-libevent@0x55564d86d8c8 | free_event_entry: release EVENT_NULL-pe@0x55564d854418 | add_fd_read_event_handler: new ethX-pe@0x55564d854418 | libevent_malloc: new ptr-libevent@0x55564d86d8c8 size 128 | setup callback for interface eth0 192.1.3.33:500 fd 453 | libevent_free: release ptr-libevent@0x55564d86da28 | free_event_entry: release EVENT_NULL-pe@0x55564d86d9b8 | add_fd_read_event_handler: new ethX-pe@0x55564d86d9b8 | libevent_malloc: new ptr-libevent@0x55564d86da28 size 128 | setup callback for interface eth0 192.1.3.34:4500 fd 452 | libevent_free: release ptr-libevent@0x55564d86db88 | free_event_entry: release EVENT_NULL-pe@0x55564d86db18 | add_fd_read_event_handler: new ethX-pe@0x55564d86db18 | libevent_malloc: new ptr-libevent@0x55564d86db88 size 128 | setup callback for interface eth0 192.1.3.34:500 fd 451 | libevent_free: release ptr-libevent@0x55564d86dce8 | free_event_entry: release EVENT_NULL-pe@0x55564d86dc78 | add_fd_read_event_handler: new ethX-pe@0x55564d86dc78 | libevent_malloc: new ptr-libevent@0x55564d86dce8 size 128 | setup callback for interface eth0 192.1.3.35:4500 fd 450 | libevent_free: release ptr-libevent@0x55564d86de48 | free_event_entry: release EVENT_NULL-pe@0x55564d86ddd8 | add_fd_read_event_handler: new ethX-pe@0x55564d86ddd8 | libevent_malloc: new ptr-libevent@0x55564d86de48 size 128 | setup callback for interface eth0 192.1.3.35:500 fd 449 | libevent_free: release ptr-libevent@0x55564d86dfa8 | free_event_entry: release EVENT_NULL-pe@0x55564d86df38 | add_fd_read_event_handler: new ethX-pe@0x55564d86df38 | libevent_malloc: new ptr-libevent@0x55564d86dfa8 size 128 | setup callback for interface eth0 192.1.3.36:4500 fd 448 | libevent_free: release ptr-libevent@0x55564d86e108 | free_event_entry: release EVENT_NULL-pe@0x55564d86e098 | add_fd_read_event_handler: new ethX-pe@0x55564d86e098 | libevent_malloc: new ptr-libevent@0x55564d86e108 size 128 | setup callback for interface eth0 192.1.3.36:500 fd 447 | libevent_free: release ptr-libevent@0x55564d86e268 | free_event_entry: release EVENT_NULL-pe@0x55564d86e1f8 | add_fd_read_event_handler: new ethX-pe@0x55564d86e1f8 | libevent_malloc: new ptr-libevent@0x55564d86e268 size 128 | setup callback for interface eth0 192.1.3.37:4500 fd 446 | libevent_free: release ptr-libevent@0x55564d86e3c8 | free_event_entry: release EVENT_NULL-pe@0x55564d86e358 | add_fd_read_event_handler: new ethX-pe@0x55564d86e358 | libevent_malloc: new ptr-libevent@0x55564d86e3c8 size 128 | setup callback for interface eth0 192.1.3.37:500 fd 445 | libevent_free: release ptr-libevent@0x55564d86e528 | free_event_entry: release EVENT_NULL-pe@0x55564d86e4b8 | add_fd_read_event_handler: new ethX-pe@0x55564d86e4b8 | libevent_malloc: new ptr-libevent@0x55564d86e528 size 128 | setup callback for interface eth0 192.1.3.38:4500 fd 444 | libevent_free: release ptr-libevent@0x55564d86e688 | free_event_entry: release EVENT_NULL-pe@0x55564d86e618 | add_fd_read_event_handler: new ethX-pe@0x55564d86e618 | libevent_malloc: new ptr-libevent@0x55564d86e688 size 128 | setup callback for interface eth0 192.1.3.38:500 fd 443 | libevent_free: release ptr-libevent@0x55564d86e7e8 | free_event_entry: release EVENT_NULL-pe@0x55564d86e778 | add_fd_read_event_handler: new ethX-pe@0x55564d86e778 | libevent_malloc: new ptr-libevent@0x55564d86e7e8 size 128 | setup callback for interface eth0 192.1.3.39:4500 fd 442 | libevent_free: release ptr-libevent@0x55564d86e948 | free_event_entry: release EVENT_NULL-pe@0x55564d86e8d8 | add_fd_read_event_handler: new ethX-pe@0x55564d86e8d8 | libevent_malloc: new ptr-libevent@0x55564d86e948 size 128 | setup callback for interface eth0 192.1.3.39:500 fd 441 | libevent_free: release ptr-libevent@0x55564d86eaa8 | free_event_entry: release EVENT_NULL-pe@0x55564d86ea38 | add_fd_read_event_handler: new ethX-pe@0x55564d86ea38 | libevent_malloc: new ptr-libevent@0x55564d86eaa8 size 128 | setup callback for interface eth0 192.1.3.40:4500 fd 440 | libevent_free: release ptr-libevent@0x55564d86ec08 | free_event_entry: release EVENT_NULL-pe@0x55564d86eb98 | add_fd_read_event_handler: new ethX-pe@0x55564d86eb98 | libevent_malloc: new ptr-libevent@0x55564d86ec08 size 128 | setup callback for interface eth0 192.1.3.40:500 fd 439 | libevent_free: release ptr-libevent@0x55564d86ed68 | free_event_entry: release EVENT_NULL-pe@0x55564d86ecf8 | add_fd_read_event_handler: new ethX-pe@0x55564d86ecf8 | libevent_malloc: new ptr-libevent@0x55564d86ed68 size 128 | setup callback for interface eth0 192.1.3.41:4500 fd 438 | libevent_free: release ptr-libevent@0x55564d86eec8 | free_event_entry: release EVENT_NULL-pe@0x55564d86ee58 | add_fd_read_event_handler: new ethX-pe@0x55564d86ee58 | libevent_malloc: new ptr-libevent@0x55564d86eec8 size 128 | setup callback for interface eth0 192.1.3.41:500 fd 437 | libevent_free: release ptr-libevent@0x55564d86f028 | free_event_entry: release EVENT_NULL-pe@0x55564d86efb8 | add_fd_read_event_handler: new ethX-pe@0x55564d86efb8 | libevent_malloc: new ptr-libevent@0x55564d86f028 size 128 | setup callback for interface eth0 192.1.3.42:4500 fd 436 | libevent_free: release ptr-libevent@0x55564d86f188 | free_event_entry: release EVENT_NULL-pe@0x55564d86f118 | add_fd_read_event_handler: new ethX-pe@0x55564d86f118 | libevent_malloc: new ptr-libevent@0x55564d86f188 size 128 | setup callback for interface eth0 192.1.3.42:500 fd 435 | libevent_free: release ptr-libevent@0x55564d86f2e8 | free_event_entry: release EVENT_NULL-pe@0x55564d86f278 | add_fd_read_event_handler: new ethX-pe@0x55564d86f278 | libevent_malloc: new ptr-libevent@0x55564d86f2e8 size 128 | setup callback for interface eth0 192.1.3.43:4500 fd 434 | libevent_free: release ptr-libevent@0x55564d86f448 | free_event_entry: release EVENT_NULL-pe@0x55564d86f3d8 | add_fd_read_event_handler: new ethX-pe@0x55564d86f3d8 | libevent_malloc: new ptr-libevent@0x55564d86f448 size 128 | setup callback for interface eth0 192.1.3.43:500 fd 433 | libevent_free: release ptr-libevent@0x55564d86f5a8 | free_event_entry: release EVENT_NULL-pe@0x55564d86f538 | add_fd_read_event_handler: new ethX-pe@0x55564d86f538 | libevent_malloc: new ptr-libevent@0x55564d86f5a8 size 128 | setup callback for interface eth0 192.1.3.44:4500 fd 432 | libevent_free: release ptr-libevent@0x55564d86f708 | free_event_entry: release EVENT_NULL-pe@0x55564d86f698 | add_fd_read_event_handler: new ethX-pe@0x55564d86f698 | libevent_malloc: new ptr-libevent@0x55564d86f708 size 128 | setup callback for interface eth0 192.1.3.44:500 fd 431 | libevent_free: release ptr-libevent@0x55564d86f868 | free_event_entry: release EVENT_NULL-pe@0x55564d86f7f8 | add_fd_read_event_handler: new ethX-pe@0x55564d86f7f8 | libevent_malloc: new ptr-libevent@0x55564d86f868 size 128 | setup callback for interface eth0 192.1.3.45:4500 fd 430 | libevent_free: release ptr-libevent@0x55564d86f9c8 | free_event_entry: release EVENT_NULL-pe@0x55564d86f958 | add_fd_read_event_handler: new ethX-pe@0x55564d86f958 | libevent_malloc: new ptr-libevent@0x55564d86f9c8 size 128 | setup callback for interface eth0 192.1.3.45:500 fd 429 | libevent_free: release ptr-libevent@0x55564d86fb28 | free_event_entry: release EVENT_NULL-pe@0x55564d86fab8 | add_fd_read_event_handler: new ethX-pe@0x55564d86fab8 | libevent_malloc: new ptr-libevent@0x55564d86fb28 size 128 | setup callback for interface eth0 192.1.3.46:4500 fd 428 | libevent_free: release ptr-libevent@0x55564d86fc88 | free_event_entry: release EVENT_NULL-pe@0x55564d86fc18 | add_fd_read_event_handler: new ethX-pe@0x55564d86fc18 | libevent_malloc: new ptr-libevent@0x55564d86fc88 size 128 | setup callback for interface eth0 192.1.3.46:500 fd 427 | libevent_free: release ptr-libevent@0x55564d86fde8 | free_event_entry: release EVENT_NULL-pe@0x55564d86fd78 | add_fd_read_event_handler: new ethX-pe@0x55564d86fd78 | libevent_malloc: new ptr-libevent@0x55564d86fde8 size 128 | setup callback for interface eth0 192.1.3.47:4500 fd 426 | libevent_free: release ptr-libevent@0x55564d86ff48 | free_event_entry: release EVENT_NULL-pe@0x55564d86fed8 | add_fd_read_event_handler: new ethX-pe@0x55564d86fed8 | libevent_malloc: new ptr-libevent@0x55564d86ff48 size 128 | setup callback for interface eth0 192.1.3.47:500 fd 425 | libevent_free: release ptr-libevent@0x55564d8700a8 | free_event_entry: release EVENT_NULL-pe@0x55564d870038 | add_fd_read_event_handler: new ethX-pe@0x55564d870038 | libevent_malloc: new ptr-libevent@0x55564d8700a8 size 128 | setup callback for interface eth0 192.1.3.48:4500 fd 424 | libevent_free: release ptr-libevent@0x55564d870208 | free_event_entry: release EVENT_NULL-pe@0x55564d870198 | add_fd_read_event_handler: new ethX-pe@0x55564d870198 | libevent_malloc: new ptr-libevent@0x55564d870208 size 128 | setup callback for interface eth0 192.1.3.48:500 fd 423 | libevent_free: release ptr-libevent@0x55564d870368 | free_event_entry: release EVENT_NULL-pe@0x55564d8702f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8702f8 | libevent_malloc: new ptr-libevent@0x55564d870368 size 128 | setup callback for interface eth0 192.1.3.49:4500 fd 422 | libevent_free: release ptr-libevent@0x55564d8704c8 | free_event_entry: release EVENT_NULL-pe@0x55564d870458 | add_fd_read_event_handler: new ethX-pe@0x55564d870458 | libevent_malloc: new ptr-libevent@0x55564d8704c8 size 128 | setup callback for interface eth0 192.1.3.49:500 fd 421 | libevent_free: release ptr-libevent@0x55564d870628 | free_event_entry: release EVENT_NULL-pe@0x55564d8705b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8705b8 | libevent_malloc: new ptr-libevent@0x55564d870628 size 128 | setup callback for interface eth0 192.1.3.50:4500 fd 420 | libevent_free: release ptr-libevent@0x55564d870788 | free_event_entry: release EVENT_NULL-pe@0x55564d870718 | add_fd_read_event_handler: new ethX-pe@0x55564d870718 | libevent_malloc: new ptr-libevent@0x55564d870788 size 128 | setup callback for interface eth0 192.1.3.50:500 fd 419 | libevent_free: release ptr-libevent@0x55564d8708e8 | free_event_entry: release EVENT_NULL-pe@0x55564d870878 | add_fd_read_event_handler: new ethX-pe@0x55564d870878 | libevent_malloc: new ptr-libevent@0x55564d8708e8 size 128 | setup callback for interface eth0 192.1.3.51:4500 fd 418 | libevent_free: release ptr-libevent@0x55564d870a48 | free_event_entry: release EVENT_NULL-pe@0x55564d8709d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8709d8 | libevent_malloc: new ptr-libevent@0x55564d870a48 size 128 | setup callback for interface eth0 192.1.3.51:500 fd 417 | libevent_free: release ptr-libevent@0x55564d870ba8 | free_event_entry: release EVENT_NULL-pe@0x55564d870b38 | add_fd_read_event_handler: new ethX-pe@0x55564d870b38 | libevent_malloc: new ptr-libevent@0x55564d870ba8 size 128 | setup callback for interface eth0 192.1.3.52:4500 fd 416 | libevent_free: release ptr-libevent@0x55564d870d08 | free_event_entry: release EVENT_NULL-pe@0x55564d870c98 | add_fd_read_event_handler: new ethX-pe@0x55564d870c98 | libevent_malloc: new ptr-libevent@0x55564d870d08 size 128 | setup callback for interface eth0 192.1.3.52:500 fd 415 | libevent_free: release ptr-libevent@0x55564d870e68 | free_event_entry: release EVENT_NULL-pe@0x55564d870df8 | add_fd_read_event_handler: new ethX-pe@0x55564d870df8 | libevent_malloc: new ptr-libevent@0x55564d870e68 size 128 | setup callback for interface eth0 192.1.3.53:4500 fd 414 | libevent_free: release ptr-libevent@0x55564d870fc8 | free_event_entry: release EVENT_NULL-pe@0x55564d870f58 | add_fd_read_event_handler: new ethX-pe@0x55564d870f58 | libevent_malloc: new ptr-libevent@0x55564d870fc8 size 128 | setup callback for interface eth0 192.1.3.53:500 fd 413 | libevent_free: release ptr-libevent@0x55564d871128 | free_event_entry: release EVENT_NULL-pe@0x55564d8710b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8710b8 | libevent_malloc: new ptr-libevent@0x55564d871128 size 128 | setup callback for interface eth0 192.1.3.54:4500 fd 412 | libevent_free: release ptr-libevent@0x55564d871288 | free_event_entry: release EVENT_NULL-pe@0x55564d871218 | add_fd_read_event_handler: new ethX-pe@0x55564d871218 | libevent_malloc: new ptr-libevent@0x55564d871288 size 128 | setup callback for interface eth0 192.1.3.54:500 fd 411 | libevent_free: release ptr-libevent@0x55564d8713e8 | free_event_entry: release EVENT_NULL-pe@0x55564d871378 | add_fd_read_event_handler: new ethX-pe@0x55564d871378 | libevent_malloc: new ptr-libevent@0x55564d8713e8 size 128 | setup callback for interface eth0 192.1.3.55:4500 fd 410 | libevent_free: release ptr-libevent@0x55564d871548 | free_event_entry: release EVENT_NULL-pe@0x55564d8714d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8714d8 | libevent_malloc: new ptr-libevent@0x55564d871548 size 128 | setup callback for interface eth0 192.1.3.55:500 fd 409 | libevent_free: release ptr-libevent@0x55564d8716a8 | free_event_entry: release EVENT_NULL-pe@0x55564d871638 | add_fd_read_event_handler: new ethX-pe@0x55564d871638 | libevent_malloc: new ptr-libevent@0x55564d8716a8 size 128 | setup callback for interface eth0 192.1.3.56:4500 fd 408 | libevent_free: release ptr-libevent@0x55564d871808 | free_event_entry: release EVENT_NULL-pe@0x55564d871798 | add_fd_read_event_handler: new ethX-pe@0x55564d871798 | libevent_malloc: new ptr-libevent@0x55564d871808 size 128 | setup callback for interface eth0 192.1.3.56:500 fd 407 | libevent_free: release ptr-libevent@0x55564d871968 | free_event_entry: release EVENT_NULL-pe@0x55564d8718f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8718f8 | libevent_malloc: new ptr-libevent@0x55564d871968 size 128 | setup callback for interface eth0 192.1.3.57:4500 fd 406 | libevent_free: release ptr-libevent@0x55564d871ac8 | free_event_entry: release EVENT_NULL-pe@0x55564d871a58 | add_fd_read_event_handler: new ethX-pe@0x55564d871a58 | libevent_malloc: new ptr-libevent@0x55564d871ac8 size 128 | setup callback for interface eth0 192.1.3.57:500 fd 405 | libevent_free: release ptr-libevent@0x55564d871c28 | free_event_entry: release EVENT_NULL-pe@0x55564d871bb8 | add_fd_read_event_handler: new ethX-pe@0x55564d871bb8 | libevent_malloc: new ptr-libevent@0x55564d871c28 size 128 | setup callback for interface eth0 192.1.3.58:4500 fd 404 | libevent_free: release ptr-libevent@0x55564d871d88 | free_event_entry: release EVENT_NULL-pe@0x55564d871d18 | add_fd_read_event_handler: new ethX-pe@0x55564d871d18 | libevent_malloc: new ptr-libevent@0x55564d871d88 size 128 | setup callback for interface eth0 192.1.3.58:500 fd 403 | libevent_free: release ptr-libevent@0x55564d871ee8 | free_event_entry: release EVENT_NULL-pe@0x55564d871e78 | add_fd_read_event_handler: new ethX-pe@0x55564d871e78 | libevent_malloc: new ptr-libevent@0x55564d871ee8 size 128 | setup callback for interface eth0 192.1.3.59:4500 fd 402 | libevent_free: release ptr-libevent@0x55564d872048 | free_event_entry: release EVENT_NULL-pe@0x55564d871fd8 | add_fd_read_event_handler: new ethX-pe@0x55564d871fd8 | libevent_malloc: new ptr-libevent@0x55564d872048 size 128 | setup callback for interface eth0 192.1.3.59:500 fd 401 | libevent_free: release ptr-libevent@0x55564d8721a8 | free_event_entry: release EVENT_NULL-pe@0x55564d872138 | add_fd_read_event_handler: new ethX-pe@0x55564d872138 | libevent_malloc: new ptr-libevent@0x55564d8721a8 size 128 | setup callback for interface eth0 192.1.3.60:4500 fd 400 | libevent_free: release ptr-libevent@0x55564d872308 | free_event_entry: release EVENT_NULL-pe@0x55564d872298 | add_fd_read_event_handler: new ethX-pe@0x55564d872298 | libevent_malloc: new ptr-libevent@0x55564d872308 size 128 | setup callback for interface eth0 192.1.3.60:500 fd 399 | libevent_free: release ptr-libevent@0x55564d872468 | free_event_entry: release EVENT_NULL-pe@0x55564d8723f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8723f8 | libevent_malloc: new ptr-libevent@0x55564d872468 size 128 | setup callback for interface eth0 192.1.3.61:4500 fd 398 | libevent_free: release ptr-libevent@0x55564d8725c8 | free_event_entry: release EVENT_NULL-pe@0x55564d872558 | add_fd_read_event_handler: new ethX-pe@0x55564d872558 | libevent_malloc: new ptr-libevent@0x55564d8725c8 size 128 | setup callback for interface eth0 192.1.3.61:500 fd 397 | libevent_free: release ptr-libevent@0x55564d872728 | free_event_entry: release EVENT_NULL-pe@0x55564d8726b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8726b8 | libevent_malloc: new ptr-libevent@0x55564d872728 size 128 | setup callback for interface eth0 192.1.3.62:4500 fd 396 | libevent_free: release ptr-libevent@0x55564d872888 | free_event_entry: release EVENT_NULL-pe@0x55564d872818 | add_fd_read_event_handler: new ethX-pe@0x55564d872818 | libevent_malloc: new ptr-libevent@0x55564d872888 size 128 | setup callback for interface eth0 192.1.3.62:500 fd 395 | libevent_free: release ptr-libevent@0x55564d8729e8 | free_event_entry: release EVENT_NULL-pe@0x55564d872978 | add_fd_read_event_handler: new ethX-pe@0x55564d872978 | libevent_malloc: new ptr-libevent@0x55564d8729e8 size 128 | setup callback for interface eth0 192.1.3.63:4500 fd 394 | libevent_free: release ptr-libevent@0x55564d872b48 | free_event_entry: release EVENT_NULL-pe@0x55564d872ad8 | add_fd_read_event_handler: new ethX-pe@0x55564d872ad8 | libevent_malloc: new ptr-libevent@0x55564d872b48 size 128 | setup callback for interface eth0 192.1.3.63:500 fd 393 | libevent_free: release ptr-libevent@0x55564d872ca8 | free_event_entry: release EVENT_NULL-pe@0x55564d872c38 | add_fd_read_event_handler: new ethX-pe@0x55564d872c38 | libevent_malloc: new ptr-libevent@0x55564d872ca8 size 128 | setup callback for interface eth0 192.1.3.64:4500 fd 392 | libevent_free: release ptr-libevent@0x55564d872e08 | free_event_entry: release EVENT_NULL-pe@0x55564d872d98 | add_fd_read_event_handler: new ethX-pe@0x55564d872d98 | libevent_malloc: new ptr-libevent@0x55564d872e08 size 128 | setup callback for interface eth0 192.1.3.64:500 fd 391 | libevent_free: release ptr-libevent@0x55564d872f68 | free_event_entry: release EVENT_NULL-pe@0x55564d872ef8 | add_fd_read_event_handler: new ethX-pe@0x55564d872ef8 | libevent_malloc: new ptr-libevent@0x55564d872f68 size 128 | setup callback for interface eth0 192.1.3.65:4500 fd 390 | libevent_free: release ptr-libevent@0x55564d8730c8 | free_event_entry: release EVENT_NULL-pe@0x55564d873058 | add_fd_read_event_handler: new ethX-pe@0x55564d873058 | libevent_malloc: new ptr-libevent@0x55564d8730c8 size 128 | setup callback for interface eth0 192.1.3.65:500 fd 389 | libevent_free: release ptr-libevent@0x55564d873228 | free_event_entry: release EVENT_NULL-pe@0x55564d8731b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8731b8 | libevent_malloc: new ptr-libevent@0x55564d873228 size 128 | setup callback for interface eth0 192.1.3.66:4500 fd 388 | libevent_free: release ptr-libevent@0x55564d873388 | free_event_entry: release EVENT_NULL-pe@0x55564d873318 | add_fd_read_event_handler: new ethX-pe@0x55564d873318 | libevent_malloc: new ptr-libevent@0x55564d873388 size 128 | setup callback for interface eth0 192.1.3.66:500 fd 387 | libevent_free: release ptr-libevent@0x55564d8734e8 | free_event_entry: release EVENT_NULL-pe@0x55564d873478 | add_fd_read_event_handler: new ethX-pe@0x55564d873478 | libevent_malloc: new ptr-libevent@0x55564d8734e8 size 128 | setup callback for interface eth0 192.1.3.67:4500 fd 386 | libevent_free: release ptr-libevent@0x55564d873648 | free_event_entry: release EVENT_NULL-pe@0x55564d8735d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8735d8 | libevent_malloc: new ptr-libevent@0x55564d873648 size 128 | setup callback for interface eth0 192.1.3.67:500 fd 385 | libevent_free: release ptr-libevent@0x55564d8737a8 | free_event_entry: release EVENT_NULL-pe@0x55564d873738 | add_fd_read_event_handler: new ethX-pe@0x55564d873738 | libevent_malloc: new ptr-libevent@0x55564d8737a8 size 128 | setup callback for interface eth0 192.1.3.68:4500 fd 384 | libevent_free: release ptr-libevent@0x55564d873908 | free_event_entry: release EVENT_NULL-pe@0x55564d873898 | add_fd_read_event_handler: new ethX-pe@0x55564d873898 | libevent_malloc: new ptr-libevent@0x55564d873908 size 128 | setup callback for interface eth0 192.1.3.68:500 fd 383 | libevent_free: release ptr-libevent@0x55564d873a68 | free_event_entry: release EVENT_NULL-pe@0x55564d8739f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8739f8 | libevent_malloc: new ptr-libevent@0x55564d873a68 size 128 | setup callback for interface eth0 192.1.3.69:4500 fd 382 | libevent_free: release ptr-libevent@0x55564d873bc8 | free_event_entry: release EVENT_NULL-pe@0x55564d873b58 | add_fd_read_event_handler: new ethX-pe@0x55564d873b58 | libevent_malloc: new ptr-libevent@0x55564d873bc8 size 128 | setup callback for interface eth0 192.1.3.69:500 fd 381 | libevent_free: release ptr-libevent@0x55564d873d28 | free_event_entry: release EVENT_NULL-pe@0x55564d873cb8 | add_fd_read_event_handler: new ethX-pe@0x55564d873cb8 | libevent_malloc: new ptr-libevent@0x55564d873d28 size 128 | setup callback for interface eth0 192.1.3.70:4500 fd 380 | libevent_free: release ptr-libevent@0x55564d873e88 | free_event_entry: release EVENT_NULL-pe@0x55564d873e18 | add_fd_read_event_handler: new ethX-pe@0x55564d873e18 | libevent_malloc: new ptr-libevent@0x55564d873e88 size 128 | setup callback for interface eth0 192.1.3.70:500 fd 379 | libevent_free: release ptr-libevent@0x55564d873fe8 | free_event_entry: release EVENT_NULL-pe@0x55564d873f78 | add_fd_read_event_handler: new ethX-pe@0x55564d873f78 | libevent_malloc: new ptr-libevent@0x55564d873fe8 size 128 | setup callback for interface eth0 192.1.3.71:4500 fd 378 | libevent_free: release ptr-libevent@0x55564d874148 | free_event_entry: release EVENT_NULL-pe@0x55564d8740d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8740d8 | libevent_malloc: new ptr-libevent@0x55564d874148 size 128 | setup callback for interface eth0 192.1.3.71:500 fd 377 | libevent_free: release ptr-libevent@0x55564d8742a8 | free_event_entry: release EVENT_NULL-pe@0x55564d874238 | add_fd_read_event_handler: new ethX-pe@0x55564d874238 | libevent_malloc: new ptr-libevent@0x55564d8742a8 size 128 | setup callback for interface eth0 192.1.3.72:4500 fd 376 | libevent_free: release ptr-libevent@0x55564d874408 | free_event_entry: release EVENT_NULL-pe@0x55564d874398 | add_fd_read_event_handler: new ethX-pe@0x55564d874398 | libevent_malloc: new ptr-libevent@0x55564d874408 size 128 | setup callback for interface eth0 192.1.3.72:500 fd 375 | libevent_free: release ptr-libevent@0x55564d874568 | free_event_entry: release EVENT_NULL-pe@0x55564d8744f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8744f8 | libevent_malloc: new ptr-libevent@0x55564d874568 size 128 | setup callback for interface eth0 192.1.3.73:4500 fd 374 | libevent_free: release ptr-libevent@0x55564d8746c8 | free_event_entry: release EVENT_NULL-pe@0x55564d874658 | add_fd_read_event_handler: new ethX-pe@0x55564d874658 | libevent_malloc: new ptr-libevent@0x55564d8746c8 size 128 | setup callback for interface eth0 192.1.3.73:500 fd 373 | libevent_free: release ptr-libevent@0x55564d874828 | free_event_entry: release EVENT_NULL-pe@0x55564d8747b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8747b8 | libevent_malloc: new ptr-libevent@0x55564d874828 size 128 | setup callback for interface eth0 192.1.3.74:4500 fd 372 | libevent_free: release ptr-libevent@0x55564d874988 | free_event_entry: release EVENT_NULL-pe@0x55564d874918 | add_fd_read_event_handler: new ethX-pe@0x55564d874918 | libevent_malloc: new ptr-libevent@0x55564d874988 size 128 | setup callback for interface eth0 192.1.3.74:500 fd 371 | libevent_free: release ptr-libevent@0x55564d874ae8 | free_event_entry: release EVENT_NULL-pe@0x55564d874a78 | add_fd_read_event_handler: new ethX-pe@0x55564d874a78 | libevent_malloc: new ptr-libevent@0x55564d874ae8 size 128 | setup callback for interface eth0 192.1.3.75:4500 fd 370 | libevent_free: release ptr-libevent@0x55564d874c48 | free_event_entry: release EVENT_NULL-pe@0x55564d874bd8 | add_fd_read_event_handler: new ethX-pe@0x55564d874bd8 | libevent_malloc: new ptr-libevent@0x55564d874c48 size 128 | setup callback for interface eth0 192.1.3.75:500 fd 369 | libevent_free: release ptr-libevent@0x55564d874da8 | free_event_entry: release EVENT_NULL-pe@0x55564d874d38 | add_fd_read_event_handler: new ethX-pe@0x55564d874d38 | libevent_malloc: new ptr-libevent@0x55564d874da8 size 128 | setup callback for interface eth0 192.1.3.76:4500 fd 368 | libevent_free: release ptr-libevent@0x55564d874f08 | free_event_entry: release EVENT_NULL-pe@0x55564d874e98 | add_fd_read_event_handler: new ethX-pe@0x55564d874e98 | libevent_malloc: new ptr-libevent@0x55564d874f08 size 128 | setup callback for interface eth0 192.1.3.76:500 fd 367 | libevent_free: release ptr-libevent@0x55564d875068 | free_event_entry: release EVENT_NULL-pe@0x55564d874ff8 | add_fd_read_event_handler: new ethX-pe@0x55564d874ff8 | libevent_malloc: new ptr-libevent@0x55564d875068 size 128 | setup callback for interface eth0 192.1.3.77:4500 fd 366 | libevent_free: release ptr-libevent@0x55564d8751c8 | free_event_entry: release EVENT_NULL-pe@0x55564d875158 | add_fd_read_event_handler: new ethX-pe@0x55564d875158 | libevent_malloc: new ptr-libevent@0x55564d8751c8 size 128 | setup callback for interface eth0 192.1.3.77:500 fd 365 | libevent_free: release ptr-libevent@0x55564d875328 | free_event_entry: release EVENT_NULL-pe@0x55564d8752b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8752b8 | libevent_malloc: new ptr-libevent@0x55564d875328 size 128 | setup callback for interface eth0 192.1.3.78:4500 fd 364 | libevent_free: release ptr-libevent@0x55564d875488 | free_event_entry: release EVENT_NULL-pe@0x55564d875418 | add_fd_read_event_handler: new ethX-pe@0x55564d875418 | libevent_malloc: new ptr-libevent@0x55564d875488 size 128 | setup callback for interface eth0 192.1.3.78:500 fd 363 | libevent_free: release ptr-libevent@0x55564d8755e8 | free_event_entry: release EVENT_NULL-pe@0x55564d875578 | add_fd_read_event_handler: new ethX-pe@0x55564d875578 | libevent_malloc: new ptr-libevent@0x55564d8755e8 size 128 | setup callback for interface eth0 192.1.3.79:4500 fd 362 | libevent_free: release ptr-libevent@0x55564d875748 | free_event_entry: release EVENT_NULL-pe@0x55564d8756d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8756d8 | libevent_malloc: new ptr-libevent@0x55564d875748 size 128 | setup callback for interface eth0 192.1.3.79:500 fd 361 | libevent_free: release ptr-libevent@0x55564d8758a8 | free_event_entry: release EVENT_NULL-pe@0x55564d875838 | add_fd_read_event_handler: new ethX-pe@0x55564d875838 | libevent_malloc: new ptr-libevent@0x55564d8758a8 size 128 | setup callback for interface eth0 192.1.3.80:4500 fd 360 | libevent_free: release ptr-libevent@0x55564d875a08 | free_event_entry: release EVENT_NULL-pe@0x55564d875998 | add_fd_read_event_handler: new ethX-pe@0x55564d875998 | libevent_malloc: new ptr-libevent@0x55564d875a08 size 128 | setup callback for interface eth0 192.1.3.80:500 fd 359 | libevent_free: release ptr-libevent@0x55564d875b68 | free_event_entry: release EVENT_NULL-pe@0x55564d875af8 | add_fd_read_event_handler: new ethX-pe@0x55564d875af8 | libevent_malloc: new ptr-libevent@0x55564d875b68 size 128 | setup callback for interface eth0 192.1.3.81:4500 fd 358 | libevent_free: release ptr-libevent@0x55564d875cc8 | free_event_entry: release EVENT_NULL-pe@0x55564d875c58 | add_fd_read_event_handler: new ethX-pe@0x55564d875c58 | libevent_malloc: new ptr-libevent@0x55564d875cc8 size 128 | setup callback for interface eth0 192.1.3.81:500 fd 357 | libevent_free: release ptr-libevent@0x55564d875e28 | free_event_entry: release EVENT_NULL-pe@0x55564d875db8 | add_fd_read_event_handler: new ethX-pe@0x55564d875db8 | libevent_malloc: new ptr-libevent@0x55564d875e28 size 128 | setup callback for interface eth0 192.1.3.82:4500 fd 356 | libevent_free: release ptr-libevent@0x55564d875f88 | free_event_entry: release EVENT_NULL-pe@0x55564d875f18 | add_fd_read_event_handler: new ethX-pe@0x55564d875f18 | libevent_malloc: new ptr-libevent@0x55564d875f88 size 128 | setup callback for interface eth0 192.1.3.82:500 fd 355 | libevent_free: release ptr-libevent@0x55564d8760e8 | free_event_entry: release EVENT_NULL-pe@0x55564d876078 | add_fd_read_event_handler: new ethX-pe@0x55564d876078 | libevent_malloc: new ptr-libevent@0x55564d8760e8 size 128 | setup callback for interface eth0 192.1.3.83:4500 fd 354 | libevent_free: release ptr-libevent@0x55564d876248 | free_event_entry: release EVENT_NULL-pe@0x55564d8761d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8761d8 | libevent_malloc: new ptr-libevent@0x55564d876248 size 128 | setup callback for interface eth0 192.1.3.83:500 fd 353 | libevent_free: release ptr-libevent@0x55564d8763a8 | free_event_entry: release EVENT_NULL-pe@0x55564d876338 | add_fd_read_event_handler: new ethX-pe@0x55564d876338 | libevent_malloc: new ptr-libevent@0x55564d8763a8 size 128 | setup callback for interface eth0 192.1.3.84:4500 fd 352 | libevent_free: release ptr-libevent@0x55564d876508 | free_event_entry: release EVENT_NULL-pe@0x55564d876498 | add_fd_read_event_handler: new ethX-pe@0x55564d876498 | libevent_malloc: new ptr-libevent@0x55564d876508 size 128 | setup callback for interface eth0 192.1.3.84:500 fd 351 | libevent_free: release ptr-libevent@0x55564d876668 | free_event_entry: release EVENT_NULL-pe@0x55564d8765f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8765f8 | libevent_malloc: new ptr-libevent@0x55564d876668 size 128 | setup callback for interface eth0 192.1.3.85:4500 fd 350 | libevent_free: release ptr-libevent@0x55564d8767c8 | free_event_entry: release EVENT_NULL-pe@0x55564d876758 | add_fd_read_event_handler: new ethX-pe@0x55564d876758 | libevent_malloc: new ptr-libevent@0x55564d8767c8 size 128 | setup callback for interface eth0 192.1.3.85:500 fd 349 | libevent_free: release ptr-libevent@0x55564d876928 | free_event_entry: release EVENT_NULL-pe@0x55564d8768b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8768b8 | libevent_malloc: new ptr-libevent@0x55564d876928 size 128 | setup callback for interface eth0 192.1.3.86:4500 fd 348 | libevent_free: release ptr-libevent@0x55564d876a88 | free_event_entry: release EVENT_NULL-pe@0x55564d876a18 | add_fd_read_event_handler: new ethX-pe@0x55564d876a18 | libevent_malloc: new ptr-libevent@0x55564d876a88 size 128 | setup callback for interface eth0 192.1.3.86:500 fd 347 | libevent_free: release ptr-libevent@0x55564d876be8 | free_event_entry: release EVENT_NULL-pe@0x55564d876b78 | add_fd_read_event_handler: new ethX-pe@0x55564d876b78 | libevent_malloc: new ptr-libevent@0x55564d876be8 size 128 | setup callback for interface eth0 192.1.3.87:4500 fd 346 | libevent_free: release ptr-libevent@0x55564d876d48 | free_event_entry: release EVENT_NULL-pe@0x55564d876cd8 | add_fd_read_event_handler: new ethX-pe@0x55564d876cd8 | libevent_malloc: new ptr-libevent@0x55564d876d48 size 128 | setup callback for interface eth0 192.1.3.87:500 fd 345 | libevent_free: release ptr-libevent@0x55564d876ea8 | free_event_entry: release EVENT_NULL-pe@0x55564d876e38 | add_fd_read_event_handler: new ethX-pe@0x55564d876e38 | libevent_malloc: new ptr-libevent@0x55564d876ea8 size 128 | setup callback for interface eth0 192.1.3.88:4500 fd 344 | libevent_free: release ptr-libevent@0x55564d877008 | free_event_entry: release EVENT_NULL-pe@0x55564d876f98 | add_fd_read_event_handler: new ethX-pe@0x55564d876f98 | libevent_malloc: new ptr-libevent@0x55564d877008 size 128 | setup callback for interface eth0 192.1.3.88:500 fd 343 | libevent_free: release ptr-libevent@0x55564d877168 | free_event_entry: release EVENT_NULL-pe@0x55564d8770f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8770f8 | libevent_malloc: new ptr-libevent@0x55564d877168 size 128 | setup callback for interface eth0 192.1.3.89:4500 fd 342 | libevent_free: release ptr-libevent@0x55564d8772c8 | free_event_entry: release EVENT_NULL-pe@0x55564d877258 | add_fd_read_event_handler: new ethX-pe@0x55564d877258 | libevent_malloc: new ptr-libevent@0x55564d8772c8 size 128 | setup callback for interface eth0 192.1.3.89:500 fd 341 | libevent_free: release ptr-libevent@0x55564d877428 | free_event_entry: release EVENT_NULL-pe@0x55564d8773b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8773b8 | libevent_malloc: new ptr-libevent@0x55564d877428 size 128 | setup callback for interface eth0 192.1.3.90:4500 fd 340 | libevent_free: release ptr-libevent@0x55564d877588 | free_event_entry: release EVENT_NULL-pe@0x55564d877518 | add_fd_read_event_handler: new ethX-pe@0x55564d877518 | libevent_malloc: new ptr-libevent@0x55564d877588 size 128 | setup callback for interface eth0 192.1.3.90:500 fd 339 | libevent_free: release ptr-libevent@0x55564d8776e8 | free_event_entry: release EVENT_NULL-pe@0x55564d877678 | add_fd_read_event_handler: new ethX-pe@0x55564d877678 | libevent_malloc: new ptr-libevent@0x55564d8776e8 size 128 | setup callback for interface eth0 192.1.3.91:4500 fd 338 | libevent_free: release ptr-libevent@0x55564d877848 | free_event_entry: release EVENT_NULL-pe@0x55564d8777d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8777d8 | libevent_malloc: new ptr-libevent@0x55564d877848 size 128 | setup callback for interface eth0 192.1.3.91:500 fd 337 | libevent_free: release ptr-libevent@0x55564d8779a8 | free_event_entry: release EVENT_NULL-pe@0x55564d877938 | add_fd_read_event_handler: new ethX-pe@0x55564d877938 | libevent_malloc: new ptr-libevent@0x55564d8779a8 size 128 | setup callback for interface eth0 192.1.3.92:4500 fd 336 | libevent_free: release ptr-libevent@0x55564d877b08 | free_event_entry: release EVENT_NULL-pe@0x55564d877a98 | add_fd_read_event_handler: new ethX-pe@0x55564d877a98 | libevent_malloc: new ptr-libevent@0x55564d877b08 size 128 | setup callback for interface eth0 192.1.3.92:500 fd 335 | libevent_free: release ptr-libevent@0x55564d877c68 | free_event_entry: release EVENT_NULL-pe@0x55564d877bf8 | add_fd_read_event_handler: new ethX-pe@0x55564d877bf8 | libevent_malloc: new ptr-libevent@0x55564d877c68 size 128 | setup callback for interface eth0 192.1.3.93:4500 fd 334 | libevent_free: release ptr-libevent@0x55564d877dc8 | free_event_entry: release EVENT_NULL-pe@0x55564d877d58 | add_fd_read_event_handler: new ethX-pe@0x55564d877d58 | libevent_malloc: new ptr-libevent@0x55564d877dc8 size 128 | setup callback for interface eth0 192.1.3.93:500 fd 333 | libevent_free: release ptr-libevent@0x55564d877f28 | free_event_entry: release EVENT_NULL-pe@0x55564d877eb8 | add_fd_read_event_handler: new ethX-pe@0x55564d877eb8 | libevent_malloc: new ptr-libevent@0x55564d877f28 size 128 | setup callback for interface eth0 192.1.3.94:4500 fd 332 | libevent_free: release ptr-libevent@0x55564d878088 | free_event_entry: release EVENT_NULL-pe@0x55564d878018 | add_fd_read_event_handler: new ethX-pe@0x55564d878018 | libevent_malloc: new ptr-libevent@0x55564d878088 size 128 | setup callback for interface eth0 192.1.3.94:500 fd 331 | libevent_free: release ptr-libevent@0x55564d8781e8 | free_event_entry: release EVENT_NULL-pe@0x55564d878178 | add_fd_read_event_handler: new ethX-pe@0x55564d878178 | libevent_malloc: new ptr-libevent@0x55564d8781e8 size 128 | setup callback for interface eth0 192.1.3.95:4500 fd 330 | libevent_free: release ptr-libevent@0x55564d878348 | free_event_entry: release EVENT_NULL-pe@0x55564d8782d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8782d8 | libevent_malloc: new ptr-libevent@0x55564d878348 size 128 | setup callback for interface eth0 192.1.3.95:500 fd 329 | libevent_free: release ptr-libevent@0x55564d8784a8 | free_event_entry: release EVENT_NULL-pe@0x55564d878438 | add_fd_read_event_handler: new ethX-pe@0x55564d878438 | libevent_malloc: new ptr-libevent@0x55564d8784a8 size 128 | setup callback for interface eth0 192.1.3.96:4500 fd 328 | libevent_free: release ptr-libevent@0x55564d878608 | free_event_entry: release EVENT_NULL-pe@0x55564d878598 | add_fd_read_event_handler: new ethX-pe@0x55564d878598 | libevent_malloc: new ptr-libevent@0x55564d878608 size 128 | setup callback for interface eth0 192.1.3.96:500 fd 327 | libevent_free: release ptr-libevent@0x55564d878768 | free_event_entry: release EVENT_NULL-pe@0x55564d8786f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8786f8 | libevent_malloc: new ptr-libevent@0x55564d878768 size 128 | setup callback for interface eth0 192.1.3.97:4500 fd 326 | libevent_free: release ptr-libevent@0x55564d8788c8 | free_event_entry: release EVENT_NULL-pe@0x55564d878858 | add_fd_read_event_handler: new ethX-pe@0x55564d878858 | libevent_malloc: new ptr-libevent@0x55564d8788c8 size 128 | setup callback for interface eth0 192.1.3.97:500 fd 325 | libevent_free: release ptr-libevent@0x55564d878a28 | free_event_entry: release EVENT_NULL-pe@0x55564d8789b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8789b8 | libevent_malloc: new ptr-libevent@0x55564d878a28 size 128 | setup callback for interface eth0 192.1.3.98:4500 fd 324 | libevent_free: release ptr-libevent@0x55564d878b88 | free_event_entry: release EVENT_NULL-pe@0x55564d878b18 | add_fd_read_event_handler: new ethX-pe@0x55564d878b18 | libevent_malloc: new ptr-libevent@0x55564d878b88 size 128 | setup callback for interface eth0 192.1.3.98:500 fd 323 | libevent_free: release ptr-libevent@0x55564d878ce8 | free_event_entry: release EVENT_NULL-pe@0x55564d878c78 | add_fd_read_event_handler: new ethX-pe@0x55564d878c78 | libevent_malloc: new ptr-libevent@0x55564d878ce8 size 128 | setup callback for interface eth0 192.1.3.99:4500 fd 322 | libevent_free: release ptr-libevent@0x55564d878e48 | free_event_entry: release EVENT_NULL-pe@0x55564d878dd8 | add_fd_read_event_handler: new ethX-pe@0x55564d878dd8 | libevent_malloc: new ptr-libevent@0x55564d878e48 size 128 | setup callback for interface eth0 192.1.3.99:500 fd 321 | libevent_free: release ptr-libevent@0x55564d878fa8 | free_event_entry: release EVENT_NULL-pe@0x55564d878f38 | add_fd_read_event_handler: new ethX-pe@0x55564d878f38 | libevent_malloc: new ptr-libevent@0x55564d878fa8 size 128 | setup callback for interface eth0 192.1.3.100:4500 fd 320 | libevent_free: release ptr-libevent@0x55564d879108 | free_event_entry: release EVENT_NULL-pe@0x55564d879098 | add_fd_read_event_handler: new ethX-pe@0x55564d879098 | libevent_malloc: new ptr-libevent@0x55564d879108 size 128 | setup callback for interface eth0 192.1.3.100:500 fd 319 | libevent_free: release ptr-libevent@0x55564d879268 | free_event_entry: release EVENT_NULL-pe@0x55564d8791f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8791f8 | libevent_malloc: new ptr-libevent@0x55564d879268 size 128 | setup callback for interface eth0 192.1.3.101:4500 fd 318 | libevent_free: release ptr-libevent@0x55564d8793c8 | free_event_entry: release EVENT_NULL-pe@0x55564d879358 | add_fd_read_event_handler: new ethX-pe@0x55564d879358 | libevent_malloc: new ptr-libevent@0x55564d8793c8 size 128 | setup callback for interface eth0 192.1.3.101:500 fd 317 | libevent_free: release ptr-libevent@0x55564d879528 | free_event_entry: release EVENT_NULL-pe@0x55564d8794b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8794b8 | libevent_malloc: new ptr-libevent@0x55564d879528 size 128 | setup callback for interface eth0 192.1.3.102:4500 fd 316 | libevent_free: release ptr-libevent@0x55564d879688 | free_event_entry: release EVENT_NULL-pe@0x55564d879618 | add_fd_read_event_handler: new ethX-pe@0x55564d879618 | libevent_malloc: new ptr-libevent@0x55564d879688 size 128 | setup callback for interface eth0 192.1.3.102:500 fd 315 | libevent_free: release ptr-libevent@0x55564d8797e8 | free_event_entry: release EVENT_NULL-pe@0x55564d879778 | add_fd_read_event_handler: new ethX-pe@0x55564d879778 | libevent_malloc: new ptr-libevent@0x55564d8797e8 size 128 | setup callback for interface eth0 192.1.3.103:4500 fd 314 | libevent_free: release ptr-libevent@0x55564d879948 | free_event_entry: release EVENT_NULL-pe@0x55564d8798d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8798d8 | libevent_malloc: new ptr-libevent@0x55564d879948 size 128 | setup callback for interface eth0 192.1.3.103:500 fd 313 | libevent_free: release ptr-libevent@0x55564d879aa8 | free_event_entry: release EVENT_NULL-pe@0x55564d879a38 | add_fd_read_event_handler: new ethX-pe@0x55564d879a38 | libevent_malloc: new ptr-libevent@0x55564d879aa8 size 128 | setup callback for interface eth0 192.1.3.104:4500 fd 312 | libevent_free: release ptr-libevent@0x55564d879c08 | free_event_entry: release EVENT_NULL-pe@0x55564d879b98 | add_fd_read_event_handler: new ethX-pe@0x55564d879b98 | libevent_malloc: new ptr-libevent@0x55564d879c08 size 128 | setup callback for interface eth0 192.1.3.104:500 fd 311 | libevent_free: release ptr-libevent@0x55564d879d68 | free_event_entry: release EVENT_NULL-pe@0x55564d879cf8 | add_fd_read_event_handler: new ethX-pe@0x55564d879cf8 | libevent_malloc: new ptr-libevent@0x55564d879d68 size 128 | setup callback for interface eth0 192.1.3.105:4500 fd 310 | libevent_free: release ptr-libevent@0x55564d879ec8 | free_event_entry: release EVENT_NULL-pe@0x55564d879e58 | add_fd_read_event_handler: new ethX-pe@0x55564d879e58 | libevent_malloc: new ptr-libevent@0x55564d879ec8 size 128 | setup callback for interface eth0 192.1.3.105:500 fd 309 | libevent_free: release ptr-libevent@0x55564d87a028 | free_event_entry: release EVENT_NULL-pe@0x55564d879fb8 | add_fd_read_event_handler: new ethX-pe@0x55564d879fb8 | libevent_malloc: new ptr-libevent@0x55564d87a028 size 128 | setup callback for interface eth0 192.1.3.106:4500 fd 308 | libevent_free: release ptr-libevent@0x55564d87a188 | free_event_entry: release EVENT_NULL-pe@0x55564d87a118 | add_fd_read_event_handler: new ethX-pe@0x55564d87a118 | libevent_malloc: new ptr-libevent@0x55564d87a188 size 128 | setup callback for interface eth0 192.1.3.106:500 fd 307 | libevent_free: release ptr-libevent@0x55564d87a2e8 | free_event_entry: release EVENT_NULL-pe@0x55564d87a278 | add_fd_read_event_handler: new ethX-pe@0x55564d87a278 | libevent_malloc: new ptr-libevent@0x55564d87a2e8 size 128 | setup callback for interface eth0 192.1.3.107:4500 fd 306 | libevent_free: release ptr-libevent@0x55564d87a448 | free_event_entry: release EVENT_NULL-pe@0x55564d87a3d8 | add_fd_read_event_handler: new ethX-pe@0x55564d87a3d8 | libevent_malloc: new ptr-libevent@0x55564d87a448 size 128 | setup callback for interface eth0 192.1.3.107:500 fd 305 | libevent_free: release ptr-libevent@0x55564d87a5a8 | free_event_entry: release EVENT_NULL-pe@0x55564d87a538 | add_fd_read_event_handler: new ethX-pe@0x55564d87a538 | libevent_malloc: new ptr-libevent@0x55564d87a5a8 size 128 | setup callback for interface eth0 192.1.3.108:4500 fd 304 | libevent_free: release ptr-libevent@0x55564d87a708 | free_event_entry: release EVENT_NULL-pe@0x55564d87a698 | add_fd_read_event_handler: new ethX-pe@0x55564d87a698 | libevent_malloc: new ptr-libevent@0x55564d87a708 size 128 | setup callback for interface eth0 192.1.3.108:500 fd 303 | libevent_free: release ptr-libevent@0x55564d87a868 | free_event_entry: release EVENT_NULL-pe@0x55564d87a7f8 | add_fd_read_event_handler: new ethX-pe@0x55564d87a7f8 | libevent_malloc: new ptr-libevent@0x55564d87a868 size 128 | setup callback for interface eth0 192.1.3.109:4500 fd 302 | libevent_free: release ptr-libevent@0x55564d87a9c8 | free_event_entry: release EVENT_NULL-pe@0x55564d87a958 | add_fd_read_event_handler: new ethX-pe@0x55564d87a958 | libevent_malloc: new ptr-libevent@0x55564d87a9c8 size 128 | setup callback for interface eth0 192.1.3.109:500 fd 301 | libevent_free: release ptr-libevent@0x55564d87ab28 | free_event_entry: release EVENT_NULL-pe@0x55564d87aab8 | add_fd_read_event_handler: new ethX-pe@0x55564d87aab8 | libevent_malloc: new ptr-libevent@0x55564d87ab28 size 128 | setup callback for interface eth0 192.1.3.110:4500 fd 300 | libevent_free: release ptr-libevent@0x55564d87ac88 | free_event_entry: release EVENT_NULL-pe@0x55564d87ac18 | add_fd_read_event_handler: new ethX-pe@0x55564d87ac18 | libevent_malloc: new ptr-libevent@0x55564d87ac88 size 128 | setup callback for interface eth0 192.1.3.110:500 fd 299 | libevent_free: release ptr-libevent@0x55564d87ade8 | free_event_entry: release EVENT_NULL-pe@0x55564d87ad78 | add_fd_read_event_handler: new ethX-pe@0x55564d87ad78 | libevent_malloc: new ptr-libevent@0x55564d87ade8 size 128 | setup callback for interface eth0 192.1.3.111:4500 fd 298 | libevent_free: release ptr-libevent@0x55564d87af48 | free_event_entry: release EVENT_NULL-pe@0x55564d87aed8 | add_fd_read_event_handler: new ethX-pe@0x55564d87aed8 | libevent_malloc: new ptr-libevent@0x55564d87af48 size 128 | setup callback for interface eth0 192.1.3.111:500 fd 297 | libevent_free: release ptr-libevent@0x55564d87b0a8 | free_event_entry: release EVENT_NULL-pe@0x55564d87b038 | add_fd_read_event_handler: new ethX-pe@0x55564d87b038 | libevent_malloc: new ptr-libevent@0x55564d87b0a8 size 128 | setup callback for interface eth0 192.1.3.112:4500 fd 296 | libevent_free: release ptr-libevent@0x55564d87b208 | free_event_entry: release EVENT_NULL-pe@0x55564d87b198 | add_fd_read_event_handler: new ethX-pe@0x55564d87b198 | libevent_malloc: new ptr-libevent@0x55564d87b208 size 128 | setup callback for interface eth0 192.1.3.112:500 fd 295 | libevent_free: release ptr-libevent@0x55564d87b368 | free_event_entry: release EVENT_NULL-pe@0x55564d87b2f8 | add_fd_read_event_handler: new ethX-pe@0x55564d87b2f8 | libevent_malloc: new ptr-libevent@0x55564d87b368 size 128 | setup callback for interface eth0 192.1.3.113:4500 fd 294 | libevent_free: release ptr-libevent@0x55564d87b4c8 | free_event_entry: release EVENT_NULL-pe@0x55564d87b458 | add_fd_read_event_handler: new ethX-pe@0x55564d87b458 | libevent_malloc: new ptr-libevent@0x55564d87b4c8 size 128 | setup callback for interface eth0 192.1.3.113:500 fd 293 | libevent_free: release ptr-libevent@0x55564d87b628 | free_event_entry: release EVENT_NULL-pe@0x55564d87b5b8 | add_fd_read_event_handler: new ethX-pe@0x55564d87b5b8 | libevent_malloc: new ptr-libevent@0x55564d87b628 size 128 | setup callback for interface eth0 192.1.3.114:4500 fd 292 | libevent_free: release ptr-libevent@0x55564d87b788 | free_event_entry: release EVENT_NULL-pe@0x55564d87b718 | add_fd_read_event_handler: new ethX-pe@0x55564d87b718 | libevent_malloc: new ptr-libevent@0x55564d87b788 size 128 | setup callback for interface eth0 192.1.3.114:500 fd 291 | libevent_free: release ptr-libevent@0x55564d87b8e8 | free_event_entry: release EVENT_NULL-pe@0x55564d87b878 | add_fd_read_event_handler: new ethX-pe@0x55564d87b878 | libevent_malloc: new ptr-libevent@0x55564d87b8e8 size 128 | setup callback for interface eth0 192.1.3.115:4500 fd 290 | libevent_free: release ptr-libevent@0x55564d87ba48 | free_event_entry: release EVENT_NULL-pe@0x55564d87b9d8 | add_fd_read_event_handler: new ethX-pe@0x55564d87b9d8 | libevent_malloc: new ptr-libevent@0x55564d87ba48 size 128 | setup callback for interface eth0 192.1.3.115:500 fd 289 | libevent_free: release ptr-libevent@0x55564d87bba8 | free_event_entry: release EVENT_NULL-pe@0x55564d87bb38 | add_fd_read_event_handler: new ethX-pe@0x55564d87bb38 | libevent_malloc: new ptr-libevent@0x55564d87bba8 size 128 | setup callback for interface eth0 192.1.3.116:4500 fd 288 | libevent_free: release ptr-libevent@0x55564d87bd08 | free_event_entry: release EVENT_NULL-pe@0x55564d87bc98 | add_fd_read_event_handler: new ethX-pe@0x55564d87bc98 | libevent_malloc: new ptr-libevent@0x55564d87bd08 size 128 | setup callback for interface eth0 192.1.3.116:500 fd 287 | libevent_free: release ptr-libevent@0x55564d87be68 | free_event_entry: release EVENT_NULL-pe@0x55564d87bdf8 | add_fd_read_event_handler: new ethX-pe@0x55564d87bdf8 | libevent_malloc: new ptr-libevent@0x55564d87be68 size 128 | setup callback for interface eth0 192.1.3.117:4500 fd 286 | libevent_free: release ptr-libevent@0x55564d87bfc8 | free_event_entry: release EVENT_NULL-pe@0x55564d87bf58 | add_fd_read_event_handler: new ethX-pe@0x55564d87bf58 | libevent_malloc: new ptr-libevent@0x55564d87bfc8 size 128 | setup callback for interface eth0 192.1.3.117:500 fd 285 | libevent_free: release ptr-libevent@0x55564d87c128 | free_event_entry: release EVENT_NULL-pe@0x55564d87c0b8 | add_fd_read_event_handler: new ethX-pe@0x55564d87c0b8 | libevent_malloc: new ptr-libevent@0x55564d87c128 size 128 | setup callback for interface eth0 192.1.3.118:4500 fd 284 | libevent_free: release ptr-libevent@0x55564d87c288 | free_event_entry: release EVENT_NULL-pe@0x55564d87c218 | add_fd_read_event_handler: new ethX-pe@0x55564d87c218 | libevent_malloc: new ptr-libevent@0x55564d87c288 size 128 | setup callback for interface eth0 192.1.3.118:500 fd 283 | libevent_free: release ptr-libevent@0x55564d87c3e8 | free_event_entry: release EVENT_NULL-pe@0x55564d87c378 | add_fd_read_event_handler: new ethX-pe@0x55564d87c378 | libevent_malloc: new ptr-libevent@0x55564d87c3e8 size 128 | setup callback for interface eth0 192.1.3.119:4500 fd 282 | libevent_free: release ptr-libevent@0x55564d87c548 | free_event_entry: release EVENT_NULL-pe@0x55564d87c4d8 | add_fd_read_event_handler: new ethX-pe@0x55564d87c4d8 | libevent_malloc: new ptr-libevent@0x55564d87c548 size 128 | setup callback for interface eth0 192.1.3.119:500 fd 281 | libevent_free: release ptr-libevent@0x55564d87c6a8 | free_event_entry: release EVENT_NULL-pe@0x55564d87c638 | add_fd_read_event_handler: new ethX-pe@0x55564d87c638 | libevent_malloc: new ptr-libevent@0x55564d87c6a8 size 128 | setup callback for interface eth0 192.1.3.120:4500 fd 280 | libevent_free: release ptr-libevent@0x55564d87c808 | free_event_entry: release EVENT_NULL-pe@0x55564d87c798 | add_fd_read_event_handler: new ethX-pe@0x55564d87c798 | libevent_malloc: new ptr-libevent@0x55564d87c808 size 128 | setup callback for interface eth0 192.1.3.120:500 fd 279 | libevent_free: release ptr-libevent@0x55564d87c968 | free_event_entry: release EVENT_NULL-pe@0x55564d87c8f8 | add_fd_read_event_handler: new ethX-pe@0x55564d87c8f8 | libevent_malloc: new ptr-libevent@0x55564d87c968 size 128 | setup callback for interface eth0 192.1.3.121:4500 fd 278 | libevent_free: release ptr-libevent@0x55564d87cac8 | free_event_entry: release EVENT_NULL-pe@0x55564d87ca58 | add_fd_read_event_handler: new ethX-pe@0x55564d87ca58 | libevent_malloc: new ptr-libevent@0x55564d87cac8 size 128 | setup callback for interface eth0 192.1.3.121:500 fd 277 | libevent_free: release ptr-libevent@0x55564d87cc28 | free_event_entry: release EVENT_NULL-pe@0x55564d87cbb8 | add_fd_read_event_handler: new ethX-pe@0x55564d87cbb8 | libevent_malloc: new ptr-libevent@0x55564d87cc28 size 128 | setup callback for interface eth0 192.1.3.122:4500 fd 276 | libevent_free: release ptr-libevent@0x55564d87cd88 | free_event_entry: release EVENT_NULL-pe@0x55564d87cd18 | add_fd_read_event_handler: new ethX-pe@0x55564d87cd18 | libevent_malloc: new ptr-libevent@0x55564d87cd88 size 128 | setup callback for interface eth0 192.1.3.122:500 fd 275 | libevent_free: release ptr-libevent@0x55564d87cee8 | free_event_entry: release EVENT_NULL-pe@0x55564d87ce78 | add_fd_read_event_handler: new ethX-pe@0x55564d87ce78 | libevent_malloc: new ptr-libevent@0x55564d87cee8 size 128 | setup callback for interface eth0 192.1.3.123:4500 fd 274 | libevent_free: release ptr-libevent@0x55564d87d048 | free_event_entry: release EVENT_NULL-pe@0x55564d87cfd8 | add_fd_read_event_handler: new ethX-pe@0x55564d87cfd8 | libevent_malloc: new ptr-libevent@0x55564d87d048 size 128 | setup callback for interface eth0 192.1.3.123:500 fd 273 | libevent_free: release ptr-libevent@0x55564d87d1a8 | free_event_entry: release EVENT_NULL-pe@0x55564d87d138 | add_fd_read_event_handler: new ethX-pe@0x55564d87d138 | libevent_malloc: new ptr-libevent@0x55564d87d1a8 size 128 | setup callback for interface eth0 192.1.3.124:4500 fd 272 | libevent_free: release ptr-libevent@0x55564d87d308 | free_event_entry: release EVENT_NULL-pe@0x55564d87d298 | add_fd_read_event_handler: new ethX-pe@0x55564d87d298 | libevent_malloc: new ptr-libevent@0x55564d87d308 size 128 | setup callback for interface eth0 192.1.3.124:500 fd 271 | libevent_free: release ptr-libevent@0x55564d87d468 | free_event_entry: release EVENT_NULL-pe@0x55564d87d3f8 | add_fd_read_event_handler: new ethX-pe@0x55564d87d3f8 | libevent_malloc: new ptr-libevent@0x55564d87d468 size 128 | setup callback for interface eth0 192.1.3.125:4500 fd 270 | libevent_free: release ptr-libevent@0x55564d87d5c8 | free_event_entry: release EVENT_NULL-pe@0x55564d87d558 | add_fd_read_event_handler: new ethX-pe@0x55564d87d558 | libevent_malloc: new ptr-libevent@0x55564d87d5c8 size 128 | setup callback for interface eth0 192.1.3.125:500 fd 269 | libevent_free: release ptr-libevent@0x55564d87d728 | free_event_entry: release EVENT_NULL-pe@0x55564d87d6b8 | add_fd_read_event_handler: new ethX-pe@0x55564d87d6b8 | libevent_malloc: new ptr-libevent@0x55564d87d728 size 128 | setup callback for interface eth0 192.1.3.126:4500 fd 268 | libevent_free: release ptr-libevent@0x55564d87d888 | free_event_entry: release EVENT_NULL-pe@0x55564d87d818 | add_fd_read_event_handler: new ethX-pe@0x55564d87d818 | libevent_malloc: new ptr-libevent@0x55564d87d888 size 128 | setup callback for interface eth0 192.1.3.126:500 fd 267 | libevent_free: release ptr-libevent@0x55564d87d9e8 | free_event_entry: release EVENT_NULL-pe@0x55564d87d978 | add_fd_read_event_handler: new ethX-pe@0x55564d87d978 | libevent_malloc: new ptr-libevent@0x55564d87d9e8 size 128 | setup callback for interface eth0 192.1.3.127:4500 fd 266 | libevent_free: release ptr-libevent@0x55564d87db48 | free_event_entry: release EVENT_NULL-pe@0x55564d87dad8 | add_fd_read_event_handler: new ethX-pe@0x55564d87dad8 | libevent_malloc: new ptr-libevent@0x55564d87db48 size 128 | setup callback for interface eth0 192.1.3.127:500 fd 265 | libevent_free: release ptr-libevent@0x55564d87dca8 | free_event_entry: release EVENT_NULL-pe@0x55564d87dc38 | add_fd_read_event_handler: new ethX-pe@0x55564d87dc38 | libevent_malloc: new ptr-libevent@0x55564d87dca8 size 128 | setup callback for interface eth0 192.1.3.128:4500 fd 264 | libevent_free: release ptr-libevent@0x55564d87de08 | free_event_entry: release EVENT_NULL-pe@0x55564d87dd98 | add_fd_read_event_handler: new ethX-pe@0x55564d87dd98 | libevent_malloc: new ptr-libevent@0x55564d87de08 size 128 | setup callback for interface eth0 192.1.3.128:500 fd 263 | libevent_free: release ptr-libevent@0x55564d87df68 | free_event_entry: release EVENT_NULL-pe@0x55564d87def8 | add_fd_read_event_handler: new ethX-pe@0x55564d87def8 | libevent_malloc: new ptr-libevent@0x55564d87df68 size 128 | setup callback for interface eth0 192.1.3.129:4500 fd 262 | libevent_free: release ptr-libevent@0x55564d87e0c8 | free_event_entry: release EVENT_NULL-pe@0x55564d87e058 | add_fd_read_event_handler: new ethX-pe@0x55564d87e058 | libevent_malloc: new ptr-libevent@0x55564d87e0c8 size 128 | setup callback for interface eth0 192.1.3.129:500 fd 261 | libevent_free: release ptr-libevent@0x55564d87e228 | free_event_entry: release EVENT_NULL-pe@0x55564d87e1b8 | add_fd_read_event_handler: new ethX-pe@0x55564d87e1b8 | libevent_malloc: new ptr-libevent@0x55564d87e228 size 128 | setup callback for interface eth0 192.1.3.130:4500 fd 260 | libevent_free: release ptr-libevent@0x55564d87e388 | free_event_entry: release EVENT_NULL-pe@0x55564d87e318 | add_fd_read_event_handler: new ethX-pe@0x55564d87e318 | libevent_malloc: new ptr-libevent@0x55564d87e388 size 128 | setup callback for interface eth0 192.1.3.130:500 fd 259 | libevent_free: release ptr-libevent@0x55564d87e4e8 | free_event_entry: release EVENT_NULL-pe@0x55564d87e478 | add_fd_read_event_handler: new ethX-pe@0x55564d87e478 | libevent_malloc: new ptr-libevent@0x55564d87e4e8 size 128 | setup callback for interface eth0 192.1.3.131:4500 fd 258 | libevent_free: release ptr-libevent@0x55564d87e648 | free_event_entry: release EVENT_NULL-pe@0x55564d87e5d8 | add_fd_read_event_handler: new ethX-pe@0x55564d87e5d8 | libevent_malloc: new ptr-libevent@0x55564d87e648 size 128 | setup callback for interface eth0 192.1.3.131:500 fd 257 | libevent_free: release ptr-libevent@0x55564d87e7a8 | free_event_entry: release EVENT_NULL-pe@0x55564d87e738 | add_fd_read_event_handler: new ethX-pe@0x55564d87e738 | libevent_malloc: new ptr-libevent@0x55564d87e7a8 size 128 | setup callback for interface eth0 192.1.3.132:4500 fd 256 | libevent_free: release ptr-libevent@0x55564d87e908 | free_event_entry: release EVENT_NULL-pe@0x55564d87e898 | add_fd_read_event_handler: new ethX-pe@0x55564d87e898 | libevent_malloc: new ptr-libevent@0x55564d87e908 size 128 | setup callback for interface eth0 192.1.3.132:500 fd 255 | libevent_free: release ptr-libevent@0x55564d87ea68 | free_event_entry: release EVENT_NULL-pe@0x55564d87e9f8 | add_fd_read_event_handler: new ethX-pe@0x55564d87e9f8 | libevent_malloc: new ptr-libevent@0x55564d87ea68 size 128 | setup callback for interface eth0 192.1.3.133:4500 fd 254 | libevent_free: release ptr-libevent@0x55564d87ebc8 | free_event_entry: release EVENT_NULL-pe@0x55564d87eb58 | add_fd_read_event_handler: new ethX-pe@0x55564d87eb58 | libevent_malloc: new ptr-libevent@0x55564d87ebc8 size 128 | setup callback for interface eth0 192.1.3.133:500 fd 253 | libevent_free: release ptr-libevent@0x55564d87ed28 | free_event_entry: release EVENT_NULL-pe@0x55564d87ecb8 | add_fd_read_event_handler: new ethX-pe@0x55564d87ecb8 | libevent_malloc: new ptr-libevent@0x55564d87ed28 size 128 | setup callback for interface eth0 192.1.3.134:4500 fd 252 | libevent_free: release ptr-libevent@0x55564d87ee88 | free_event_entry: release EVENT_NULL-pe@0x55564d87ee18 | add_fd_read_event_handler: new ethX-pe@0x55564d87ee18 | libevent_malloc: new ptr-libevent@0x55564d87ee88 size 128 | setup callback for interface eth0 192.1.3.134:500 fd 251 | libevent_free: release ptr-libevent@0x55564d87efe8 | free_event_entry: release EVENT_NULL-pe@0x55564d87ef78 | add_fd_read_event_handler: new ethX-pe@0x55564d87ef78 | libevent_malloc: new ptr-libevent@0x55564d87efe8 size 128 | setup callback for interface eth0 192.1.3.135:4500 fd 250 | libevent_free: release ptr-libevent@0x55564d87f148 | free_event_entry: release EVENT_NULL-pe@0x55564d87f0d8 | add_fd_read_event_handler: new ethX-pe@0x55564d87f0d8 | libevent_malloc: new ptr-libevent@0x55564d87f148 size 128 | setup callback for interface eth0 192.1.3.135:500 fd 249 | libevent_free: release ptr-libevent@0x55564d87f2a8 | free_event_entry: release EVENT_NULL-pe@0x55564d87f238 | add_fd_read_event_handler: new ethX-pe@0x55564d87f238 | libevent_malloc: new ptr-libevent@0x55564d87f2a8 size 128 | setup callback for interface eth0 192.1.3.136:4500 fd 248 | libevent_free: release ptr-libevent@0x55564d87f408 | free_event_entry: release EVENT_NULL-pe@0x55564d87f398 | add_fd_read_event_handler: new ethX-pe@0x55564d87f398 | libevent_malloc: new ptr-libevent@0x55564d87f408 size 128 | setup callback for interface eth0 192.1.3.136:500 fd 247 | libevent_free: release ptr-libevent@0x55564d87f568 | free_event_entry: release EVENT_NULL-pe@0x55564d87f4f8 | add_fd_read_event_handler: new ethX-pe@0x55564d87f4f8 | libevent_malloc: new ptr-libevent@0x55564d87f568 size 128 | setup callback for interface eth0 192.1.3.137:4500 fd 246 | libevent_free: release ptr-libevent@0x55564d87f6c8 | free_event_entry: release EVENT_NULL-pe@0x55564d87f658 | add_fd_read_event_handler: new ethX-pe@0x55564d87f658 | libevent_malloc: new ptr-libevent@0x55564d87f6c8 size 128 | setup callback for interface eth0 192.1.3.137:500 fd 245 | libevent_free: release ptr-libevent@0x55564d87f828 | free_event_entry: release EVENT_NULL-pe@0x55564d87f7b8 | add_fd_read_event_handler: new ethX-pe@0x55564d87f7b8 | libevent_malloc: new ptr-libevent@0x55564d87f828 size 128 | setup callback for interface eth0 192.1.3.138:4500 fd 244 | libevent_free: release ptr-libevent@0x55564d87f988 | free_event_entry: release EVENT_NULL-pe@0x55564d87f918 | add_fd_read_event_handler: new ethX-pe@0x55564d87f918 | libevent_malloc: new ptr-libevent@0x55564d87f988 size 128 | setup callback for interface eth0 192.1.3.138:500 fd 243 | libevent_free: release ptr-libevent@0x55564d87fae8 | free_event_entry: release EVENT_NULL-pe@0x55564d87fa78 | add_fd_read_event_handler: new ethX-pe@0x55564d87fa78 | libevent_malloc: new ptr-libevent@0x55564d87fae8 size 128 | setup callback for interface eth0 192.1.3.139:4500 fd 242 | libevent_free: release ptr-libevent@0x55564d87fc48 | free_event_entry: release EVENT_NULL-pe@0x55564d87fbd8 | add_fd_read_event_handler: new ethX-pe@0x55564d87fbd8 | libevent_malloc: new ptr-libevent@0x55564d87fc48 size 128 | setup callback for interface eth0 192.1.3.139:500 fd 241 | libevent_free: release ptr-libevent@0x55564d87fda8 | free_event_entry: release EVENT_NULL-pe@0x55564d87fd38 | add_fd_read_event_handler: new ethX-pe@0x55564d87fd38 | libevent_malloc: new ptr-libevent@0x55564d87fda8 size 128 | setup callback for interface eth0 192.1.3.140:4500 fd 240 | libevent_free: release ptr-libevent@0x55564d87ff08 | free_event_entry: release EVENT_NULL-pe@0x55564d87fe98 | add_fd_read_event_handler: new ethX-pe@0x55564d87fe98 | libevent_malloc: new ptr-libevent@0x55564d87ff08 size 128 | setup callback for interface eth0 192.1.3.140:500 fd 239 | libevent_free: release ptr-libevent@0x55564d880068 | free_event_entry: release EVENT_NULL-pe@0x55564d87fff8 | add_fd_read_event_handler: new ethX-pe@0x55564d87fff8 | libevent_malloc: new ptr-libevent@0x55564d880068 size 128 | setup callback for interface eth0 192.1.3.141:4500 fd 238 | libevent_free: release ptr-libevent@0x55564d8801c8 | free_event_entry: release EVENT_NULL-pe@0x55564d880158 | add_fd_read_event_handler: new ethX-pe@0x55564d880158 | libevent_malloc: new ptr-libevent@0x55564d8801c8 size 128 | setup callback for interface eth0 192.1.3.141:500 fd 237 | libevent_free: release ptr-libevent@0x55564d880328 | free_event_entry: release EVENT_NULL-pe@0x55564d8802b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8802b8 | libevent_malloc: new ptr-libevent@0x55564d880328 size 128 | setup callback for interface eth0 192.1.3.142:4500 fd 236 | libevent_free: release ptr-libevent@0x55564d880488 | free_event_entry: release EVENT_NULL-pe@0x55564d880418 | add_fd_read_event_handler: new ethX-pe@0x55564d880418 | libevent_malloc: new ptr-libevent@0x55564d880488 size 128 | setup callback for interface eth0 192.1.3.142:500 fd 235 | libevent_free: release ptr-libevent@0x55564d8805e8 | free_event_entry: release EVENT_NULL-pe@0x55564d880578 | add_fd_read_event_handler: new ethX-pe@0x55564d880578 | libevent_malloc: new ptr-libevent@0x55564d8805e8 size 128 | setup callback for interface eth0 192.1.3.143:4500 fd 234 | libevent_free: release ptr-libevent@0x55564d880748 | free_event_entry: release EVENT_NULL-pe@0x55564d8806d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8806d8 | libevent_malloc: new ptr-libevent@0x55564d880748 size 128 | setup callback for interface eth0 192.1.3.143:500 fd 233 | libevent_free: release ptr-libevent@0x55564d8808a8 | free_event_entry: release EVENT_NULL-pe@0x55564d880838 | add_fd_read_event_handler: new ethX-pe@0x55564d880838 | libevent_malloc: new ptr-libevent@0x55564d8808a8 size 128 | setup callback for interface eth0 192.1.3.144:4500 fd 232 | libevent_free: release ptr-libevent@0x55564d880a08 | free_event_entry: release EVENT_NULL-pe@0x55564d880998 | add_fd_read_event_handler: new ethX-pe@0x55564d880998 | libevent_malloc: new ptr-libevent@0x55564d880a08 size 128 | setup callback for interface eth0 192.1.3.144:500 fd 231 | libevent_free: release ptr-libevent@0x55564d880b68 | free_event_entry: release EVENT_NULL-pe@0x55564d880af8 | add_fd_read_event_handler: new ethX-pe@0x55564d880af8 | libevent_malloc: new ptr-libevent@0x55564d880b68 size 128 | setup callback for interface eth0 192.1.3.145:4500 fd 230 | libevent_free: release ptr-libevent@0x55564d880cc8 | free_event_entry: release EVENT_NULL-pe@0x55564d880c58 | add_fd_read_event_handler: new ethX-pe@0x55564d880c58 | libevent_malloc: new ptr-libevent@0x55564d880cc8 size 128 | setup callback for interface eth0 192.1.3.145:500 fd 229 | libevent_free: release ptr-libevent@0x55564d880e28 | free_event_entry: release EVENT_NULL-pe@0x55564d880db8 | add_fd_read_event_handler: new ethX-pe@0x55564d880db8 | libevent_malloc: new ptr-libevent@0x55564d880e28 size 128 | setup callback for interface eth0 192.1.3.146:4500 fd 228 | libevent_free: release ptr-libevent@0x55564d880f88 | free_event_entry: release EVENT_NULL-pe@0x55564d880f18 | add_fd_read_event_handler: new ethX-pe@0x55564d880f18 | libevent_malloc: new ptr-libevent@0x55564d880f88 size 128 | setup callback for interface eth0 192.1.3.146:500 fd 227 | libevent_free: release ptr-libevent@0x55564d8810e8 | free_event_entry: release EVENT_NULL-pe@0x55564d881078 | add_fd_read_event_handler: new ethX-pe@0x55564d881078 | libevent_malloc: new ptr-libevent@0x55564d8810e8 size 128 | setup callback for interface eth0 192.1.3.147:4500 fd 226 | libevent_free: release ptr-libevent@0x55564d881248 | free_event_entry: release EVENT_NULL-pe@0x55564d8811d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8811d8 | libevent_malloc: new ptr-libevent@0x55564d881248 size 128 | setup callback for interface eth0 192.1.3.147:500 fd 225 | libevent_free: release ptr-libevent@0x55564d8813a8 | free_event_entry: release EVENT_NULL-pe@0x55564d881338 | add_fd_read_event_handler: new ethX-pe@0x55564d881338 | libevent_malloc: new ptr-libevent@0x55564d8813a8 size 128 | setup callback for interface eth0 192.1.3.148:4500 fd 224 | libevent_free: release ptr-libevent@0x55564d881508 | free_event_entry: release EVENT_NULL-pe@0x55564d881498 | add_fd_read_event_handler: new ethX-pe@0x55564d881498 | libevent_malloc: new ptr-libevent@0x55564d881508 size 128 | setup callback for interface eth0 192.1.3.148:500 fd 223 | libevent_free: release ptr-libevent@0x55564d881668 | free_event_entry: release EVENT_NULL-pe@0x55564d8815f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8815f8 | libevent_malloc: new ptr-libevent@0x55564d881668 size 128 | setup callback for interface eth0 192.1.3.149:4500 fd 222 | libevent_free: release ptr-libevent@0x55564d8817c8 | free_event_entry: release EVENT_NULL-pe@0x55564d881758 | add_fd_read_event_handler: new ethX-pe@0x55564d881758 | libevent_malloc: new ptr-libevent@0x55564d8817c8 size 128 | setup callback for interface eth0 192.1.3.149:500 fd 221 | libevent_free: release ptr-libevent@0x55564d881928 | free_event_entry: release EVENT_NULL-pe@0x55564d8818b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8818b8 | libevent_malloc: new ptr-libevent@0x55564d881928 size 128 | setup callback for interface eth0 192.1.3.150:4500 fd 220 | libevent_free: release ptr-libevent@0x55564d881a88 | free_event_entry: release EVENT_NULL-pe@0x55564d881a18 | add_fd_read_event_handler: new ethX-pe@0x55564d881a18 | libevent_malloc: new ptr-libevent@0x55564d881a88 size 128 | setup callback for interface eth0 192.1.3.150:500 fd 219 | libevent_free: release ptr-libevent@0x55564d881be8 | free_event_entry: release EVENT_NULL-pe@0x55564d881b78 | add_fd_read_event_handler: new ethX-pe@0x55564d881b78 | libevent_malloc: new ptr-libevent@0x55564d881be8 size 128 | setup callback for interface eth0 192.1.3.151:4500 fd 218 | libevent_free: release ptr-libevent@0x55564d881d48 | free_event_entry: release EVENT_NULL-pe@0x55564d881cd8 | add_fd_read_event_handler: new ethX-pe@0x55564d881cd8 | libevent_malloc: new ptr-libevent@0x55564d881d48 size 128 | setup callback for interface eth0 192.1.3.151:500 fd 217 | libevent_free: release ptr-libevent@0x55564d881ea8 | free_event_entry: release EVENT_NULL-pe@0x55564d881e38 | add_fd_read_event_handler: new ethX-pe@0x55564d881e38 | libevent_malloc: new ptr-libevent@0x55564d881ea8 size 128 | setup callback for interface eth0 192.1.3.152:4500 fd 216 | libevent_free: release ptr-libevent@0x55564d882008 | free_event_entry: release EVENT_NULL-pe@0x55564d881f98 | add_fd_read_event_handler: new ethX-pe@0x55564d881f98 | libevent_malloc: new ptr-libevent@0x55564d882008 size 128 | setup callback for interface eth0 192.1.3.152:500 fd 215 | libevent_free: release ptr-libevent@0x55564d882168 | free_event_entry: release EVENT_NULL-pe@0x55564d8820f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8820f8 | libevent_malloc: new ptr-libevent@0x55564d882168 size 128 | setup callback for interface eth0 192.1.3.153:4500 fd 214 | libevent_free: release ptr-libevent@0x55564d8822c8 | free_event_entry: release EVENT_NULL-pe@0x55564d882258 | add_fd_read_event_handler: new ethX-pe@0x55564d882258 | libevent_malloc: new ptr-libevent@0x55564d8822c8 size 128 | setup callback for interface eth0 192.1.3.153:500 fd 213 | libevent_free: release ptr-libevent@0x55564d882428 | free_event_entry: release EVENT_NULL-pe@0x55564d8823b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8823b8 | libevent_malloc: new ptr-libevent@0x55564d882428 size 128 | setup callback for interface eth0 192.1.3.154:4500 fd 212 | libevent_free: release ptr-libevent@0x55564d882588 | free_event_entry: release EVENT_NULL-pe@0x55564d882518 | add_fd_read_event_handler: new ethX-pe@0x55564d882518 | libevent_malloc: new ptr-libevent@0x55564d882588 size 128 | setup callback for interface eth0 192.1.3.154:500 fd 211 | libevent_free: release ptr-libevent@0x55564d8826e8 | free_event_entry: release EVENT_NULL-pe@0x55564d882678 | add_fd_read_event_handler: new ethX-pe@0x55564d882678 | libevent_malloc: new ptr-libevent@0x55564d8826e8 size 128 | setup callback for interface eth0 192.1.3.155:4500 fd 210 | libevent_free: release ptr-libevent@0x55564d882848 | free_event_entry: release EVENT_NULL-pe@0x55564d8827d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8827d8 | libevent_malloc: new ptr-libevent@0x55564d882848 size 128 | setup callback for interface eth0 192.1.3.155:500 fd 209 | libevent_free: release ptr-libevent@0x55564d8829a8 | free_event_entry: release EVENT_NULL-pe@0x55564d882938 | add_fd_read_event_handler: new ethX-pe@0x55564d882938 | libevent_malloc: new ptr-libevent@0x55564d8829a8 size 128 | setup callback for interface eth0 192.1.3.156:4500 fd 208 | libevent_free: release ptr-libevent@0x55564d882b08 | free_event_entry: release EVENT_NULL-pe@0x55564d882a98 | add_fd_read_event_handler: new ethX-pe@0x55564d882a98 | libevent_malloc: new ptr-libevent@0x55564d882b08 size 128 | setup callback for interface eth0 192.1.3.156:500 fd 207 | libevent_free: release ptr-libevent@0x55564d882c68 | free_event_entry: release EVENT_NULL-pe@0x55564d882bf8 | add_fd_read_event_handler: new ethX-pe@0x55564d882bf8 | libevent_malloc: new ptr-libevent@0x55564d882c68 size 128 | setup callback for interface eth0 192.1.3.157:4500 fd 206 | libevent_free: release ptr-libevent@0x55564d882dc8 | free_event_entry: release EVENT_NULL-pe@0x55564d882d58 | add_fd_read_event_handler: new ethX-pe@0x55564d882d58 | libevent_malloc: new ptr-libevent@0x55564d882dc8 size 128 | setup callback for interface eth0 192.1.3.157:500 fd 205 | libevent_free: release ptr-libevent@0x55564d882f28 | free_event_entry: release EVENT_NULL-pe@0x55564d882eb8 | add_fd_read_event_handler: new ethX-pe@0x55564d882eb8 | libevent_malloc: new ptr-libevent@0x55564d882f28 size 128 | setup callback for interface eth0 192.1.3.158:4500 fd 204 | libevent_free: release ptr-libevent@0x55564d883088 | free_event_entry: release EVENT_NULL-pe@0x55564d883018 | add_fd_read_event_handler: new ethX-pe@0x55564d883018 | libevent_malloc: new ptr-libevent@0x55564d883088 size 128 | setup callback for interface eth0 192.1.3.158:500 fd 203 | libevent_free: release ptr-libevent@0x55564d8831e8 | free_event_entry: release EVENT_NULL-pe@0x55564d883178 | add_fd_read_event_handler: new ethX-pe@0x55564d883178 | libevent_malloc: new ptr-libevent@0x55564d8831e8 size 128 | setup callback for interface eth0 192.1.3.159:4500 fd 202 | libevent_free: release ptr-libevent@0x55564d883348 | free_event_entry: release EVENT_NULL-pe@0x55564d8832d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8832d8 | libevent_malloc: new ptr-libevent@0x55564d883348 size 128 | setup callback for interface eth0 192.1.3.159:500 fd 201 | libevent_free: release ptr-libevent@0x55564d8834a8 | free_event_entry: release EVENT_NULL-pe@0x55564d883438 | add_fd_read_event_handler: new ethX-pe@0x55564d883438 | libevent_malloc: new ptr-libevent@0x55564d8834a8 size 128 | setup callback for interface eth0 192.1.3.160:4500 fd 200 | libevent_free: release ptr-libevent@0x55564d883608 | free_event_entry: release EVENT_NULL-pe@0x55564d883598 | add_fd_read_event_handler: new ethX-pe@0x55564d883598 | libevent_malloc: new ptr-libevent@0x55564d883608 size 128 | setup callback for interface eth0 192.1.3.160:500 fd 199 | libevent_free: release ptr-libevent@0x55564d883768 | free_event_entry: release EVENT_NULL-pe@0x55564d8836f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8836f8 | libevent_malloc: new ptr-libevent@0x55564d883768 size 128 | setup callback for interface eth0 192.1.3.161:4500 fd 198 | libevent_free: release ptr-libevent@0x55564d8838c8 | free_event_entry: release EVENT_NULL-pe@0x55564d883858 | add_fd_read_event_handler: new ethX-pe@0x55564d883858 | libevent_malloc: new ptr-libevent@0x55564d8838c8 size 128 | setup callback for interface eth0 192.1.3.161:500 fd 197 | libevent_free: release ptr-libevent@0x55564d883a28 | free_event_entry: release EVENT_NULL-pe@0x55564d8839b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8839b8 | libevent_malloc: new ptr-libevent@0x55564d883a28 size 128 | setup callback for interface eth0 192.1.3.162:4500 fd 196 | libevent_free: release ptr-libevent@0x55564d883b88 | free_event_entry: release EVENT_NULL-pe@0x55564d883b18 | add_fd_read_event_handler: new ethX-pe@0x55564d883b18 | libevent_malloc: new ptr-libevent@0x55564d883b88 size 128 | setup callback for interface eth0 192.1.3.162:500 fd 195 | libevent_free: release ptr-libevent@0x55564d883ce8 | free_event_entry: release EVENT_NULL-pe@0x55564d883c78 | add_fd_read_event_handler: new ethX-pe@0x55564d883c78 | libevent_malloc: new ptr-libevent@0x55564d883ce8 size 128 | setup callback for interface eth0 192.1.3.163:4500 fd 194 | libevent_free: release ptr-libevent@0x55564d883e48 | free_event_entry: release EVENT_NULL-pe@0x55564d883dd8 | add_fd_read_event_handler: new ethX-pe@0x55564d883dd8 | libevent_malloc: new ptr-libevent@0x55564d883e48 size 128 | setup callback for interface eth0 192.1.3.163:500 fd 193 | libevent_free: release ptr-libevent@0x55564d883fa8 | free_event_entry: release EVENT_NULL-pe@0x55564d883f38 | add_fd_read_event_handler: new ethX-pe@0x55564d883f38 | libevent_malloc: new ptr-libevent@0x55564d883fa8 size 128 | setup callback for interface eth0 192.1.3.164:4500 fd 192 | libevent_free: release ptr-libevent@0x55564d884108 | free_event_entry: release EVENT_NULL-pe@0x55564d884098 | add_fd_read_event_handler: new ethX-pe@0x55564d884098 | libevent_malloc: new ptr-libevent@0x55564d884108 size 128 | setup callback for interface eth0 192.1.3.164:500 fd 191 | libevent_free: release ptr-libevent@0x55564d884268 | free_event_entry: release EVENT_NULL-pe@0x55564d8841f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8841f8 | libevent_malloc: new ptr-libevent@0x55564d884268 size 128 | setup callback for interface eth0 192.1.3.165:4500 fd 190 | libevent_free: release ptr-libevent@0x55564d8843c8 | free_event_entry: release EVENT_NULL-pe@0x55564d884358 | add_fd_read_event_handler: new ethX-pe@0x55564d884358 | libevent_malloc: new ptr-libevent@0x55564d8843c8 size 128 | setup callback for interface eth0 192.1.3.165:500 fd 189 | libevent_free: release ptr-libevent@0x55564d884528 | free_event_entry: release EVENT_NULL-pe@0x55564d8844b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8844b8 | libevent_malloc: new ptr-libevent@0x55564d884528 size 128 | setup callback for interface eth0 192.1.3.166:4500 fd 188 | libevent_free: release ptr-libevent@0x55564d884688 | free_event_entry: release EVENT_NULL-pe@0x55564d884618 | add_fd_read_event_handler: new ethX-pe@0x55564d884618 | libevent_malloc: new ptr-libevent@0x55564d884688 size 128 | setup callback for interface eth0 192.1.3.166:500 fd 187 | libevent_free: release ptr-libevent@0x55564d8847e8 | free_event_entry: release EVENT_NULL-pe@0x55564d884778 | add_fd_read_event_handler: new ethX-pe@0x55564d884778 | libevent_malloc: new ptr-libevent@0x55564d8847e8 size 128 | setup callback for interface eth0 192.1.3.167:4500 fd 186 | libevent_free: release ptr-libevent@0x55564d884948 | free_event_entry: release EVENT_NULL-pe@0x55564d8848d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8848d8 | libevent_malloc: new ptr-libevent@0x55564d884948 size 128 | setup callback for interface eth0 192.1.3.167:500 fd 185 | libevent_free: release ptr-libevent@0x55564d884aa8 | free_event_entry: release EVENT_NULL-pe@0x55564d884a38 | add_fd_read_event_handler: new ethX-pe@0x55564d884a38 | libevent_malloc: new ptr-libevent@0x55564d884aa8 size 128 | setup callback for interface eth0 192.1.3.168:4500 fd 184 | libevent_free: release ptr-libevent@0x55564d884c08 | free_event_entry: release EVENT_NULL-pe@0x55564d884b98 | add_fd_read_event_handler: new ethX-pe@0x55564d884b98 | libevent_malloc: new ptr-libevent@0x55564d884c08 size 128 | setup callback for interface eth0 192.1.3.168:500 fd 183 | libevent_free: release ptr-libevent@0x55564d884d68 | free_event_entry: release EVENT_NULL-pe@0x55564d884cf8 | add_fd_read_event_handler: new ethX-pe@0x55564d884cf8 | libevent_malloc: new ptr-libevent@0x55564d884d68 size 128 | setup callback for interface eth0 192.1.3.169:4500 fd 182 | libevent_free: release ptr-libevent@0x55564d884ec8 | free_event_entry: release EVENT_NULL-pe@0x55564d884e58 | add_fd_read_event_handler: new ethX-pe@0x55564d884e58 | libevent_malloc: new ptr-libevent@0x55564d884ec8 size 128 | setup callback for interface eth0 192.1.3.169:500 fd 181 | libevent_free: release ptr-libevent@0x55564d885028 | free_event_entry: release EVENT_NULL-pe@0x55564d884fb8 | add_fd_read_event_handler: new ethX-pe@0x55564d884fb8 | libevent_malloc: new ptr-libevent@0x55564d885028 size 128 | setup callback for interface eth0 192.1.3.170:4500 fd 180 | libevent_free: release ptr-libevent@0x55564d885188 | free_event_entry: release EVENT_NULL-pe@0x55564d885118 | add_fd_read_event_handler: new ethX-pe@0x55564d885118 | libevent_malloc: new ptr-libevent@0x55564d885188 size 128 | setup callback for interface eth0 192.1.3.170:500 fd 179 | libevent_free: release ptr-libevent@0x55564d8852e8 | free_event_entry: release EVENT_NULL-pe@0x55564d885278 | add_fd_read_event_handler: new ethX-pe@0x55564d885278 | libevent_malloc: new ptr-libevent@0x55564d8852e8 size 128 | setup callback for interface eth0 192.1.3.171:4500 fd 178 | libevent_free: release ptr-libevent@0x55564d885448 | free_event_entry: release EVENT_NULL-pe@0x55564d8853d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8853d8 | libevent_malloc: new ptr-libevent@0x55564d885448 size 128 | setup callback for interface eth0 192.1.3.171:500 fd 177 | libevent_free: release ptr-libevent@0x55564d8855a8 | free_event_entry: release EVENT_NULL-pe@0x55564d885538 | add_fd_read_event_handler: new ethX-pe@0x55564d885538 | libevent_malloc: new ptr-libevent@0x55564d8855a8 size 128 | setup callback for interface eth0 192.1.3.172:4500 fd 176 | libevent_free: release ptr-libevent@0x55564d885708 | free_event_entry: release EVENT_NULL-pe@0x55564d885698 | add_fd_read_event_handler: new ethX-pe@0x55564d885698 | libevent_malloc: new ptr-libevent@0x55564d885708 size 128 | setup callback for interface eth0 192.1.3.172:500 fd 175 | libevent_free: release ptr-libevent@0x55564d885868 | free_event_entry: release EVENT_NULL-pe@0x55564d8857f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8857f8 | libevent_malloc: new ptr-libevent@0x55564d885868 size 128 | setup callback for interface eth0 192.1.3.173:4500 fd 174 | libevent_free: release ptr-libevent@0x55564d8859c8 | free_event_entry: release EVENT_NULL-pe@0x55564d885958 | add_fd_read_event_handler: new ethX-pe@0x55564d885958 | libevent_malloc: new ptr-libevent@0x55564d8859c8 size 128 | setup callback for interface eth0 192.1.3.173:500 fd 173 | libevent_free: release ptr-libevent@0x55564d885b28 | free_event_entry: release EVENT_NULL-pe@0x55564d885ab8 | add_fd_read_event_handler: new ethX-pe@0x55564d885ab8 | libevent_malloc: new ptr-libevent@0x55564d885b28 size 128 | setup callback for interface eth0 192.1.3.174:4500 fd 172 | libevent_free: release ptr-libevent@0x55564d885c88 | free_event_entry: release EVENT_NULL-pe@0x55564d885c18 | add_fd_read_event_handler: new ethX-pe@0x55564d885c18 | libevent_malloc: new ptr-libevent@0x55564d885c88 size 128 | setup callback for interface eth0 192.1.3.174:500 fd 171 | libevent_free: release ptr-libevent@0x55564d885de8 | free_event_entry: release EVENT_NULL-pe@0x55564d885d78 | add_fd_read_event_handler: new ethX-pe@0x55564d885d78 | libevent_malloc: new ptr-libevent@0x55564d885de8 size 128 | setup callback for interface eth0 192.1.3.175:4500 fd 170 | libevent_free: release ptr-libevent@0x55564d885f48 | free_event_entry: release EVENT_NULL-pe@0x55564d885ed8 | add_fd_read_event_handler: new ethX-pe@0x55564d885ed8 | libevent_malloc: new ptr-libevent@0x55564d885f48 size 128 | setup callback for interface eth0 192.1.3.175:500 fd 169 | libevent_free: release ptr-libevent@0x55564d8860a8 | free_event_entry: release EVENT_NULL-pe@0x55564d886038 | add_fd_read_event_handler: new ethX-pe@0x55564d886038 | libevent_malloc: new ptr-libevent@0x55564d8860a8 size 128 | setup callback for interface eth0 192.1.3.176:4500 fd 168 | libevent_free: release ptr-libevent@0x55564d886208 | free_event_entry: release EVENT_NULL-pe@0x55564d886198 | add_fd_read_event_handler: new ethX-pe@0x55564d886198 | libevent_malloc: new ptr-libevent@0x55564d886208 size 128 | setup callback for interface eth0 192.1.3.176:500 fd 167 | libevent_free: release ptr-libevent@0x55564d886368 | free_event_entry: release EVENT_NULL-pe@0x55564d8862f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8862f8 | libevent_malloc: new ptr-libevent@0x55564d886368 size 128 | setup callback for interface eth0 192.1.3.177:4500 fd 166 | libevent_free: release ptr-libevent@0x55564d8864c8 | free_event_entry: release EVENT_NULL-pe@0x55564d886458 | add_fd_read_event_handler: new ethX-pe@0x55564d886458 | libevent_malloc: new ptr-libevent@0x55564d8864c8 size 128 | setup callback for interface eth0 192.1.3.177:500 fd 165 | libevent_free: release ptr-libevent@0x55564d886628 | free_event_entry: release EVENT_NULL-pe@0x55564d8865b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8865b8 | libevent_malloc: new ptr-libevent@0x55564d886628 size 128 | setup callback for interface eth0 192.1.3.178:4500 fd 164 | libevent_free: release ptr-libevent@0x55564d886788 | free_event_entry: release EVENT_NULL-pe@0x55564d886718 | add_fd_read_event_handler: new ethX-pe@0x55564d886718 | libevent_malloc: new ptr-libevent@0x55564d886788 size 128 | setup callback for interface eth0 192.1.3.178:500 fd 163 | libevent_free: release ptr-libevent@0x55564d8868e8 | free_event_entry: release EVENT_NULL-pe@0x55564d886878 | add_fd_read_event_handler: new ethX-pe@0x55564d886878 | libevent_malloc: new ptr-libevent@0x55564d8868e8 size 128 | setup callback for interface eth0 192.1.3.179:4500 fd 162 | libevent_free: release ptr-libevent@0x55564d886a48 | free_event_entry: release EVENT_NULL-pe@0x55564d8869d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8869d8 | libevent_malloc: new ptr-libevent@0x55564d886a48 size 128 | setup callback for interface eth0 192.1.3.179:500 fd 161 | libevent_free: release ptr-libevent@0x55564d886ba8 | free_event_entry: release EVENT_NULL-pe@0x55564d886b38 | add_fd_read_event_handler: new ethX-pe@0x55564d886b38 | libevent_malloc: new ptr-libevent@0x55564d886ba8 size 128 | setup callback for interface eth0 192.1.3.180:4500 fd 160 | libevent_free: release ptr-libevent@0x55564d886d08 | free_event_entry: release EVENT_NULL-pe@0x55564d886c98 | add_fd_read_event_handler: new ethX-pe@0x55564d886c98 | libevent_malloc: new ptr-libevent@0x55564d886d08 size 128 | setup callback for interface eth0 192.1.3.180:500 fd 159 | libevent_free: release ptr-libevent@0x55564d886e68 | free_event_entry: release EVENT_NULL-pe@0x55564d886df8 | add_fd_read_event_handler: new ethX-pe@0x55564d886df8 | libevent_malloc: new ptr-libevent@0x55564d886e68 size 128 | setup callback for interface eth0 192.1.3.181:4500 fd 158 | libevent_free: release ptr-libevent@0x55564d886fc8 | free_event_entry: release EVENT_NULL-pe@0x55564d886f58 | add_fd_read_event_handler: new ethX-pe@0x55564d886f58 | libevent_malloc: new ptr-libevent@0x55564d886fc8 size 128 | setup callback for interface eth0 192.1.3.181:500 fd 157 | libevent_free: release ptr-libevent@0x55564d887128 | free_event_entry: release EVENT_NULL-pe@0x55564d8870b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8870b8 | libevent_malloc: new ptr-libevent@0x55564d887128 size 128 | setup callback for interface eth0 192.1.3.182:4500 fd 156 | libevent_free: release ptr-libevent@0x55564d887288 | free_event_entry: release EVENT_NULL-pe@0x55564d887218 | add_fd_read_event_handler: new ethX-pe@0x55564d887218 | libevent_malloc: new ptr-libevent@0x55564d887288 size 128 | setup callback for interface eth0 192.1.3.182:500 fd 155 | libevent_free: release ptr-libevent@0x55564d8873e8 | free_event_entry: release EVENT_NULL-pe@0x55564d887378 | add_fd_read_event_handler: new ethX-pe@0x55564d887378 | libevent_malloc: new ptr-libevent@0x55564d8873e8 size 128 | setup callback for interface eth0 192.1.3.183:4500 fd 154 | libevent_free: release ptr-libevent@0x55564d887548 | free_event_entry: release EVENT_NULL-pe@0x55564d8874d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8874d8 | libevent_malloc: new ptr-libevent@0x55564d887548 size 128 | setup callback for interface eth0 192.1.3.183:500 fd 153 | libevent_free: release ptr-libevent@0x55564d8876a8 | free_event_entry: release EVENT_NULL-pe@0x55564d887638 | add_fd_read_event_handler: new ethX-pe@0x55564d887638 | libevent_malloc: new ptr-libevent@0x55564d8876a8 size 128 | setup callback for interface eth0 192.1.3.184:4500 fd 152 | libevent_free: release ptr-libevent@0x55564d887808 | free_event_entry: release EVENT_NULL-pe@0x55564d887798 | add_fd_read_event_handler: new ethX-pe@0x55564d887798 | libevent_malloc: new ptr-libevent@0x55564d887808 size 128 | setup callback for interface eth0 192.1.3.184:500 fd 151 | libevent_free: release ptr-libevent@0x55564d887968 | free_event_entry: release EVENT_NULL-pe@0x55564d8878f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8878f8 | libevent_malloc: new ptr-libevent@0x55564d887968 size 128 | setup callback for interface eth0 192.1.3.185:4500 fd 150 | libevent_free: release ptr-libevent@0x55564d887ac8 | free_event_entry: release EVENT_NULL-pe@0x55564d887a58 | add_fd_read_event_handler: new ethX-pe@0x55564d887a58 | libevent_malloc: new ptr-libevent@0x55564d887ac8 size 128 | setup callback for interface eth0 192.1.3.185:500 fd 149 | libevent_free: release ptr-libevent@0x55564d887c28 | free_event_entry: release EVENT_NULL-pe@0x55564d887bb8 | add_fd_read_event_handler: new ethX-pe@0x55564d887bb8 | libevent_malloc: new ptr-libevent@0x55564d887c28 size 128 | setup callback for interface eth0 192.1.3.186:4500 fd 148 | libevent_free: release ptr-libevent@0x55564d887d88 | free_event_entry: release EVENT_NULL-pe@0x55564d887d18 | add_fd_read_event_handler: new ethX-pe@0x55564d887d18 | libevent_malloc: new ptr-libevent@0x55564d887d88 size 128 | setup callback for interface eth0 192.1.3.186:500 fd 147 | libevent_free: release ptr-libevent@0x55564d887ee8 | free_event_entry: release EVENT_NULL-pe@0x55564d887e78 | add_fd_read_event_handler: new ethX-pe@0x55564d887e78 | libevent_malloc: new ptr-libevent@0x55564d887ee8 size 128 | setup callback for interface eth0 192.1.3.187:4500 fd 146 | libevent_free: release ptr-libevent@0x55564d888048 | free_event_entry: release EVENT_NULL-pe@0x55564d887fd8 | add_fd_read_event_handler: new ethX-pe@0x55564d887fd8 | libevent_malloc: new ptr-libevent@0x55564d888048 size 128 | setup callback for interface eth0 192.1.3.187:500 fd 145 | libevent_free: release ptr-libevent@0x55564d8881a8 | free_event_entry: release EVENT_NULL-pe@0x55564d888138 | add_fd_read_event_handler: new ethX-pe@0x55564d888138 | libevent_malloc: new ptr-libevent@0x55564d8881a8 size 128 | setup callback for interface eth0 192.1.3.188:4500 fd 144 | libevent_free: release ptr-libevent@0x55564d888308 | free_event_entry: release EVENT_NULL-pe@0x55564d888298 | add_fd_read_event_handler: new ethX-pe@0x55564d888298 | libevent_malloc: new ptr-libevent@0x55564d888308 size 128 | setup callback for interface eth0 192.1.3.188:500 fd 143 | libevent_free: release ptr-libevent@0x55564d888468 | free_event_entry: release EVENT_NULL-pe@0x55564d8883f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8883f8 | libevent_malloc: new ptr-libevent@0x55564d888468 size 128 | setup callback for interface eth0 192.1.3.189:4500 fd 142 | libevent_free: release ptr-libevent@0x55564d8885c8 | free_event_entry: release EVENT_NULL-pe@0x55564d888558 | add_fd_read_event_handler: new ethX-pe@0x55564d888558 | libevent_malloc: new ptr-libevent@0x55564d8885c8 size 128 | setup callback for interface eth0 192.1.3.189:500 fd 141 | libevent_free: release ptr-libevent@0x55564d888728 | free_event_entry: release EVENT_NULL-pe@0x55564d8886b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8886b8 | libevent_malloc: new ptr-libevent@0x55564d888728 size 128 | setup callback for interface eth0 192.1.3.190:4500 fd 140 | libevent_free: release ptr-libevent@0x55564d888888 | free_event_entry: release EVENT_NULL-pe@0x55564d888818 | add_fd_read_event_handler: new ethX-pe@0x55564d888818 | libevent_malloc: new ptr-libevent@0x55564d888888 size 128 | setup callback for interface eth0 192.1.3.190:500 fd 139 | libevent_free: release ptr-libevent@0x55564d8889e8 | free_event_entry: release EVENT_NULL-pe@0x55564d888978 | add_fd_read_event_handler: new ethX-pe@0x55564d888978 | libevent_malloc: new ptr-libevent@0x55564d8889e8 size 128 | setup callback for interface eth0 192.1.3.191:4500 fd 138 | libevent_free: release ptr-libevent@0x55564d888b48 | free_event_entry: release EVENT_NULL-pe@0x55564d888ad8 | add_fd_read_event_handler: new ethX-pe@0x55564d888ad8 | libevent_malloc: new ptr-libevent@0x55564d888b48 size 128 | setup callback for interface eth0 192.1.3.191:500 fd 137 | libevent_free: release ptr-libevent@0x55564d888ca8 | free_event_entry: release EVENT_NULL-pe@0x55564d888c38 | add_fd_read_event_handler: new ethX-pe@0x55564d888c38 | libevent_malloc: new ptr-libevent@0x55564d888ca8 size 128 | setup callback for interface eth0 192.1.3.192:4500 fd 136 | libevent_free: release ptr-libevent@0x55564d888e08 | free_event_entry: release EVENT_NULL-pe@0x55564d888d98 | add_fd_read_event_handler: new ethX-pe@0x55564d888d98 | libevent_malloc: new ptr-libevent@0x55564d888e08 size 128 | setup callback for interface eth0 192.1.3.192:500 fd 135 | libevent_free: release ptr-libevent@0x55564d888f68 | free_event_entry: release EVENT_NULL-pe@0x55564d888ef8 | add_fd_read_event_handler: new ethX-pe@0x55564d888ef8 | libevent_malloc: new ptr-libevent@0x55564d888f68 size 128 | setup callback for interface eth0 192.1.3.193:4500 fd 134 | libevent_free: release ptr-libevent@0x55564d8890c8 | free_event_entry: release EVENT_NULL-pe@0x55564d889058 | add_fd_read_event_handler: new ethX-pe@0x55564d889058 | libevent_malloc: new ptr-libevent@0x55564d8890c8 size 128 | setup callback for interface eth0 192.1.3.193:500 fd 133 | libevent_free: release ptr-libevent@0x55564d889228 | free_event_entry: release EVENT_NULL-pe@0x55564d8891b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8891b8 | libevent_malloc: new ptr-libevent@0x55564d889228 size 128 | setup callback for interface eth0 192.1.3.194:4500 fd 132 | libevent_free: release ptr-libevent@0x55564d889388 | free_event_entry: release EVENT_NULL-pe@0x55564d889318 | add_fd_read_event_handler: new ethX-pe@0x55564d889318 | libevent_malloc: new ptr-libevent@0x55564d889388 size 128 | setup callback for interface eth0 192.1.3.194:500 fd 131 | libevent_free: release ptr-libevent@0x55564d8894e8 | free_event_entry: release EVENT_NULL-pe@0x55564d889478 | add_fd_read_event_handler: new ethX-pe@0x55564d889478 | libevent_malloc: new ptr-libevent@0x55564d8894e8 size 128 | setup callback for interface eth0 192.1.3.195:4500 fd 130 | libevent_free: release ptr-libevent@0x55564d889648 | free_event_entry: release EVENT_NULL-pe@0x55564d8895d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8895d8 | libevent_malloc: new ptr-libevent@0x55564d889648 size 128 | setup callback for interface eth0 192.1.3.195:500 fd 129 | libevent_free: release ptr-libevent@0x55564d8897a8 | free_event_entry: release EVENT_NULL-pe@0x55564d889738 | add_fd_read_event_handler: new ethX-pe@0x55564d889738 | libevent_malloc: new ptr-libevent@0x55564d8897a8 size 128 | setup callback for interface eth0 192.1.3.196:4500 fd 128 | libevent_free: release ptr-libevent@0x55564d889908 | free_event_entry: release EVENT_NULL-pe@0x55564d889898 | add_fd_read_event_handler: new ethX-pe@0x55564d889898 | libevent_malloc: new ptr-libevent@0x55564d889908 size 128 | setup callback for interface eth0 192.1.3.196:500 fd 127 | libevent_free: release ptr-libevent@0x55564d889a68 | free_event_entry: release EVENT_NULL-pe@0x55564d8899f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8899f8 | libevent_malloc: new ptr-libevent@0x55564d889a68 size 128 | setup callback for interface eth0 192.1.3.197:4500 fd 126 | libevent_free: release ptr-libevent@0x55564d889bc8 | free_event_entry: release EVENT_NULL-pe@0x55564d889b58 | add_fd_read_event_handler: new ethX-pe@0x55564d889b58 | libevent_malloc: new ptr-libevent@0x55564d889bc8 size 128 | setup callback for interface eth0 192.1.3.197:500 fd 125 | libevent_free: release ptr-libevent@0x55564d889d28 | free_event_entry: release EVENT_NULL-pe@0x55564d889cb8 | add_fd_read_event_handler: new ethX-pe@0x55564d889cb8 | libevent_malloc: new ptr-libevent@0x55564d889d28 size 128 | setup callback for interface eth0 192.1.3.198:4500 fd 124 | libevent_free: release ptr-libevent@0x55564d889e88 | free_event_entry: release EVENT_NULL-pe@0x55564d889e18 | add_fd_read_event_handler: new ethX-pe@0x55564d889e18 | libevent_malloc: new ptr-libevent@0x55564d889e88 size 128 | setup callback for interface eth0 192.1.3.198:500 fd 123 | libevent_free: release ptr-libevent@0x55564d889fe8 | free_event_entry: release EVENT_NULL-pe@0x55564d889f78 | add_fd_read_event_handler: new ethX-pe@0x55564d889f78 | libevent_malloc: new ptr-libevent@0x55564d889fe8 size 128 | setup callback for interface eth0 192.1.3.199:4500 fd 122 | libevent_free: release ptr-libevent@0x55564d88a148 | free_event_entry: release EVENT_NULL-pe@0x55564d88a0d8 | add_fd_read_event_handler: new ethX-pe@0x55564d88a0d8 | libevent_malloc: new ptr-libevent@0x55564d88a148 size 128 | setup callback for interface eth0 192.1.3.199:500 fd 121 | libevent_free: release ptr-libevent@0x55564d88a2a8 | free_event_entry: release EVENT_NULL-pe@0x55564d88a238 | add_fd_read_event_handler: new ethX-pe@0x55564d88a238 | libevent_malloc: new ptr-libevent@0x55564d88a2a8 size 128 | setup callback for interface eth0 192.1.3.200:4500 fd 120 | libevent_free: release ptr-libevent@0x55564d88a408 | free_event_entry: release EVENT_NULL-pe@0x55564d88a398 | add_fd_read_event_handler: new ethX-pe@0x55564d88a398 | libevent_malloc: new ptr-libevent@0x55564d88a408 size 128 | setup callback for interface eth0 192.1.3.200:500 fd 119 | libevent_free: release ptr-libevent@0x55564d88a568 | free_event_entry: release EVENT_NULL-pe@0x55564d88a4f8 | add_fd_read_event_handler: new ethX-pe@0x55564d88a4f8 | libevent_malloc: new ptr-libevent@0x55564d88a568 size 128 | setup callback for interface eth0 192.1.3.201:4500 fd 118 | libevent_free: release ptr-libevent@0x55564d88a6c8 | free_event_entry: release EVENT_NULL-pe@0x55564d88a658 | add_fd_read_event_handler: new ethX-pe@0x55564d88a658 | libevent_malloc: new ptr-libevent@0x55564d88a6c8 size 128 | setup callback for interface eth0 192.1.3.201:500 fd 117 | libevent_free: release ptr-libevent@0x55564d88a828 | free_event_entry: release EVENT_NULL-pe@0x55564d88a7b8 | add_fd_read_event_handler: new ethX-pe@0x55564d88a7b8 | libevent_malloc: new ptr-libevent@0x55564d88a828 size 128 | setup callback for interface eth0 192.1.3.202:4500 fd 116 | libevent_free: release ptr-libevent@0x55564d88a988 | free_event_entry: release EVENT_NULL-pe@0x55564d88a918 | add_fd_read_event_handler: new ethX-pe@0x55564d88a918 | libevent_malloc: new ptr-libevent@0x55564d88a988 size 128 | setup callback for interface eth0 192.1.3.202:500 fd 115 | libevent_free: release ptr-libevent@0x55564d88aae8 | free_event_entry: release EVENT_NULL-pe@0x55564d88aa78 | add_fd_read_event_handler: new ethX-pe@0x55564d88aa78 | libevent_malloc: new ptr-libevent@0x55564d88aae8 size 128 | setup callback for interface eth0 192.1.3.203:4500 fd 114 | libevent_free: release ptr-libevent@0x55564d88ac48 | free_event_entry: release EVENT_NULL-pe@0x55564d88abd8 | add_fd_read_event_handler: new ethX-pe@0x55564d88abd8 | libevent_malloc: new ptr-libevent@0x55564d88ac48 size 128 | setup callback for interface eth0 192.1.3.203:500 fd 113 | libevent_free: release ptr-libevent@0x55564d88ada8 | free_event_entry: release EVENT_NULL-pe@0x55564d88ad38 | add_fd_read_event_handler: new ethX-pe@0x55564d88ad38 | libevent_malloc: new ptr-libevent@0x55564d88ada8 size 128 | setup callback for interface eth0 192.1.3.204:4500 fd 112 | libevent_free: release ptr-libevent@0x55564d88af08 | free_event_entry: release EVENT_NULL-pe@0x55564d88ae98 | add_fd_read_event_handler: new ethX-pe@0x55564d88ae98 | libevent_malloc: new ptr-libevent@0x55564d88af08 size 128 | setup callback for interface eth0 192.1.3.204:500 fd 111 | libevent_free: release ptr-libevent@0x55564d88b068 | free_event_entry: release EVENT_NULL-pe@0x55564d88aff8 | add_fd_read_event_handler: new ethX-pe@0x55564d88aff8 | libevent_malloc: new ptr-libevent@0x55564d88b068 size 128 | setup callback for interface eth0 192.1.3.205:4500 fd 110 | libevent_free: release ptr-libevent@0x55564d88b1c8 | free_event_entry: release EVENT_NULL-pe@0x55564d88b158 | add_fd_read_event_handler: new ethX-pe@0x55564d88b158 | libevent_malloc: new ptr-libevent@0x55564d88b1c8 size 128 | setup callback for interface eth0 192.1.3.205:500 fd 109 | libevent_free: release ptr-libevent@0x55564d88b328 | free_event_entry: release EVENT_NULL-pe@0x55564d88b2b8 | add_fd_read_event_handler: new ethX-pe@0x55564d88b2b8 | libevent_malloc: new ptr-libevent@0x55564d88b328 size 128 | setup callback for interface eth0 192.1.3.206:4500 fd 108 | libevent_free: release ptr-libevent@0x55564d88b488 | free_event_entry: release EVENT_NULL-pe@0x55564d88b418 | add_fd_read_event_handler: new ethX-pe@0x55564d88b418 | libevent_malloc: new ptr-libevent@0x55564d88b488 size 128 | setup callback for interface eth0 192.1.3.206:500 fd 107 | libevent_free: release ptr-libevent@0x55564d88b5e8 | free_event_entry: release EVENT_NULL-pe@0x55564d88b578 | add_fd_read_event_handler: new ethX-pe@0x55564d88b578 | libevent_malloc: new ptr-libevent@0x55564d88b5e8 size 128 | setup callback for interface eth0 192.1.3.207:4500 fd 106 | libevent_free: release ptr-libevent@0x55564d88b748 | free_event_entry: release EVENT_NULL-pe@0x55564d88b6d8 | add_fd_read_event_handler: new ethX-pe@0x55564d88b6d8 | libevent_malloc: new ptr-libevent@0x55564d88b748 size 128 | setup callback for interface eth0 192.1.3.207:500 fd 105 | libevent_free: release ptr-libevent@0x55564d88b8a8 | free_event_entry: release EVENT_NULL-pe@0x55564d88b838 | add_fd_read_event_handler: new ethX-pe@0x55564d88b838 | libevent_malloc: new ptr-libevent@0x55564d88b8a8 size 128 | setup callback for interface eth0 192.1.3.208:4500 fd 104 | libevent_free: release ptr-libevent@0x55564d88ba08 | free_event_entry: release EVENT_NULL-pe@0x55564d88b998 | add_fd_read_event_handler: new ethX-pe@0x55564d88b998 | libevent_malloc: new ptr-libevent@0x55564d88ba08 size 128 | setup callback for interface eth0 192.1.3.208:500 fd 103 | libevent_free: release ptr-libevent@0x55564d88bb68 | free_event_entry: release EVENT_NULL-pe@0x55564d88baf8 | add_fd_read_event_handler: new ethX-pe@0x55564d88baf8 | libevent_malloc: new ptr-libevent@0x55564d88bb68 size 128 | setup callback for interface eth0 192.1.3.210:4500 fd 102 | libevent_free: release ptr-libevent@0x55564d88bcc8 | free_event_entry: release EVENT_NULL-pe@0x55564d88bc58 | add_fd_read_event_handler: new ethX-pe@0x55564d88bc58 | libevent_malloc: new ptr-libevent@0x55564d88bcc8 size 128 | setup callback for interface eth0 192.1.3.210:500 fd 101 | libevent_free: release ptr-libevent@0x55564d88be28 | free_event_entry: release EVENT_NULL-pe@0x55564d88bdb8 | add_fd_read_event_handler: new ethX-pe@0x55564d88bdb8 | libevent_malloc: new ptr-libevent@0x55564d88be28 size 128 | setup callback for interface eth0 192.1.3.211:4500 fd 100 | libevent_free: release ptr-libevent@0x55564d88bf88 | free_event_entry: release EVENT_NULL-pe@0x55564d88bf18 | add_fd_read_event_handler: new ethX-pe@0x55564d88bf18 | libevent_malloc: new ptr-libevent@0x55564d88bf88 size 128 | setup callback for interface eth0 192.1.3.211:500 fd 99 | libevent_free: release ptr-libevent@0x55564d88c0e8 | free_event_entry: release EVENT_NULL-pe@0x55564d88c078 | add_fd_read_event_handler: new ethX-pe@0x55564d88c078 | libevent_malloc: new ptr-libevent@0x55564d88c0e8 size 128 | setup callback for interface eth0 192.1.3.212:4500 fd 98 | libevent_free: release ptr-libevent@0x55564d88c248 | free_event_entry: release EVENT_NULL-pe@0x55564d88c1d8 | add_fd_read_event_handler: new ethX-pe@0x55564d88c1d8 | libevent_malloc: new ptr-libevent@0x55564d88c248 size 128 | setup callback for interface eth0 192.1.3.212:500 fd 97 | libevent_free: release ptr-libevent@0x55564d88c3a8 | free_event_entry: release EVENT_NULL-pe@0x55564d88c338 | add_fd_read_event_handler: new ethX-pe@0x55564d88c338 | libevent_malloc: new ptr-libevent@0x55564d88c3a8 size 128 | setup callback for interface eth0 192.1.3.213:4500 fd 96 | libevent_free: release ptr-libevent@0x55564d88c508 | free_event_entry: release EVENT_NULL-pe@0x55564d88c498 | add_fd_read_event_handler: new ethX-pe@0x55564d88c498 | libevent_malloc: new ptr-libevent@0x55564d88c508 size 128 | setup callback for interface eth0 192.1.3.213:500 fd 95 | libevent_free: release ptr-libevent@0x55564d88c668 | free_event_entry: release EVENT_NULL-pe@0x55564d88c5f8 | add_fd_read_event_handler: new ethX-pe@0x55564d88c5f8 | libevent_malloc: new ptr-libevent@0x55564d88c668 size 128 | setup callback for interface eth0 192.1.3.214:4500 fd 94 | libevent_free: release ptr-libevent@0x55564d88c7c8 | free_event_entry: release EVENT_NULL-pe@0x55564d88c758 | add_fd_read_event_handler: new ethX-pe@0x55564d88c758 | libevent_malloc: new ptr-libevent@0x55564d88c7c8 size 128 | setup callback for interface eth0 192.1.3.214:500 fd 93 | libevent_free: release ptr-libevent@0x55564d88c928 | free_event_entry: release EVENT_NULL-pe@0x55564d88c8b8 | add_fd_read_event_handler: new ethX-pe@0x55564d88c8b8 | libevent_malloc: new ptr-libevent@0x55564d88c928 size 128 | setup callback for interface eth0 192.1.3.215:4500 fd 92 | libevent_free: release ptr-libevent@0x55564d88ca88 | free_event_entry: release EVENT_NULL-pe@0x55564d88ca18 | add_fd_read_event_handler: new ethX-pe@0x55564d88ca18 | libevent_malloc: new ptr-libevent@0x55564d88ca88 size 128 | setup callback for interface eth0 192.1.3.215:500 fd 91 | libevent_free: release ptr-libevent@0x55564d88cbe8 | free_event_entry: release EVENT_NULL-pe@0x55564d88cb78 | add_fd_read_event_handler: new ethX-pe@0x55564d88cb78 | libevent_malloc: new ptr-libevent@0x55564d88cbe8 size 128 | setup callback for interface eth0 192.1.3.216:4500 fd 90 | libevent_free: release ptr-libevent@0x55564d88cd48 | free_event_entry: release EVENT_NULL-pe@0x55564d88ccd8 | add_fd_read_event_handler: new ethX-pe@0x55564d88ccd8 | libevent_malloc: new ptr-libevent@0x55564d88cd48 size 128 | setup callback for interface eth0 192.1.3.216:500 fd 89 | libevent_free: release ptr-libevent@0x55564d88cea8 | free_event_entry: release EVENT_NULL-pe@0x55564d88ce38 | add_fd_read_event_handler: new ethX-pe@0x55564d88ce38 | libevent_malloc: new ptr-libevent@0x55564d88cea8 size 128 | setup callback for interface eth0 192.1.3.217:4500 fd 88 | libevent_free: release ptr-libevent@0x55564d88d008 | free_event_entry: release EVENT_NULL-pe@0x55564d88cf98 | add_fd_read_event_handler: new ethX-pe@0x55564d88cf98 | libevent_malloc: new ptr-libevent@0x55564d88d008 size 128 | setup callback for interface eth0 192.1.3.217:500 fd 87 | libevent_free: release ptr-libevent@0x55564d88d168 | free_event_entry: release EVENT_NULL-pe@0x55564d88d0f8 | add_fd_read_event_handler: new ethX-pe@0x55564d88d0f8 | libevent_malloc: new ptr-libevent@0x55564d88d168 size 128 | setup callback for interface eth0 192.1.3.218:4500 fd 86 | libevent_free: release ptr-libevent@0x55564d88d2c8 | free_event_entry: release EVENT_NULL-pe@0x55564d88d258 | add_fd_read_event_handler: new ethX-pe@0x55564d88d258 | libevent_malloc: new ptr-libevent@0x55564d88d2c8 size 128 | setup callback for interface eth0 192.1.3.218:500 fd 85 | libevent_free: release ptr-libevent@0x55564d88d428 | free_event_entry: release EVENT_NULL-pe@0x55564d88d3b8 | add_fd_read_event_handler: new ethX-pe@0x55564d88d3b8 | libevent_malloc: new ptr-libevent@0x55564d88d428 size 128 | setup callback for interface eth0 192.1.3.219:4500 fd 84 | libevent_free: release ptr-libevent@0x55564d88d588 | free_event_entry: release EVENT_NULL-pe@0x55564d88d518 | add_fd_read_event_handler: new ethX-pe@0x55564d88d518 | libevent_malloc: new ptr-libevent@0x55564d88d588 size 128 | setup callback for interface eth0 192.1.3.219:500 fd 83 | libevent_free: release ptr-libevent@0x55564d88d6e8 | free_event_entry: release EVENT_NULL-pe@0x55564d88d678 | add_fd_read_event_handler: new ethX-pe@0x55564d88d678 | libevent_malloc: new ptr-libevent@0x55564d88d6e8 size 128 | setup callback for interface eth0 192.1.3.220:4500 fd 82 | libevent_free: release ptr-libevent@0x55564d88d848 | free_event_entry: release EVENT_NULL-pe@0x55564d88d7d8 | add_fd_read_event_handler: new ethX-pe@0x55564d88d7d8 | libevent_malloc: new ptr-libevent@0x55564d88d848 size 128 | setup callback for interface eth0 192.1.3.220:500 fd 81 | libevent_free: release ptr-libevent@0x55564d88d9a8 | free_event_entry: release EVENT_NULL-pe@0x55564d88d938 | add_fd_read_event_handler: new ethX-pe@0x55564d88d938 | libevent_malloc: new ptr-libevent@0x55564d88d9a8 size 128 | setup callback for interface eth0 192.1.3.221:4500 fd 80 | libevent_free: release ptr-libevent@0x55564d88db08 | free_event_entry: release EVENT_NULL-pe@0x55564d88da98 | add_fd_read_event_handler: new ethX-pe@0x55564d88da98 | libevent_malloc: new ptr-libevent@0x55564d88db08 size 128 | setup callback for interface eth0 192.1.3.221:500 fd 79 | libevent_free: release ptr-libevent@0x55564d88dc68 | free_event_entry: release EVENT_NULL-pe@0x55564d88dbf8 | add_fd_read_event_handler: new ethX-pe@0x55564d88dbf8 | libevent_malloc: new ptr-libevent@0x55564d88dc68 size 128 | setup callback for interface eth0 192.1.3.222:4500 fd 78 | libevent_free: release ptr-libevent@0x55564d88ddc8 | free_event_entry: release EVENT_NULL-pe@0x55564d88dd58 | add_fd_read_event_handler: new ethX-pe@0x55564d88dd58 | libevent_malloc: new ptr-libevent@0x55564d88ddc8 size 128 | setup callback for interface eth0 192.1.3.222:500 fd 77 | libevent_free: release ptr-libevent@0x55564d88df28 | free_event_entry: release EVENT_NULL-pe@0x55564d88deb8 | add_fd_read_event_handler: new ethX-pe@0x55564d88deb8 | libevent_malloc: new ptr-libevent@0x55564d88df28 size 128 | setup callback for interface eth0 192.1.3.223:4500 fd 76 | libevent_free: release ptr-libevent@0x55564d88e088 | free_event_entry: release EVENT_NULL-pe@0x55564d88e018 | add_fd_read_event_handler: new ethX-pe@0x55564d88e018 | libevent_malloc: new ptr-libevent@0x55564d88e088 size 128 | setup callback for interface eth0 192.1.3.223:500 fd 75 | libevent_free: release ptr-libevent@0x55564d88e1e8 | free_event_entry: release EVENT_NULL-pe@0x55564d88e178 | add_fd_read_event_handler: new ethX-pe@0x55564d88e178 | libevent_malloc: new ptr-libevent@0x55564d88e1e8 size 128 | setup callback for interface eth0 192.1.3.224:4500 fd 74 | libevent_free: release ptr-libevent@0x55564d88e348 | free_event_entry: release EVENT_NULL-pe@0x55564d88e2d8 | add_fd_read_event_handler: new ethX-pe@0x55564d88e2d8 | libevent_malloc: new ptr-libevent@0x55564d88e348 size 128 | setup callback for interface eth0 192.1.3.224:500 fd 73 | libevent_free: release ptr-libevent@0x55564d88e4a8 | free_event_entry: release EVENT_NULL-pe@0x55564d88e438 | add_fd_read_event_handler: new ethX-pe@0x55564d88e438 | libevent_malloc: new ptr-libevent@0x55564d88e4a8 size 128 | setup callback for interface eth0 192.1.3.225:4500 fd 72 | libevent_free: release ptr-libevent@0x55564d88e608 | free_event_entry: release EVENT_NULL-pe@0x55564d88e598 | add_fd_read_event_handler: new ethX-pe@0x55564d88e598 | libevent_malloc: new ptr-libevent@0x55564d88e608 size 128 | setup callback for interface eth0 192.1.3.225:500 fd 71 | libevent_free: release ptr-libevent@0x55564d88e768 | free_event_entry: release EVENT_NULL-pe@0x55564d88e6f8 | add_fd_read_event_handler: new ethX-pe@0x55564d88e6f8 | libevent_malloc: new ptr-libevent@0x55564d88e768 size 128 | setup callback for interface eth0 192.1.3.226:4500 fd 70 | libevent_free: release ptr-libevent@0x55564d88e8c8 | free_event_entry: release EVENT_NULL-pe@0x55564d88e858 | add_fd_read_event_handler: new ethX-pe@0x55564d88e858 | libevent_malloc: new ptr-libevent@0x55564d88e8c8 size 128 | setup callback for interface eth0 192.1.3.226:500 fd 69 | libevent_free: release ptr-libevent@0x55564d88ea28 | free_event_entry: release EVENT_NULL-pe@0x55564d88e9b8 | add_fd_read_event_handler: new ethX-pe@0x55564d88e9b8 | libevent_malloc: new ptr-libevent@0x55564d88ea28 size 128 | setup callback for interface eth0 192.1.3.227:4500 fd 68 | libevent_free: release ptr-libevent@0x55564d88eb88 | free_event_entry: release EVENT_NULL-pe@0x55564d88eb18 | add_fd_read_event_handler: new ethX-pe@0x55564d88eb18 | libevent_malloc: new ptr-libevent@0x55564d88eb88 size 128 | setup callback for interface eth0 192.1.3.227:500 fd 67 | libevent_free: release ptr-libevent@0x55564d88ece8 | free_event_entry: release EVENT_NULL-pe@0x55564d88ec78 | add_fd_read_event_handler: new ethX-pe@0x55564d88ec78 | libevent_malloc: new ptr-libevent@0x55564d88ece8 size 128 | setup callback for interface eth0 192.1.3.228:4500 fd 66 | libevent_free: release ptr-libevent@0x55564d88ee48 | free_event_entry: release EVENT_NULL-pe@0x55564d88edd8 | add_fd_read_event_handler: new ethX-pe@0x55564d88edd8 | libevent_malloc: new ptr-libevent@0x55564d88ee48 size 128 | setup callback for interface eth0 192.1.3.228:500 fd 65 | libevent_free: release ptr-libevent@0x55564d88efa8 | free_event_entry: release EVENT_NULL-pe@0x55564d88ef38 | add_fd_read_event_handler: new ethX-pe@0x55564d88ef38 | libevent_malloc: new ptr-libevent@0x55564d88efa8 size 128 | setup callback for interface eth0 192.1.3.229:4500 fd 64 | libevent_free: release ptr-libevent@0x55564d88f108 | free_event_entry: release EVENT_NULL-pe@0x55564d88f098 | add_fd_read_event_handler: new ethX-pe@0x55564d88f098 | libevent_malloc: new ptr-libevent@0x55564d88f108 size 128 | setup callback for interface eth0 192.1.3.229:500 fd 63 | libevent_free: release ptr-libevent@0x55564d88f268 | free_event_entry: release EVENT_NULL-pe@0x55564d88f1f8 | add_fd_read_event_handler: new ethX-pe@0x55564d88f1f8 | libevent_malloc: new ptr-libevent@0x55564d88f268 size 128 | setup callback for interface eth0 192.1.3.230:4500 fd 62 | libevent_free: release ptr-libevent@0x55564d88f3c8 | free_event_entry: release EVENT_NULL-pe@0x55564d88f358 | add_fd_read_event_handler: new ethX-pe@0x55564d88f358 | libevent_malloc: new ptr-libevent@0x55564d88f3c8 size 128 | setup callback for interface eth0 192.1.3.230:500 fd 61 | libevent_free: release ptr-libevent@0x55564d88f528 | free_event_entry: release EVENT_NULL-pe@0x55564d88f4b8 | add_fd_read_event_handler: new ethX-pe@0x55564d88f4b8 | libevent_malloc: new ptr-libevent@0x55564d88f528 size 128 | setup callback for interface eth0 192.1.3.231:4500 fd 60 | libevent_free: release ptr-libevent@0x55564d88f688 | free_event_entry: release EVENT_NULL-pe@0x55564d88f618 | add_fd_read_event_handler: new ethX-pe@0x55564d88f618 | libevent_malloc: new ptr-libevent@0x55564d88f688 size 128 | setup callback for interface eth0 192.1.3.231:500 fd 59 | libevent_free: release ptr-libevent@0x55564d88f7e8 | free_event_entry: release EVENT_NULL-pe@0x55564d88f778 | add_fd_read_event_handler: new ethX-pe@0x55564d88f778 | libevent_malloc: new ptr-libevent@0x55564d88f7e8 size 128 | setup callback for interface eth0 192.1.3.232:4500 fd 58 | libevent_free: release ptr-libevent@0x55564d88f948 | free_event_entry: release EVENT_NULL-pe@0x55564d88f8d8 | add_fd_read_event_handler: new ethX-pe@0x55564d88f8d8 | libevent_malloc: new ptr-libevent@0x55564d88f948 size 128 | setup callback for interface eth0 192.1.3.232:500 fd 57 | libevent_free: release ptr-libevent@0x55564d88faa8 | free_event_entry: release EVENT_NULL-pe@0x55564d88fa38 | add_fd_read_event_handler: new ethX-pe@0x55564d88fa38 | libevent_malloc: new ptr-libevent@0x55564d88faa8 size 128 | setup callback for interface eth0 192.1.3.233:4500 fd 56 | libevent_free: release ptr-libevent@0x55564d88fc08 | free_event_entry: release EVENT_NULL-pe@0x55564d88fb98 | add_fd_read_event_handler: new ethX-pe@0x55564d88fb98 | libevent_malloc: new ptr-libevent@0x55564d88fc08 size 128 | setup callback for interface eth0 192.1.3.233:500 fd 55 | libevent_free: release ptr-libevent@0x55564d88fd68 | free_event_entry: release EVENT_NULL-pe@0x55564d88fcf8 | add_fd_read_event_handler: new ethX-pe@0x55564d88fcf8 | libevent_malloc: new ptr-libevent@0x55564d88fd68 size 128 | setup callback for interface eth0 192.1.3.234:4500 fd 54 | libevent_free: release ptr-libevent@0x55564d88fec8 | free_event_entry: release EVENT_NULL-pe@0x55564d88fe58 | add_fd_read_event_handler: new ethX-pe@0x55564d88fe58 | libevent_malloc: new ptr-libevent@0x55564d88fec8 size 128 | setup callback for interface eth0 192.1.3.234:500 fd 53 | libevent_free: release ptr-libevent@0x55564d890028 | free_event_entry: release EVENT_NULL-pe@0x55564d88ffb8 | add_fd_read_event_handler: new ethX-pe@0x55564d88ffb8 | libevent_malloc: new ptr-libevent@0x55564d890028 size 128 | setup callback for interface eth0 192.1.3.235:4500 fd 52 | libevent_free: release ptr-libevent@0x55564d890188 | free_event_entry: release EVENT_NULL-pe@0x55564d890118 | add_fd_read_event_handler: new ethX-pe@0x55564d890118 | libevent_malloc: new ptr-libevent@0x55564d890188 size 128 | setup callback for interface eth0 192.1.3.235:500 fd 51 | libevent_free: release ptr-libevent@0x55564d8902e8 | free_event_entry: release EVENT_NULL-pe@0x55564d890278 | add_fd_read_event_handler: new ethX-pe@0x55564d890278 | libevent_malloc: new ptr-libevent@0x55564d8902e8 size 128 | setup callback for interface eth0 192.1.3.236:4500 fd 50 | libevent_free: release ptr-libevent@0x55564d890448 | free_event_entry: release EVENT_NULL-pe@0x55564d8903d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8903d8 | libevent_malloc: new ptr-libevent@0x55564d890448 size 128 | setup callback for interface eth0 192.1.3.236:500 fd 49 | libevent_free: release ptr-libevent@0x55564d8905a8 | free_event_entry: release EVENT_NULL-pe@0x55564d890538 | add_fd_read_event_handler: new ethX-pe@0x55564d890538 | libevent_malloc: new ptr-libevent@0x55564d8905a8 size 128 | setup callback for interface eth0 192.1.3.237:4500 fd 48 | libevent_free: release ptr-libevent@0x55564d890708 | free_event_entry: release EVENT_NULL-pe@0x55564d890698 | add_fd_read_event_handler: new ethX-pe@0x55564d890698 | libevent_malloc: new ptr-libevent@0x55564d890708 size 128 | setup callback for interface eth0 192.1.3.237:500 fd 47 | libevent_free: release ptr-libevent@0x55564d890868 | free_event_entry: release EVENT_NULL-pe@0x55564d8907f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8907f8 | libevent_malloc: new ptr-libevent@0x55564d890868 size 128 | setup callback for interface eth0 192.1.3.238:4500 fd 46 | libevent_free: release ptr-libevent@0x55564d8909c8 | free_event_entry: release EVENT_NULL-pe@0x55564d890958 | add_fd_read_event_handler: new ethX-pe@0x55564d890958 | libevent_malloc: new ptr-libevent@0x55564d8909c8 size 128 | setup callback for interface eth0 192.1.3.238:500 fd 45 | libevent_free: release ptr-libevent@0x55564d890b28 | free_event_entry: release EVENT_NULL-pe@0x55564d890ab8 | add_fd_read_event_handler: new ethX-pe@0x55564d890ab8 | libevent_malloc: new ptr-libevent@0x55564d890b28 size 128 | setup callback for interface eth0 192.1.3.239:4500 fd 44 | libevent_free: release ptr-libevent@0x55564d890c88 | free_event_entry: release EVENT_NULL-pe@0x55564d890c18 | add_fd_read_event_handler: new ethX-pe@0x55564d890c18 | libevent_malloc: new ptr-libevent@0x55564d890c88 size 128 | setup callback for interface eth0 192.1.3.239:500 fd 43 | libevent_free: release ptr-libevent@0x55564d890de8 | free_event_entry: release EVENT_NULL-pe@0x55564d890d78 | add_fd_read_event_handler: new ethX-pe@0x55564d890d78 | libevent_malloc: new ptr-libevent@0x55564d890de8 size 128 | setup callback for interface eth0 192.1.3.240:4500 fd 42 | libevent_free: release ptr-libevent@0x55564d890f48 | free_event_entry: release EVENT_NULL-pe@0x55564d890ed8 | add_fd_read_event_handler: new ethX-pe@0x55564d890ed8 | libevent_malloc: new ptr-libevent@0x55564d890f48 size 128 | setup callback for interface eth0 192.1.3.240:500 fd 41 | libevent_free: release ptr-libevent@0x55564d8910a8 | free_event_entry: release EVENT_NULL-pe@0x55564d891038 | add_fd_read_event_handler: new ethX-pe@0x55564d891038 | libevent_malloc: new ptr-libevent@0x55564d8910a8 size 128 | setup callback for interface eth0 192.1.3.241:4500 fd 40 | libevent_free: release ptr-libevent@0x55564d891208 | free_event_entry: release EVENT_NULL-pe@0x55564d891198 | add_fd_read_event_handler: new ethX-pe@0x55564d891198 | libevent_malloc: new ptr-libevent@0x55564d891208 size 128 | setup callback for interface eth0 192.1.3.241:500 fd 39 | libevent_free: release ptr-libevent@0x55564d891368 | free_event_entry: release EVENT_NULL-pe@0x55564d8912f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8912f8 | libevent_malloc: new ptr-libevent@0x55564d891368 size 128 | setup callback for interface eth0 192.1.3.242:4500 fd 38 | libevent_free: release ptr-libevent@0x55564d8914c8 | free_event_entry: release EVENT_NULL-pe@0x55564d891458 | add_fd_read_event_handler: new ethX-pe@0x55564d891458 | libevent_malloc: new ptr-libevent@0x55564d8914c8 size 128 | setup callback for interface eth0 192.1.3.242:500 fd 37 | libevent_free: release ptr-libevent@0x55564d891628 | free_event_entry: release EVENT_NULL-pe@0x55564d8915b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8915b8 | libevent_malloc: new ptr-libevent@0x55564d891628 size 128 | setup callback for interface eth0 192.1.3.243:4500 fd 36 | libevent_free: release ptr-libevent@0x55564d891788 | free_event_entry: release EVENT_NULL-pe@0x55564d891718 | add_fd_read_event_handler: new ethX-pe@0x55564d891718 | libevent_malloc: new ptr-libevent@0x55564d891788 size 128 | setup callback for interface eth0 192.1.3.243:500 fd 35 | libevent_free: release ptr-libevent@0x55564d8918e8 | free_event_entry: release EVENT_NULL-pe@0x55564d891878 | add_fd_read_event_handler: new ethX-pe@0x55564d891878 | libevent_malloc: new ptr-libevent@0x55564d8918e8 size 128 | setup callback for interface eth0 192.1.3.244:4500 fd 34 | libevent_free: release ptr-libevent@0x55564d891a48 | free_event_entry: release EVENT_NULL-pe@0x55564d8919d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8919d8 | libevent_malloc: new ptr-libevent@0x55564d891a48 size 128 | setup callback for interface eth0 192.1.3.244:500 fd 33 | libevent_free: release ptr-libevent@0x55564d891ba8 | free_event_entry: release EVENT_NULL-pe@0x55564d891b38 | add_fd_read_event_handler: new ethX-pe@0x55564d891b38 | libevent_malloc: new ptr-libevent@0x55564d891ba8 size 128 | setup callback for interface eth0 192.1.3.245:4500 fd 32 | libevent_free: release ptr-libevent@0x55564d891d08 | free_event_entry: release EVENT_NULL-pe@0x55564d891c98 | add_fd_read_event_handler: new ethX-pe@0x55564d891c98 | libevent_malloc: new ptr-libevent@0x55564d891d08 size 128 | setup callback for interface eth0 192.1.3.245:500 fd 31 | libevent_free: release ptr-libevent@0x55564d891e68 | free_event_entry: release EVENT_NULL-pe@0x55564d891df8 | add_fd_read_event_handler: new ethX-pe@0x55564d891df8 | libevent_malloc: new ptr-libevent@0x55564d891e68 size 128 | setup callback for interface eth0 192.1.3.246:4500 fd 30 | libevent_free: release ptr-libevent@0x55564d891fc8 | free_event_entry: release EVENT_NULL-pe@0x55564d891f58 | add_fd_read_event_handler: new ethX-pe@0x55564d891f58 | libevent_malloc: new ptr-libevent@0x55564d891fc8 size 128 | setup callback for interface eth0 192.1.3.246:500 fd 29 | libevent_free: release ptr-libevent@0x55564d892128 | free_event_entry: release EVENT_NULL-pe@0x55564d8920b8 | add_fd_read_event_handler: new ethX-pe@0x55564d8920b8 | libevent_malloc: new ptr-libevent@0x55564d892128 size 128 | setup callback for interface eth0 192.1.3.247:4500 fd 28 | libevent_free: release ptr-libevent@0x55564d892288 | free_event_entry: release EVENT_NULL-pe@0x55564d892218 | add_fd_read_event_handler: new ethX-pe@0x55564d892218 | libevent_malloc: new ptr-libevent@0x55564d892288 size 128 | setup callback for interface eth0 192.1.3.247:500 fd 27 | libevent_free: release ptr-libevent@0x55564d8923e8 | free_event_entry: release EVENT_NULL-pe@0x55564d892378 | add_fd_read_event_handler: new ethX-pe@0x55564d892378 | libevent_malloc: new ptr-libevent@0x55564d8923e8 size 128 | setup callback for interface eth0 192.1.3.248:4500 fd 26 | libevent_free: release ptr-libevent@0x55564d892548 | free_event_entry: release EVENT_NULL-pe@0x55564d8924d8 | add_fd_read_event_handler: new ethX-pe@0x55564d8924d8 | libevent_malloc: new ptr-libevent@0x55564d892548 size 128 | setup callback for interface eth0 192.1.3.248:500 fd 25 | libevent_free: release ptr-libevent@0x55564d8926a8 | free_event_entry: release EVENT_NULL-pe@0x55564d892638 | add_fd_read_event_handler: new ethX-pe@0x55564d892638 | libevent_malloc: new ptr-libevent@0x55564d8926a8 size 128 | setup callback for interface eth0 192.1.3.249:4500 fd 24 | libevent_free: release ptr-libevent@0x55564d892808 | free_event_entry: release EVENT_NULL-pe@0x55564d892798 | add_fd_read_event_handler: new ethX-pe@0x55564d892798 | libevent_malloc: new ptr-libevent@0x55564d892808 size 128 | setup callback for interface eth0 192.1.3.249:500 fd 23 | libevent_free: release ptr-libevent@0x55564d892968 | free_event_entry: release EVENT_NULL-pe@0x55564d8928f8 | add_fd_read_event_handler: new ethX-pe@0x55564d8928f8 | libevent_malloc: new ptr-libevent@0x55564d892968 size 128 | setup callback for interface eth0 192.1.3.250:4500 fd 22 | libevent_free: release ptr-libevent@0x55564d892ac8 | free_event_entry: release EVENT_NULL-pe@0x55564d892a58 | add_fd_read_event_handler: new ethX-pe@0x55564d892a58 | libevent_malloc: new ptr-libevent@0x55564d892ac8 size 128 | setup callback for interface eth0 192.1.3.250:500 fd 21 | libevent_free: release ptr-libevent@0x55564d892c28 | free_event_entry: release EVENT_NULL-pe@0x55564d892bb8 | add_fd_read_event_handler: new ethX-pe@0x55564d892bb8 | libevent_malloc: new ptr-libevent@0x55564d892c28 size 128 | setup callback for interface eth0 192.1.3.251:4500 fd 20 | libevent_free: release ptr-libevent@0x55564d892d88 | free_event_entry: release EVENT_NULL-pe@0x55564d892d18 | add_fd_read_event_handler: new ethX-pe@0x55564d892d18 | libevent_malloc: new ptr-libevent@0x55564d892d88 size 128 | setup callback for interface eth0 192.1.3.251:500 fd 19 | libevent_free: release ptr-libevent@0x55564d892ee8 | free_event_entry: release EVENT_NULL-pe@0x55564d892e78 | add_fd_read_event_handler: new ethX-pe@0x55564d892e78 | libevent_malloc: new ptr-libevent@0x55564d892ee8 size 128 | setup callback for interface eth0 192.1.3.252:4500 fd 18 | libevent_free: release ptr-libevent@0x55564d893048 | free_event_entry: release EVENT_NULL-pe@0x55564d892fd8 | add_fd_read_event_handler: new ethX-pe@0x55564d892fd8 | libevent_malloc: new ptr-libevent@0x55564d893048 size 128 | setup callback for interface eth0 192.1.3.252:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | Processing PSK at line 1: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 12 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 15544 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0296 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x55564d982518 | State DB: adding IKEv2 state #1 in UNDEFINED | pstats #1 ikev2.ike started | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-1" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-1" IKE SA #1 "road-eastnet-nonat-1" "road-eastnet-nonat-1" #1: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-1 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-1": constructed local IKE proposals for road-eastnet-nonat-1 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 1 for state #1 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x55564d854538 size 128 | #1 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-1" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 0 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.257 milliseconds in whack | crypto helper 0 starting work-order 1 for state #1 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 1 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.000759 seconds | (#1) spent 0.763 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f49bc002888 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 1 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #1 | **emit ISAKMP Message: | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | ikev2 g^x 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | ikev2 g^x e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | ikev2 g^x 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | ikev2 g^x d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | ikev2 g^x bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | ikev2 g^x cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | ikev2 g^x a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | ikev2 g^x 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | ikev2 g^x 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | ikev2 g^x a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | ikev2 g^x 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | ikev2 g^x 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | ikev2 g^x 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | ikev2 g^x 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | ikev2 g^x 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 6c 81 ec d5 | IKEv2 nonce 82 da 0b 53 85 2a b4 64 c0 69 04 b8 1b 02 ce 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 0b 50 11 31 32 5e 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 01 | natd_hash: port=500 | natd_hash: hash= ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 9b 62 8c c8 | natd_hash: hash= 8d be 28 30 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 9b 62 8c c8 | Notify data 8d be 28 30 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 0b 50 11 31 32 5e 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | natd_hash: hash= 3c f2 9d 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | Notify data 3c f2 9d 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #1 to 4294967295 after switching state | Message ID: IKE #1 skipping update_recv as MD is fake | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.1:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d854538 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x55564d854538 size 128 | #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10575.973709 | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD | #1 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc002888 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-1" | stop processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0639 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-2' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #2 at 0x55564d983698 | State DB: adding IKEv2 state #2 in UNDEFINED | pstats #2 ikev2.ike started | Message ID: init #2: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #2: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #2; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-2" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-2" IKE SA #2 "road-eastnet-nonat-2" "road-eastnet-nonat-2" #2: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-2 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-2": constructed local IKE proposals for road-eastnet-nonat-2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 2 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f49bc002888 size 128 | #2 spent 0.164 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 2 for state #2 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 2 | RESET processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-2" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.278 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 2 time elapsed 0.001 seconds | (#2) spent 1.01 milliseconds in crypto helper computing work-order 2: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 2 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f49b4002888 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 2 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #2 | **emit ISAKMP Message: | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | ikev2 g^x e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | ikev2 g^x 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | ikev2 g^x 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | ikev2 g^x 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | ikev2 g^x 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | ikev2 g^x c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | ikev2 g^x f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | ikev2 g^x af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | ikev2 g^x 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | ikev2 g^x b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | ikev2 g^x 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | ikev2 g^x 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | ikev2 g^x f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | ikev2 g^x 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | ikev2 g^x af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 60 1d 2d ae d0 87 e0 96 cd ed db 0c db 54 9b 90 | IKEv2 nonce 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc 4f d5 8c ae | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1c b4 20 af 98 40 80 ba | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 02 | natd_hash: port=500 | natd_hash: hash= 16 60 d8 d8 6e 4d 05 93 47 74 48 21 a5 43 25 86 | natd_hash: hash= 98 1e bd 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 60 d8 d8 6e 4d 05 93 47 74 48 21 a5 43 25 86 | Notify data 98 1e bd 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1c b4 20 af 98 40 80 ba | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | natd_hash: hash= 65 d0 e1 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | Notify data 65 d0 e1 6f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #2 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #2: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #2 to 4294967295 after switching state | Message ID: IKE #2 skipping update_recv as MD is fake | Message ID: sent #2 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.2:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x55564d987058 size 128 | #2 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.096995 | resume sending helper answer for #2 suppresed complete_v2_state_transition() and stole MD | #2 spent 0.711 milliseconds in resume sending helper answer | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4002888 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-3' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #3 at 0x55564d986388 | State DB: adding IKEv2 state #3 in UNDEFINED | pstats #3 ikev2.ike started | Message ID: init #3: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #3: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #3; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-3" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-3" IKE SA #3 "road-eastnet-nonat-3" "road-eastnet-nonat-3" #3: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-3 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-3": constructed local IKE proposals for road-eastnet-nonat-3 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 3 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f49b4002888 size 128 | #3 spent 0.198 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | RESET processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 3 for state #3 | RESET processing: connection "road-eastnet-nonat-3" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 3 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.631 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 3 time elapsed 0.000684 seconds | (#3) spent 0.689 milliseconds in crypto helper computing work-order 3: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 3 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f49b8002888 size 128 | libevent_realloc: release ptr-libevent@0x55564d7fd728 | libevent_realloc: new ptr-libevent@0x7f49b80027d8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 3 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #3 | **emit ISAKMP Message: | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ikev2 g^x ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | ikev2 g^x 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | ikev2 g^x 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | ikev2 g^x 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | ikev2 g^x 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | ikev2 g^x 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | ikev2 g^x f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | ikev2 g^x 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | ikev2 g^x e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | ikev2 g^x e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | ikev2 g^x e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | ikev2 g^x 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | ikev2 g^x be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | ikev2 g^x b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | ikev2 g^x 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 13 87 5d 17 | IKEv2 nonce c5 91 0a 98 e9 b4 21 77 75 45 f9 ff c8 f7 57 66 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 31 d5 93 4f 07 a2 cf a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 03 | natd_hash: port=500 | natd_hash: hash= 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 c8 3a b3 9c | natd_hash: hash= 49 f1 c3 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 c8 3a b3 9c | Notify data 49 f1 c3 f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 31 d5 93 4f 07 a2 cf a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | natd_hash: hash= 61 aa 46 35 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | Notify data 61 aa 46 35 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #3 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #3: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #3 to 4294967295 after switching state | Message ID: IKE #3 skipping update_recv as MD is fake | Message ID: sent #3 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.3:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 | libevent_malloc: new ptr-libevent@0x55564d986e78 size 128 | #3 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.158199 | resume sending helper answer for #3 suppresed complete_v2_state_transition() and stole MD | #3 spent 0.456 milliseconds in resume sending helper answer | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8002888 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-4' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #4 at 0x55564d987b98 | State DB: adding IKEv2 state #4 in UNDEFINED | pstats #4 ikev2.ike started | Message ID: init #4: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #4: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #4; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-4" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-4" IKE SA #4 "road-eastnet-nonat-4" "road-eastnet-nonat-4" #4: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-4 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-4": constructed local IKE proposals for road-eastnet-nonat-4 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 4 for state #4 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f49b8002888 size 128 | #4 spent 0.159 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 4 for state #4 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 4 | RESET processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-4" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.258 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 4 time elapsed 0.001 seconds | (#4) spent 0.999 milliseconds in crypto helper computing work-order 4: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 4 for state #4 to event queue | scheduling resume sending helper answer for #4 | libevent_malloc: new ptr-libevent@0x7f49ac0055c8 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 4 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #4 | **emit ISAKMP Message: | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | ikev2 g^x 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | ikev2 g^x 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | ikev2 g^x 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | ikev2 g^x f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | ikev2 g^x 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | ikev2 g^x 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | ikev2 g^x 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | ikev2 g^x 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | ikev2 g^x 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | ikev2 g^x d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | ikev2 g^x dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | ikev2 g^x 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | ikev2 g^x b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | ikev2 g^x 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | ikev2 g^x 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 30 64 ae 68 43 9f 7e df f1 41 a4 bc ed c1 dd a1 | IKEv2 nonce 59 38 e9 94 9b ba fa 21 18 4c a0 d5 90 15 c4 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 23 31 16 6d 91 8e 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 04 | natd_hash: port=500 | natd_hash: hash= e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 b4 22 83 30 | natd_hash: hash= 19 4d 35 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 b4 22 83 30 | Notify data 19 4d 35 91 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 23 31 16 6d 91 8e 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | natd_hash: hash= a0 00 88 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | Notify data a0 00 88 af | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #4 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #4: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #4 to 4294967295 after switching state | Message ID: IKE #4 skipping update_recv as MD is fake | Message ID: sent #4 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.4:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4 | libevent_malloc: new ptr-libevent@0x55564d988688 size 128 | #4 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.21878 | resume sending helper answer for #4 suppresed complete_v2_state_transition() and stole MD | #4 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac0055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-5' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #5 at 0x55564d9892f8 | State DB: adding IKEv2 state #5 in UNDEFINED | pstats #5 ikev2.ike started | Message ID: init #5: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #5: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #5; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-5" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-5" IKE SA #5 "road-eastnet-nonat-5" "road-eastnet-nonat-5" #5: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-5 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-5": constructed local IKE proposals for road-eastnet-nonat-5 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 5 for state #5 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f49ac0055c8 size 128 | #5 spent 0.173 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | RESET processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-5" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 6 starting work-order 5 for state #5 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 5 | spent 0.333 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 5 time elapsed 0.000948 seconds | (#5) spent 0.949 milliseconds in crypto helper computing work-order 5: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 5 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7f49b00055c8 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 5 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #5 | **emit ISAKMP Message: | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | ikev2 g^x 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | ikev2 g^x 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | ikev2 g^x f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | ikev2 g^x 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | ikev2 g^x 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | ikev2 g^x 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | ikev2 g^x f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | ikev2 g^x 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | ikev2 g^x 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | ikev2 g^x 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | ikev2 g^x 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | ikev2 g^x 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | ikev2 g^x 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | ikev2 g^x a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | ikev2 g^x 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8b bc fd 40 df 1e 6e e3 08 32 2a d7 eb 7b 28 d9 | IKEv2 nonce c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 89 89 ac bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9b 99 7c 54 a1 e5 1c 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 05 | natd_hash: port=500 | natd_hash: hash= e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 f1 4f 51 cb | natd_hash: hash= b3 82 1f 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 f1 4f 51 cb | Notify data b3 82 1f 3f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9b 99 7c 54 a1 e5 1c 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | natd_hash: hash= cd 80 c3 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | Notify data cd 80 c3 34 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #5 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #5: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #5 to 4294967295 after switching state | Message ID: IKE #5 skipping update_recv as MD is fake | Message ID: sent #5 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.5:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac0055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #5 | libevent_malloc: new ptr-libevent@0x55564d988738 size 128 | #5 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.280581 | resume sending helper answer for #5 suppresed complete_v2_state_transition() and stole MD | #5 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b00055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-6' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #6 at 0x55564d98a9a8 | State DB: adding IKEv2 state #6 in UNDEFINED | pstats #6 ikev2.ike started | Message ID: init #6: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #6: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #6; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-6" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-6" IKE SA #6 "road-eastnet-nonat-6" "road-eastnet-nonat-6" #6: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-6 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-6": constructed local IKE proposals for road-eastnet-nonat-6 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 6 for state #6 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #6 | libevent_malloc: new ptr-libevent@0x7f49b00055c8 size 128 | #6 spent 0.21 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | RESET processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 starting work-order 6 for state #6 | RESET processing: connection "road-eastnet-nonat-6" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 6 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.388 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 6 time elapsed 0.000943 seconds | (#6) spent 0.934 milliseconds in crypto helper computing work-order 6: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 6 for state #6 to event queue | scheduling resume sending helper answer for #6 | libevent_malloc: new ptr-libevent@0x7f49a40055c8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 6 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #6 | **emit ISAKMP Message: | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | ikev2 g^x fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | ikev2 g^x a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | ikev2 g^x 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | ikev2 g^x bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | ikev2 g^x 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | ikev2 g^x 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | ikev2 g^x 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | ikev2 g^x 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | ikev2 g^x da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | ikev2 g^x 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | ikev2 g^x 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | ikev2 g^x 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | ikev2 g^x 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ikev2 g^x ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | ikev2 g^x c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a 4c e0 1f 53 | IKEv2 nonce 4c 00 8d 6d 60 31 41 74 58 9a c0 7e 26 de 89 a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 63 77 73 88 7f 48 49 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 06 | natd_hash: port=500 | natd_hash: hash= b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e db 49 ba 84 | natd_hash: hash= 78 f8 63 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e db 49 ba 84 | Notify data 78 f8 63 59 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 63 77 73 88 7f 48 49 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | natd_hash: hash= f4 d8 9b e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | Notify data f4 d8 9b e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #6 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #6: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #6 to 4294967295 after switching state | Message ID: IKE #6 skipping update_recv as MD is fake | Message ID: sent #6 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.6:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | state #6 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b00055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #6 | libevent_malloc: new ptr-libevent@0x55564d989de8 size 128 | #6 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.341985 | resume sending helper answer for #6 suppresed complete_v2_state_transition() and stole MD | #6 spent 0.502 milliseconds in resume sending helper answer | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0938 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-7' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #7 at 0x55564d98c7b8 | State DB: adding IKEv2 state #7 in UNDEFINED | pstats #7 ikev2.ike started | Message ID: init #7: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #7: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #7; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-7" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-7" IKE SA #7 "road-eastnet-nonat-7" "road-eastnet-nonat-7" #7: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-7 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-7": constructed local IKE proposals for road-eastnet-nonat-7 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 7 for state #7 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a40058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f49a40055c8 size 128 | #7 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-7" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 8 resuming | crypto helper 8 starting work-order 7 for state #7 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 7 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.271 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 7 time elapsed 0.001028 seconds | (#7) spent 1.01 milliseconds in crypto helper computing work-order 7: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 7 for state #7 to event queue | scheduling resume sending helper answer for #7 | libevent_malloc: new ptr-libevent@0x7f49a80055c8 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 7 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #7 | **emit ISAKMP Message: | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | ikev2 g^x 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | ikev2 g^x 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | ikev2 g^x 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | ikev2 g^x a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | ikev2 g^x 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | ikev2 g^x 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | ikev2 g^x b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | ikev2 g^x 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | ikev2 g^x 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ikev2 g^x ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | ikev2 g^x c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | ikev2 g^x 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | ikev2 g^x 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | ikev2 g^x 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | ikev2 g^x c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 8b 31 cd f7 43 58 52 3d 32 47 01 06 a7 7b e6 | IKEv2 nonce d2 ca 84 de d7 9b ae 0e 25 c8 00 6f d7 24 e4 c2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 43 ad 24 44 6a 17 ad | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 07 | natd_hash: port=500 | natd_hash: hash= 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba 8d 02 2b 8d | natd_hash: hash= ef c8 3b 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba 8d 02 2b 8d | Notify data ef c8 3b 27 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 43 ad 24 44 6a 17 ad | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | natd_hash: hash= 98 05 27 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | Notify data 98 05 27 47 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #7 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #7: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #7 to 4294967295 after switching state | Message ID: IKE #7 skipping update_recv as MD is fake | Message ID: sent #7 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.7:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a40058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7 | libevent_malloc: new ptr-libevent@0x55564d98b498 size 128 | #7 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.40282 | resume sending helper answer for #7 suppresed complete_v2_state_transition() and stole MD | #7 spent 0.408 milliseconds in resume sending helper answer | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a80055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-8' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #8 at 0x55564d98dc18 | State DB: adding IKEv2 state #8 in UNDEFINED | pstats #8 ikev2.ike started | Message ID: init #8: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #8: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #8; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-8" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-8" IKE SA #8 "road-eastnet-nonat-8" "road-eastnet-nonat-8" #8: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-8 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-8": constructed local IKE proposals for road-eastnet-nonat-8 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 8 for state #8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a80058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f49a80055c8 size 128 | crypto helper 9 resuming | crypto helper 9 starting work-order 8 for state #8 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 8 | #8 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-8" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.253 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 8 time elapsed 0.000987 seconds | (#8) spent 0.99 milliseconds in crypto helper computing work-order 8: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 8 for state #8 to event queue | scheduling resume sending helper answer for #8 | libevent_malloc: new ptr-libevent@0x7f499c0055c8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 8 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #8 | **emit ISAKMP Message: | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | ikev2 g^x 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | ikev2 g^x 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | ikev2 g^x d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | ikev2 g^x f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ikev2 g^x ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | ikev2 g^x 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | ikev2 g^x 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | ikev2 g^x e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | ikev2 g^x 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | ikev2 g^x 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | ikev2 g^x 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | ikev2 g^x b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | ikev2 g^x 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | ikev2 g^x 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | ikev2 g^x 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 fe 14 96 2f 46 78 90 de 11 54 57 76 eb 60 64 | IKEv2 nonce d0 32 52 72 1b ff b5 12 2c f6 09 eb f8 54 1e 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f4 75 f8 68 96 f9 41 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 08 | natd_hash: port=500 | natd_hash: hash= 92 39 a8 c7 98 d8 90 87 8b 94 52 4b 13 33 0d 58 | natd_hash: hash= 48 4a 52 db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 39 a8 c7 98 d8 90 87 8b 94 52 4b 13 33 0d 58 | Notify data 48 4a 52 db | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f4 75 f8 68 96 f9 41 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | natd_hash: hash= 56 e4 cf c3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | Notify data 56 e4 cf c3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #8 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #8: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #8 to 4294967295 after switching state | Message ID: IKE #8 skipping update_recv as MD is fake | Message ID: sent #8 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.8:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | state #8 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a80055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a80058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #8 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 | #8 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.469636 | resume sending helper answer for #8 suppresed complete_v2_state_transition() and stole MD | #8 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.47483; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f499c0055c8 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x55564d854538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #1 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-9' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #9 at 0x55564d98f278 | State DB: adding IKEv2 state #9 in UNDEFINED | pstats #9 ikev2.ike started | Message ID: init #9: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #9: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #9; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-9" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-9" IKE SA #9 "road-eastnet-nonat-9" "road-eastnet-nonat-9" #9: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-9 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-9": constructed local IKE proposals for road-eastnet-nonat-9 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 9 for state #9 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #9 | libevent_malloc: new ptr-libevent@0x55564d854538 size 128 | #9 spent 0.134 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 resuming | crypto helper 10 starting work-order 9 for state #9 | RESET processing: connection "road-eastnet-nonat-9" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 9 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.261 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 9 time elapsed 0.000778 seconds | (#9) spent 0.784 milliseconds in crypto helper computing work-order 9: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 9 for state #9 to event queue | scheduling resume sending helper answer for #9 | libevent_malloc: new ptr-libevent@0x7f49a00055c8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 9 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #9 | **emit ISAKMP Message: | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | ikev2 g^x 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | ikev2 g^x 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | ikev2 g^x 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | ikev2 g^x 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | ikev2 g^x fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | ikev2 g^x 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | ikev2 g^x 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | ikev2 g^x 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | ikev2 g^x cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | ikev2 g^x 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | ikev2 g^x 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | ikev2 g^x f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | ikev2 g^x 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | ikev2 g^x bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | ikev2 g^x b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 55 9b d2 68 | IKEv2 nonce f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b 8c f1 ad a9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 88 37 20 97 5c 24 cf 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 09 | natd_hash: port=500 | natd_hash: hash= db 53 0e ae 1e 4f ed 0c 5a be a6 46 06 0d 10 89 | natd_hash: hash= 67 5a 03 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 53 0e ae 1e 4f ed 0c 5a be a6 46 06 0d 10 89 | Notify data 67 5a 03 69 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 88 37 20 97 5c 24 cf 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | natd_hash: hash= 32 b8 9a cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | Notify data 32 b8 9a cc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #9 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #9: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #9 to 4294967295 after switching state | Message ID: IKE #9 skipping update_recv as MD is fake | Message ID: sent #9 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.9:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | state #9 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d854538 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #9 | libevent_malloc: new ptr-libevent@0x55564d98fd68 size 128 | #9 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.53051 | resume sending helper answer for #9 suppresed complete_v2_state_transition() and stole MD | #9 spent 0.377 milliseconds in resume sending helper answer | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-10' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #10 at 0x55564d9908d8 | State DB: adding IKEv2 state #10 in UNDEFINED | pstats #10 ikev2.ike started | Message ID: init #10: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #10: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #10; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-10" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-10" IKE SA #10 "road-eastnet-nonat-10" "road-eastnet-nonat-10" #10: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-10 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-10": constructed local IKE proposals for road-eastnet-nonat-10 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 10 for state #10 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #10 | libevent_malloc: new ptr-libevent@0x7f49a00055c8 size 128 | #10 spent 0.172 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | crypto helper 11 starting work-order 10 for state #10 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 10 | RESET processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-10" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.273 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 10 time elapsed 0.000614 seconds | (#10) spent 0.614 milliseconds in crypto helper computing work-order 10: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 10 for state #10 to event queue | scheduling resume sending helper answer for #10 | libevent_malloc: new ptr-libevent@0x7f49940055c8 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 10 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #10 | **emit ISAKMP Message: | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | ikev2 g^x 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | ikev2 g^x 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | ikev2 g^x e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | ikev2 g^x 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | ikev2 g^x b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | ikev2 g^x 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | ikev2 g^x 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | ikev2 g^x 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | ikev2 g^x fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | ikev2 g^x 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | ikev2 g^x 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | ikev2 g^x 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | ikev2 g^x 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | ikev2 g^x e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | ikev2 g^x 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d6 88 03 ec b5 b0 45 47 2e 11 bd 3d f9 6d 69 a4 | IKEv2 nonce fe 88 0b fa f4 56 4b ee dc f4 56 25 9e d8 bf 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4b 30 fe d5 ce 66 c7 7d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0a | natd_hash: port=500 | natd_hash: hash= 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 ee 0b 6a f8 | natd_hash: hash= c9 85 ae e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 ee 0b 6a f8 | Notify data c9 85 ae e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4b 30 fe d5 ce 66 c7 7d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | natd_hash: hash= 2b 9b 6f ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | Notify data 2b 9b 6f ef | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #10 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #10: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #10 to 4294967295 after switching state | Message ID: IKE #10 skipping update_recv as MD is fake | Message ID: sent #10 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.10:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | state #10 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #10 | libevent_malloc: new ptr-libevent@0x55564d9913c8 size 128 | #10 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.59167 | resume sending helper answer for #10 suppresed complete_v2_state_transition() and stole MD | #10 spent 0.416 milliseconds in resume sending helper answer | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49940055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.597842; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f49940055c8 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x55564d987058 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #2 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-11' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #11 at 0x55564d9920e8 | State DB: adding IKEv2 state #11 in UNDEFINED | pstats #11 ikev2.ike started | Message ID: init #11: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #11: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #11; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-11" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-11" IKE SA #11 "road-eastnet-nonat-11" "road-eastnet-nonat-11" #11: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-11 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-11": constructed local IKE proposals for road-eastnet-nonat-11 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 11 for state #11 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #11 | libevent_malloc: new ptr-libevent@0x55564d987058 size 128 | #11 spent 0.115 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 11 for state #11 | RESET processing: connection "road-eastnet-nonat-11" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 11 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.198 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 11 time elapsed 0.000997 seconds | (#11) spent 0.992 milliseconds in crypto helper computing work-order 11: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 11 for state #11 to event queue | scheduling resume sending helper answer for #11 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 | libevent_realloc: release ptr-libevent@0x7f49b80027d8 | libevent_realloc: new ptr-libevent@0x7f49980096c8 size 256 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 11 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #11 | **emit ISAKMP Message: | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | ikev2 g^x 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | ikev2 g^x cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | ikev2 g^x 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | ikev2 g^x 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ikev2 g^x ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | ikev2 g^x 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | ikev2 g^x a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | ikev2 g^x 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | ikev2 g^x 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | ikev2 g^x 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | ikev2 g^x 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | ikev2 g^x 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | ikev2 g^x 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | ikev2 g^x 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | ikev2 g^x d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a f3 75 60 66 56 71 a7 70 d7 5a 89 75 ee 92 7f | IKEv2 nonce 8e 1d 3a 50 cb 85 47 49 78 54 90 ba 66 22 fa 9e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2c 44 09 cd 4c e3 4e b3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0b | natd_hash: port=500 | natd_hash: hash= 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e 64 31 13 43 | natd_hash: hash= 2a 69 0c 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e 64 31 13 43 | Notify data 2a 69 0c 49 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2c 44 09 cd 4c e3 4e b3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | natd_hash: hash= 2f d0 27 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | Notify data 2f d0 27 26 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #11 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #11: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #11 to 4294967295 after switching state | Message ID: IKE #11 skipping update_recv as MD is fake | Message ID: sent #11 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.11:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | state #11 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d987058 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #11 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 | #11 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.652683 | resume sending helper answer for #11 suppresed complete_v2_state_transition() and stole MD | #11 spent 0.494 milliseconds in resume sending helper answer | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49980055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.658907; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x55564d986e78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #3 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-12' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #12 at 0x55564d993748 | State DB: adding IKEv2 state #12 in UNDEFINED | pstats #12 ikev2.ike started | Message ID: init #12: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #12: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #12; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-12" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-12" IKE SA #12 "road-eastnet-nonat-12" "road-eastnet-nonat-12" #12: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-12 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-12": constructed local IKE proposals for road-eastnet-nonat-12 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 12 for state #12 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #12 | libevent_malloc: new ptr-libevent@0x55564d986e78 size 128 | #12 spent 0.12 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-12" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | crypto helper 13 starting work-order 12 for state #12 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 12 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.244 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 12 time elapsed 0.000931 seconds | (#12) spent 0.94 milliseconds in crypto helper computing work-order 12: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 12 for state #12 to event queue | scheduling resume sending helper answer for #12 | libevent_malloc: new ptr-libevent@0x7f498c0055c8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 12 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #12 | **emit ISAKMP Message: | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | ikev2 g^x 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | ikev2 g^x a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | ikev2 g^x 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ikev2 g^x ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | ikev2 g^x b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | ikev2 g^x 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | ikev2 g^x 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | ikev2 g^x 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | ikev2 g^x d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | ikev2 g^x c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | ikev2 g^x 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | ikev2 g^x c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | ikev2 g^x 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | ikev2 g^x 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | ikev2 g^x 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 18 72 d4 58 | IKEv2 nonce 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 00 a5 9f 78 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e4 b1 94 f0 05 96 29 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0c | natd_hash: port=500 | natd_hash: hash= f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a a8 1c 5b 75 | natd_hash: hash= 8e e0 fa 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a a8 1c 5b 75 | Notify data 8e e0 fa 5f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e4 b1 94 f0 05 96 29 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | natd_hash: hash= f1 0d df 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | Notify data f1 0d df 32 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #12 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #12: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #12 to 4294967295 after switching state | Message ID: IKE #12 skipping update_recv as MD is fake | Message ID: sent #12 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.12:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | state #12 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d986e78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #12 | libevent_malloc: new ptr-libevent@0x55564d992bd8 size 128 | #12 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.711481 | resume sending helper answer for #12 suppresed complete_v2_state_transition() and stole MD | #12 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c0055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.719658; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f498c0055c8 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x55564d988688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #4 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0273 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-13' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #13 at 0x55564d994df8 | State DB: adding IKEv2 state #13 in UNDEFINED | pstats #13 ikev2.ike started | Message ID: init #13: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #13: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #13; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-13" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-13" IKE SA #13 "road-eastnet-nonat-13" "road-eastnet-nonat-13" #13: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-13 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-13": constructed local IKE proposals for road-eastnet-nonat-13 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 13 for state #13 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564d988688 size 128 | #13 spent 0.127 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 13 for state #13 | RESET processing: connection "road-eastnet-nonat-13" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 13 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.212 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 13 time elapsed 0.001002 seconds | (#13) spent 0.997 milliseconds in crypto helper computing work-order 13: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 13 for state #13 to event queue | scheduling resume sending helper answer for #13 | libevent_malloc: new ptr-libevent@0x7f49900055c8 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 13 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #13 | **emit ISAKMP Message: | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | ikev2 g^x 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | ikev2 g^x a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | ikev2 g^x e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | ikev2 g^x 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ikev2 g^x ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | ikev2 g^x e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | ikev2 g^x cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | ikev2 g^x 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | ikev2 g^x 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | ikev2 g^x bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | ikev2 g^x 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | ikev2 g^x f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ikev2 g^x ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | ikev2 g^x bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | ikev2 g^x f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 7d 75 79 b5 | IKEv2 nonce fc 1c 1e 62 31 2d 27 60 46 ee fa be 98 ef b7 0d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3b 87 d8 e1 56 1c 03 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0d | natd_hash: port=500 | natd_hash: hash= 3b fb 29 31 96 cf 0e d6 4f 05 01 91 df e5 ef 5f | natd_hash: hash= ed 14 6b d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b fb 29 31 96 cf 0e d6 4f 05 01 91 df e5 ef 5f | Notify data ed 14 6b d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3b 87 d8 e1 56 1c 03 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | natd_hash: hash= 6a 65 67 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | Notify data 6a 65 67 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #13 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #13: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #13 to 4294967295 after switching state | Message ID: IKE #13 skipping update_recv as MD is fake | Message ID: sent #13 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.13:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | state #13 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d988688 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564d986e78 size 128 | #13 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.771685 | resume sending helper answer for #13 suppresed complete_v2_state_transition() and stole MD | #13 spent 0.524 milliseconds in resume sending helper answer | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49900055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.781866; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f49900055c8 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x55564d988738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #5 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-14' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #14 at 0x55564d9964a8 | State DB: adding IKEv2 state #14 in UNDEFINED | pstats #14 ikev2.ike started | Message ID: init #14: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #14: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #14; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-14" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-14" IKE SA #14 "road-eastnet-nonat-14" "road-eastnet-nonat-14" #14: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-14 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-14": constructed local IKE proposals for road-eastnet-nonat-14 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 14 for state #14 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #14 | libevent_malloc: new ptr-libevent@0x55564d988738 size 128 | #14 spent 0.127 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 14 for state #14 | RESET processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 14 | RESET processing: connection "road-eastnet-nonat-14" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.209 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 14 time elapsed 0.000672 seconds | (#14) spent 0.678 milliseconds in crypto helper computing work-order 14: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 14 for state #14 to event queue | scheduling resume sending helper answer for #14 | libevent_malloc: new ptr-libevent@0x7f49840055c8 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 14 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #14 | **emit ISAKMP Message: | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | ikev2 g^x 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | ikev2 g^x e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | ikev2 g^x 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | ikev2 g^x 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | ikev2 g^x bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | ikev2 g^x aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | ikev2 g^x 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | ikev2 g^x 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | ikev2 g^x c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | ikev2 g^x f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | ikev2 g^x f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | ikev2 g^x 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | ikev2 g^x fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | ikev2 g^x 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | ikev2 g^x 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 10 c5 f1 59 | IKEv2 nonce 39 51 01 db 67 77 e3 72 3e 6c e5 c6 16 64 51 b1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c fa 82 69 07 f2 3c 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0e | natd_hash: port=500 | natd_hash: hash= df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 0f 85 6f 8d | natd_hash: hash= 86 30 bf 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 0f 85 6f 8d | Notify data 86 30 bf 9d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c fa 82 69 07 f2 3c 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | natd_hash: hash= 51 aa 07 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | Notify data 51 aa 07 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #14 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #14: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #14 to 4294967295 after switching state | Message ID: IKE #14 skipping update_recv as MD is fake | Message ID: sent #14 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.14:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | state #14 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d988738 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #14 | libevent_malloc: new ptr-libevent@0x55564d9958e8 size 128 | #14 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.832076 | resume sending helper answer for #14 suppresed complete_v2_state_transition() and stole MD | #14 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49840055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.842269; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500284 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #6 | libevent_malloc: new ptr-libevent@0x7f49840055c8 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x55564d989de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #6 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-15' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #15 at 0x55564d997c08 | State DB: adding IKEv2 state #15 in UNDEFINED | pstats #15 ikev2.ike started | Message ID: init #15: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #15: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #15; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-15" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-15" IKE SA #15 "road-eastnet-nonat-15" "road-eastnet-nonat-15" #15: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-15 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-15": constructed local IKE proposals for road-eastnet-nonat-15 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 15 for state #15 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #15 | libevent_malloc: new ptr-libevent@0x55564d989de8 size 128 | #15 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 15 for state #15 | RESET processing: connection "road-eastnet-nonat-15" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 15 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.267 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 15 time elapsed 0.000791 seconds | (#15) spent 0.802 milliseconds in crypto helper computing work-order 15: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 15 for state #15 to event queue | scheduling resume sending helper answer for #15 | libevent_malloc: new ptr-libevent@0x7f49880055c8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 15 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #15 | **emit ISAKMP Message: | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ikev2 g^x ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | ikev2 g^x 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | ikev2 g^x 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | ikev2 g^x cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | ikev2 g^x 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | ikev2 g^x 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | ikev2 g^x 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | ikev2 g^x 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | ikev2 g^x c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | ikev2 g^x 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | ikev2 g^x 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | ikev2 g^x 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | ikev2 g^x 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | ikev2 g^x 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | ikev2 g^x 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4d d5 10 40 9f c5 bd d2 d1 79 06 72 d7 9c 6e 96 | IKEv2 nonce 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b 57 af 88 c9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 70 cd 5d cd fc ed 37 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0f | natd_hash: port=500 | natd_hash: hash= 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 f1 57 73 fe | natd_hash: hash= 68 39 22 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 f1 57 73 fe | Notify data 68 39 22 44 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 70 cd 5d cd fc ed 37 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | natd_hash: hash= 58 f9 15 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | Notify data 58 f9 15 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #15 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #15: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #15 to 4294967295 after switching state | Message ID: IKE #15 skipping update_recv as MD is fake | Message ID: sent #15 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.15:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | state #15 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d989de8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #15 | libevent_malloc: new ptr-libevent@0x55564d996f98 size 128 | #15 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.891494 | resume sending helper answer for #15 suppresed complete_v2_state_transition() and stole MD | #15 spent 0.525 milliseconds in resume sending helper answer | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49880055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.903735; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f49880055c8 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x55564d98b498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #7 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-16' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #16 at 0x55564d999268 | State DB: adding IKEv2 state #16 in UNDEFINED | pstats #16 ikev2.ike started | Message ID: init #16: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #16: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #16; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-16" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-16" IKE SA #16 "road-eastnet-nonat-16" "road-eastnet-nonat-16" #16: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-16 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-16": constructed local IKE proposals for road-eastnet-nonat-16 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 16 for state #16 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a40058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #16 | libevent_malloc: new ptr-libevent@0x55564d98b498 size 128 | #16 spent 0.182 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 16 for state #16 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 16 | RESET processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-16" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.365 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 16 time elapsed 0.000715 seconds | (#16) spent 0.721 milliseconds in crypto helper computing work-order 16: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 16 for state #16 to event queue | scheduling resume sending helper answer for #16 | libevent_malloc: new ptr-libevent@0x7f497c0055c8 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 16 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #16 | **emit ISAKMP Message: | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | ikev2 g^x a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | ikev2 g^x 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | ikev2 g^x cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | ikev2 g^x 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | ikev2 g^x 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | ikev2 g^x d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | ikev2 g^x 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | ikev2 g^x 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | ikev2 g^x fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | ikev2 g^x a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | ikev2 g^x 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | ikev2 g^x 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | ikev2 g^x c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | ikev2 g^x fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | ikev2 g^x 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c fe f4 b9 dc | IKEv2 nonce f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a 92 3b 43 aa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 e1 db 38 c3 a4 b9 dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 10 | natd_hash: port=500 | natd_hash: hash= 4e 32 f5 70 09 d5 6a f2 18 51 bf ae 5a 95 ad 9d | natd_hash: hash= 1c 60 2d 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 32 f5 70 09 d5 6a f2 18 51 bf ae 5a 95 ad 9d | Notify data 1c 60 2d 8f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 e1 db 38 c3 a4 b9 dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | natd_hash: hash= 95 88 b4 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | Notify data 95 88 b4 b1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #16 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #16: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #16 to 4294967295 after switching state | Message ID: IKE #16 skipping update_recv as MD is fake | Message ID: sent #16 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.16:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | state #16 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d98b498 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a40058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #16 | libevent_malloc: new ptr-libevent@0x55564d989de8 size 128 | #16 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10576.95233 | resume sending helper answer for #16 suppresed complete_v2_state_transition() and stole MD | #16 spent 0.397 milliseconds in resume sending helper answer | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c0055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10576.970548; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500912 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f497c0055c8 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #8 spent 0.0952 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10576.976914; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #1 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x7f499c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #1 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-17' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #17 at 0x55564d99a8c8 | State DB: adding IKEv2 state #17 in UNDEFINED | pstats #17 ikev2.ike started | Message ID: init #17: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #17: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #17; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-17" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-17" IKE SA #17 "road-eastnet-nonat-17" "road-eastnet-nonat-17" #17: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-17 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-17": constructed local IKE proposals for road-eastnet-nonat-17 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 17 for state #17 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #17 | libevent_malloc: new ptr-libevent@0x7f499c0055c8 size 128 | #17 spent 0.16 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-17" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | crypto helper 3 starting work-order 17 for state #17 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 17 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.269 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 17 time elapsed 0.001537 seconds | (#17) spent 1.54 milliseconds in crypto helper computing work-order 17: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 17 for state #17 to event queue | scheduling resume sending helper answer for #17 | libevent_malloc: new ptr-libevent@0x7f49800055c8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 17 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #17 | **emit ISAKMP Message: | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | ikev2 g^x 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | ikev2 g^x 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | ikev2 g^x 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | ikev2 g^x a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ikev2 g^x ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | ikev2 g^x c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | ikev2 g^x c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | ikev2 g^x 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | ikev2 g^x 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | ikev2 g^x 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | ikev2 g^x 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | ikev2 g^x e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | ikev2 g^x 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | ikev2 g^x bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | ikev2 g^x 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e1 33 7c b0 03 98 2b 4b e2 41 00 41 a5 e6 69 9c | IKEv2 nonce 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb c8 01 9b 5b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 c1 45 e7 2d 85 b7 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 11 | natd_hash: port=500 | natd_hash: hash= 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 04 92 86 bf | natd_hash: hash= 8e 32 b4 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 04 92 86 bf | Notify data 8e 32 b4 fe | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 c1 45 e7 2d 85 b7 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | natd_hash: hash= 09 01 e8 cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | Notify data 09 01 e8 cc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #17 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #17: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #17 to 4294967295 after switching state | Message ID: IKE #17 skipping update_recv as MD is fake | Message ID: sent #17 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.17:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | state #17 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c0055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564d98b498 size 128 | #17 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.015431 | resume sending helper answer for #17 suppresed complete_v2_state_transition() and stole MD | #17 spent 0.503 milliseconds in resume sending helper answer | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49800055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.031671; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #9 | libevent_malloc: new ptr-libevent@0x7f49800055c8 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x55564d98fd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #9 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-18' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #18 at 0x55564d99c028 | State DB: adding IKEv2 state #18 in UNDEFINED | pstats #18 ikev2.ike started | Message ID: init #18: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #18: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #18; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-18" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-18" IKE SA #18 "road-eastnet-nonat-18" "road-eastnet-nonat-18" #18: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-18 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-18": constructed local IKE proposals for road-eastnet-nonat-18 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 18 for state #18 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564d98fd68 size 128 | #18 spent 0.225 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-18" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | crypto helper 17 starting work-order 18 for state #18 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 18 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.416 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 18 time elapsed 0.002076 seconds | (#18) spent 2.08 milliseconds in crypto helper computing work-order 18: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 18 for state #18 to event queue | scheduling resume sending helper answer for #18 | libevent_malloc: new ptr-libevent@0x7f49740055c8 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 18 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #18 | **emit ISAKMP Message: | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | ikev2 g^x bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | ikev2 g^x 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | ikev2 g^x b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | ikev2 g^x 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | ikev2 g^x 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | ikev2 g^x 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | ikev2 g^x a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | ikev2 g^x 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | ikev2 g^x 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | ikev2 g^x f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | ikev2 g^x 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | ikev2 g^x a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | ikev2 g^x e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | ikev2 g^x 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | ikev2 g^x 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a ca ba 81 fb 30 53 75 fe 42 3b 4b 83 62 b2 63 | IKEv2 nonce a2 a9 57 25 39 fb 71 93 e7 79 1e 42 ff 7e f1 f3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a1 0b 6e cb e6 25 9c 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 12 | natd_hash: port=500 | natd_hash: hash= a0 6d a7 eb 79 b2 4a 12 34 db ce dc d9 0f 2e 07 | natd_hash: hash= c0 60 07 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 6d a7 eb 79 b2 4a 12 34 db ce dc d9 0f 2e 07 | Notify data c0 60 07 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a1 0b 6e cb e6 25 9c 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | natd_hash: hash= 7f b8 e5 9a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | Notify data 7f b8 e5 9a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #18 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #18: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #18 to 4294967295 after switching state | Message ID: IKE #18 skipping update_recv as MD is fake | Message ID: sent #18 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.18:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | state #18 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d98fd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 | #18 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.090615 | resume sending helper answer for #18 suppresed complete_v2_state_transition() and stole MD | #18 spent 0.594 milliseconds in resume sending helper answer | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49740055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0765 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.092868; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #10 | libevent_malloc: new ptr-libevent@0x7f49740055c8 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x55564d9913c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #10 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0761 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.099237; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x55564d9913c8 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x7f49940055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #2 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-19' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #19 at 0x55564d99d688 | State DB: adding IKEv2 state #19 in UNDEFINED | pstats #19 ikev2.ike started | Message ID: init #19: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #19: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #19; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-19" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-19" IKE SA #19 "road-eastnet-nonat-19" "road-eastnet-nonat-19" #19: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-19 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-19": constructed local IKE proposals for road-eastnet-nonat-19 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 19 for state #19 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49940058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #19 | libevent_malloc: new ptr-libevent@0x7f49940055c8 size 128 | #19 spent 0.181 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | crypto helper 18 starting work-order 19 for state #19 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 19 | RESET processing: connection "road-eastnet-nonat-19" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.324 milliseconds in whack | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.153697; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #11 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #11 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 19 time elapsed 0.001457 seconds | (#19) spent 1.46 milliseconds in crypto helper computing work-order 19: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 19 for state #19 to event queue | scheduling resume sending helper answer for #19 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 19 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #19 | **emit ISAKMP Message: | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | ikev2 g^x a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | ikev2 g^x a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | ikev2 g^x d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | ikev2 g^x 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | ikev2 g^x 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | ikev2 g^x 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | ikev2 g^x f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | ikev2 g^x 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | ikev2 g^x 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | ikev2 g^x c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | ikev2 g^x dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | ikev2 g^x 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | ikev2 g^x 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | ikev2 g^x 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | ikev2 g^x 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa df 3b da 94 8f 4a 0c 84 fa 5a d2 bc 94 37 a7 | IKEv2 nonce 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e 46 95 b7 f7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 46 46 44 e6 ba 70 e0 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 13 | natd_hash: port=500 | natd_hash: hash= 85 2f ec ca 28 1e b1 51 5b 2e cf 95 64 8e 32 8c | natd_hash: hash= 18 3c 18 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 2f ec ca 28 1e b1 51 5b 2e cf 95 64 8e 32 8c | Notify data 18 3c 18 be | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 46 46 44 e6 ba 70 e0 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | natd_hash: hash= fb 40 cd 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | Notify data fb 40 cd 1c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #19 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #19: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #19 to 4294967295 after switching state | Message ID: IKE #19 skipping update_recv as MD is fake | Message ID: sent #19 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.19:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | state #19 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49940055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49940058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564d98fd68 size 128 | #19 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.154662 | resume sending helper answer for #19 suppresed complete_v2_state_transition() and stole MD | #19 spent 0.526 milliseconds in resume sending helper answer | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.160844; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002645 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x7f49980055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #3 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.212233; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #12 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x55564d992bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #12 spent 0.217 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0963 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.220744; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #4 | libevent_malloc: new ptr-libevent@0x55564d992bd8 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x7f498c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #4 spent 0.272 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-20' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #20 at 0x55564d99ede8 | State DB: adding IKEv2 state #20 in UNDEFINED | pstats #20 ikev2.ike started | Message ID: init #20: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #20: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #20; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-20" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-20" IKE SA #20 "road-eastnet-nonat-20" "road-eastnet-nonat-20" #20: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-20 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-20": constructed local IKE proposals for road-eastnet-nonat-20 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 20 for state #20 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f498c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #20 | libevent_malloc: new ptr-libevent@0x7f498c0055c8 size 128 | #20 spent 0.246 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-20" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.37 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 20 for state #20 recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 20 | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.192 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 20 time elapsed 0.00169 seconds | (#20) spent 1.7 milliseconds in crypto helper computing work-order 20: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 20 for state #20 to event queue | scheduling resume sending helper answer for #20 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 20 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #20 | **emit ISAKMP Message: | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | ikev2 g^x a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | ikev2 g^x c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | ikev2 g^x 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | ikev2 g^x 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | ikev2 g^x 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | ikev2 g^x 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | ikev2 g^x 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | ikev2 g^x 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | ikev2 g^x a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | ikev2 g^x 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | ikev2 g^x 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | ikev2 g^x 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | ikev2 g^x 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ikev2 g^x ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | ikev2 g^x 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 02 f1 72 d0 | IKEv2 nonce c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 fb 70 68 e2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 29 1b d9 cc b5 21 9f 17 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 14 | natd_hash: port=500 | natd_hash: hash= c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 58 83 20 5b | natd_hash: hash= 84 37 c4 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 58 83 20 5b | Notify data 84 37 c4 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 29 1b d9 cc b5 21 9f 17 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | natd_hash: hash= 85 6f 1d fb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | Notify data 85 6f 1d fb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #20 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #20: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #20 to 4294967295 after switching state | Message ID: IKE #20 skipping update_recv as MD is fake | Message ID: sent #20 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.20:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | state #20 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c0055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f498c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #20 | libevent_malloc: new ptr-libevent@0x55564d99e178 size 128 | #20 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.224931 | resume sending helper answer for #20 suppresed complete_v2_state_transition() and stole MD | #20 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c0055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.272433; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #13 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x55564d986e78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #13 spent 0.451 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.283407; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002826 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #5 | libevent_malloc: new ptr-libevent@0x55564d986e78 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x7f49900055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #5 spent 0.648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.253 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-21' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #21 at 0x55564d9a0448 | State DB: adding IKEv2 state #21 in UNDEFINED | pstats #21 ikev2.ike started | Message ID: init #21: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #21: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #21; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-21" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-21" IKE SA #21 "road-eastnet-nonat-21" "road-eastnet-nonat-21" #21: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-21 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-21": constructed local IKE proposals for road-eastnet-nonat-21 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 21 for state #21 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f49900055c8 size 128 | #21 spent 0.425 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 21 for state #21 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 21 | RESET processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-21" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.787 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 21 time elapsed 0.004679 seconds | (#21) spent 4.68 milliseconds in crypto helper computing work-order 21: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 21 for state #21 to event queue | scheduling resume sending helper answer for #21 | libevent_malloc: new ptr-libevent@0x7f49bc00a028 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 21 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #21 | **emit ISAKMP Message: | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | ikev2 g^x 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ikev2 g^x ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | ikev2 g^x a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | ikev2 g^x 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | ikev2 g^x 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | ikev2 g^x 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | ikev2 g^x 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | ikev2 g^x 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | ikev2 g^x 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ikev2 g^x ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | ikev2 g^x 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | ikev2 g^x c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | ikev2 g^x f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ikev2 g^x ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | ikev2 g^x 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b f6 a5 f6 39 | IKEv2 nonce e4 2f 3a 63 cd 20 cc db f5 76 cb 59 8c 38 eb 50 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e0 dc 4e d0 67 2c b5 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 15 | natd_hash: port=500 | natd_hash: hash= ed 00 7e 60 09 ee d7 4a b0 a8 53 68 51 23 eb fd | natd_hash: hash= eb 72 d4 94 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed 00 7e 60 09 ee d7 4a b0 a8 53 68 51 23 eb fd | Notify data eb 72 d4 94 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e0 dc 4e d0 67 2c b5 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | natd_hash: hash= b2 96 59 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | Notify data b2 96 59 14 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #21 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #21: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #21 to 4294967295 after switching state | Message ID: IKE #21 skipping update_recv as MD is fake | Message ID: sent #21 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.21:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | state #21 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49900055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #21 | libevent_malloc: new ptr-libevent@0x55564d9a0f38 size 128 | #21 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.317077 | resume sending helper answer for #21 suppresed complete_v2_state_transition() and stole MD | #21 spent 2.07 milliseconds in resume sending helper answer | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc00a028 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.332542; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #14 | libevent_malloc: new ptr-libevent@0x7f49bc00a028 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x55564d9958e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #14 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0885 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.343952; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001967 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #6 | libevent_malloc: new ptr-libevent@0x55564d9958e8 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x7f49840055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #6 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-22' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #22 at 0x55564d9a1ba8 | State DB: adding IKEv2 state #22 in UNDEFINED | pstats #22 ikev2.ike started | Message ID: init #22: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #22: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #22; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-22" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-22" IKE SA #22 "road-eastnet-nonat-22" "road-eastnet-nonat-22" #22: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-22 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-22": constructed local IKE proposals for road-eastnet-nonat-22 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 22 for state #22 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49840058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f49840055c8 size 128 | #22 spent 0.133 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 22 for state #22 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 22 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-22" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.265 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 22 time elapsed 0.000665 seconds | (#22) spent 0.67 milliseconds in crypto helper computing work-order 22: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 22 for state #22 to event queue | scheduling resume sending helper answer for #22 | libevent_malloc: new ptr-libevent@0x7f49b400a028 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 22 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #22 | **emit ISAKMP Message: | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | ikev2 g^x 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | ikev2 g^x 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | ikev2 g^x 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | ikev2 g^x 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | ikev2 g^x b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | ikev2 g^x 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | ikev2 g^x 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | ikev2 g^x 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | ikev2 g^x bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | ikev2 g^x 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | ikev2 g^x 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | ikev2 g^x f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | ikev2 g^x 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | ikev2 g^x 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | ikev2 g^x 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c 7d e1 33 0b | IKEv2 nonce f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 87 2e b7 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 10 10 b1 e6 69 51 b2 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 16 | natd_hash: port=500 | natd_hash: hash= 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e ab 70 e7 a7 | natd_hash: hash= c9 c5 16 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e ab 70 e7 a7 | Notify data c9 c5 16 5f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 10 10 b1 e6 69 51 b2 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | natd_hash: hash= dd bf fe 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | Notify data dd bf fe 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #22 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #22: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #22 to 4294967295 after switching state | Message ID: IKE #22 skipping update_recv as MD is fake | Message ID: sent #22 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.22:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | state #22 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49840055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49840058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #22 | libevent_malloc: new ptr-libevent@0x55564d9a2708 size 128 | #22 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.373587 | resume sending helper answer for #22 suppresed complete_v2_state_transition() and stole MD | #22 spent 0.357 milliseconds in resume sending helper answer | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b400a028 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.392803; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #15 | libevent_malloc: new ptr-libevent@0x7f49b400a028 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x55564d996f98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #15 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.404099; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #7 | libevent_malloc: new ptr-libevent@0x55564d996f98 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x7f49880055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #7 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-23' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #23 at 0x55564d9a3308 | State DB: adding IKEv2 state #23 in UNDEFINED | pstats #23 ikev2.ike started | Message ID: init #23: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #23: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #23; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-23" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-23" IKE SA #23 "road-eastnet-nonat-23" "road-eastnet-nonat-23" #23: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-23 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-23": constructed local IKE proposals for road-eastnet-nonat-23 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 23 for state #23 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49880058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #23 | libevent_malloc: new ptr-libevent@0x7f49880055c8 size 128 | #23 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-23" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 23 for state #23 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 23 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 23 time elapsed 0.000589 seconds | (#23) spent 0.59 milliseconds in crypto helper computing work-order 23: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 23 for state #23 to event queue | scheduling resume sending helper answer for #23 | libevent_malloc: new ptr-libevent@0x7f49b800a028 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 23 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #23 | **emit ISAKMP Message: | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | ikev2 g^x d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | ikev2 g^x 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | ikev2 g^x 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | ikev2 g^x c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | ikev2 g^x c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | ikev2 g^x 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | ikev2 g^x 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | ikev2 g^x 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ikev2 g^x ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | ikev2 g^x 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | ikev2 g^x a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | ikev2 g^x 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | ikev2 g^x 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | ikev2 g^x cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | ikev2 g^x 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6d 0e 25 20 e5 ce 07 35 91 90 35 01 05 cf c3 5b | IKEv2 nonce f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f 61 85 e0 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d3 93 5c 09 02 02 35 a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 17 | natd_hash: port=500 | natd_hash: hash= eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa 63 e8 24 d9 | natd_hash: hash= dc d9 6c 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa 63 e8 24 d9 | Notify data dc d9 6c 8e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d3 93 5c 09 02 02 35 a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | natd_hash: hash= a9 78 ea 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | Notify data a9 78 ea 1f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #23 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #23: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #23 to 4294967295 after switching state | Message ID: IKE #23 skipping update_recv as MD is fake | Message ID: sent #23 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.23:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | state #23 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49880055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49880058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #23 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 | #23 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.432623 | resume sending helper answer for #23 suppresed complete_v2_state_transition() and stole MD | #23 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b800a028 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.452859; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #16 | libevent_malloc: new ptr-libevent@0x7f49b800a028 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x55564d989de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #16 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.47115; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #8 | libevent_malloc: new ptr-libevent@0x55564d989de8 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x7f497c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #8 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-24' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #24 at 0x55564d9a4968 | State DB: adding IKEv2 state #24 in UNDEFINED | pstats #24 ikev2.ike started | Message ID: init #24: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #24: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #24; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-24" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-24" IKE SA #24 "road-eastnet-nonat-24" "road-eastnet-nonat-24" #24: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-24 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-24": constructed local IKE proposals for road-eastnet-nonat-24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 24 for state #24 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f497c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #24 | libevent_malloc: new ptr-libevent@0x7f497c0055c8 size 128 | #24 spent 0.123 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-24" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 5 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 5 starting work-order 24 for state #24 | spent 0.211 milliseconds in whack | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 24 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 24 time elapsed 0.000771 seconds | (#24) spent 0.772 milliseconds in crypto helper computing work-order 24: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 24 for state #24 to event queue | scheduling resume sending helper answer for #24 | libevent_malloc: new ptr-libevent@0x7f49ac00cd68 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 24 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #24 | **emit ISAKMP Message: | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | ikev2 g^x 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | ikev2 g^x 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | ikev2 g^x e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | ikev2 g^x 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | ikev2 g^x a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | ikev2 g^x 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | ikev2 g^x 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | ikev2 g^x 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | ikev2 g^x 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | ikev2 g^x f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | ikev2 g^x 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | ikev2 g^x 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | ikev2 g^x 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | ikev2 g^x 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | ikev2 g^x 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 34 0f 34 d4 | IKEv2 nonce 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 a4 b2 4d 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bc 04 80 19 c9 5d 89 25 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 18 | natd_hash: port=500 | natd_hash: hash= 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b 31 d5 69 dd | natd_hash: hash= 90 db d5 f0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b 31 d5 69 dd | Notify data 90 db d5 f0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bc 04 80 19 c9 5d 89 25 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | natd_hash: hash= af 3e ec 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | Notify data af 3e ec 33 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #24 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #24: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #24 to 4294967295 after switching state | Message ID: IKE #24 skipping update_recv as MD is fake | Message ID: sent #24 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.24:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | state #24 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c0055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f497c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #24 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 | #24 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.491428 | resume sending helper answer for #24 suppresed complete_v2_state_transition() and stole MD | #24 spent 0.353 milliseconds in resume sending helper answer | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac00cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.516613; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #17 | libevent_malloc: new ptr-libevent@0x7f49ac00cd68 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x55564d98b498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #17 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.532003; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #9 | libevent_malloc: new ptr-libevent@0x55564d98b498 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x7f49800055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #9 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-25' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #25 at 0x55564d9a60e8 | State DB: adding IKEv2 state #25 in UNDEFINED | pstats #25 ikev2.ike started | Message ID: init #25: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #25: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #25; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-25" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-25" IKE SA #25 "road-eastnet-nonat-25" "road-eastnet-nonat-25" #25: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-25 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-25": constructed local IKE proposals for road-eastnet-nonat-25 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 25 for state #25 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #25 | libevent_malloc: new ptr-libevent@0x7f49800055c8 size 128 | #25 spent 0.117 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 25 for state #25 | RESET processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 25 | RESET processing: connection "road-eastnet-nonat-25" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.201 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 25 time elapsed 0.0006 seconds | (#25) spent 0.605 milliseconds in crypto helper computing work-order 25: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 25 for state #25 to event queue | scheduling resume sending helper answer for #25 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 25 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #25 | **emit ISAKMP Message: | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | ikev2 g^x 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | ikev2 g^x 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | ikev2 g^x 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | ikev2 g^x 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | ikev2 g^x 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | ikev2 g^x 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | ikev2 g^x 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | ikev2 g^x b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | ikev2 g^x 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | ikev2 g^x 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | ikev2 g^x a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ikev2 g^x ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | ikev2 g^x 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | ikev2 g^x 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | ikev2 g^x 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 07 79 ee 6d 7d 58 56 66 b2 cc db a8 e0 d4 99 | IKEv2 nonce 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 31 76 9e 42 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d6 ec ed 98 11 3f e3 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 19 | natd_hash: port=500 | natd_hash: hash= 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 bd 33 ba 20 | natd_hash: hash= ef c8 ea 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 bd 33 ba 20 | Notify data ef c8 ea 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d6 ec ed 98 11 3f e3 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | natd_hash: hash= 47 6c 16 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | Notify data 47 6c 16 33 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #25 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #25: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #25 to 4294967295 after switching state | Message ID: IKE #25 skipping update_recv as MD is fake | Message ID: sent #25 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.25:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | state #25 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #25 | libevent_malloc: new ptr-libevent@0x55564d9a6e48 size 128 | #25 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.550332 | resume sending helper answer for #25 suppresed complete_v2_state_transition() and stole MD | #25 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b000cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.591538; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #18 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #18 spent 0.235 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.117 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.594047; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002377 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #10 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x7f49740055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #10 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0884 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-26' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #26 at 0x55564d9a7a18 | State DB: adding IKEv2 state #26 in UNDEFINED | pstats #26 ikev2.ike started | Message ID: init #26: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #26: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #26; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-26" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-26" IKE SA #26 "road-eastnet-nonat-26" "road-eastnet-nonat-26" #26: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-26 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-26": constructed local IKE proposals for road-eastnet-nonat-26 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 26 for state #26 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #26 | libevent_malloc: new ptr-libevent@0x7f49740055c8 size 128 | #26 spent 0.295 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 starting work-order 26 for state #26 | RESET processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-26" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 26 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.497 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 26 time elapsed 0.001646 seconds | (#26) spent 1.63 milliseconds in crypto helper computing work-order 26: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 26 for state #26 to event queue | scheduling resume sending helper answer for #26 | libevent_malloc: new ptr-libevent@0x7f49a400cd68 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 26 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #26 | **emit ISAKMP Message: | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | ikev2 g^x 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | ikev2 g^x 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | ikev2 g^x d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | ikev2 g^x 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | ikev2 g^x 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | ikev2 g^x 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | ikev2 g^x 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | ikev2 g^x 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | ikev2 g^x 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | ikev2 g^x a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | ikev2 g^x 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | ikev2 g^x 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | ikev2 g^x 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | ikev2 g^x 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | ikev2 g^x 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 ab 6e c7 48 | IKEv2 nonce 00 b7 af 81 9f e8 74 ee ce a5 97 e0 99 81 b7 25 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a 91 2a 4e 19 93 b2 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1a | natd_hash: port=500 | natd_hash: hash= d0 f1 37 de f9 3a 87 3b 7d 30 af 17 64 7f d2 15 | natd_hash: hash= ce 3b 35 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 f1 37 de f9 3a 87 3b 7d 30 af 17 64 7f d2 15 | Notify data ce 3b 35 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a 91 2a 4e 19 93 b2 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | natd_hash: hash= 16 4c c4 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | Notify data 16 4c c4 42 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #26 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #26: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #26 to 4294967295 after switching state | Message ID: IKE #26 skipping update_recv as MD is fake | Message ID: sent #26 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.26:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | state #26 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49740055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #26 | libevent_malloc: new ptr-libevent@0x55564d9a9cb8 size 128 | #26 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.625517 | resume sending helper answer for #26 suppresed complete_v2_state_transition() and stole MD | #26 spent 0.978 milliseconds in resume sending helper answer | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a400cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.654846; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #11 | libevent_malloc: new ptr-libevent@0x7f49a400cd68 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #11 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.654989; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x55564d98fd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #19 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-27' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #27 at 0x55564d9a9078 | State DB: adding IKEv2 state #27 in UNDEFINED | pstats #27 ikev2.ike started | Message ID: init #27: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #27: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #27; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-27" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-27" IKE SA #27 "road-eastnet-nonat-27" "road-eastnet-nonat-27" #27: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-27 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-27": constructed local IKE proposals for road-eastnet-nonat-27 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 27 for state #27 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49940058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #27 | libevent_malloc: new ptr-libevent@0x55564d98fd68 size 128 | #27 spent 0.115 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 27 for state #27 | RESET processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-27" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 27 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.21 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 27 time elapsed 0.000735 seconds | (#27) spent 0.729 milliseconds in crypto helper computing work-order 27: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 27 for state #27 to event queue | scheduling resume sending helper answer for #27 | libevent_malloc: new ptr-libevent@0x7f49a800cd68 size 128 | libevent_realloc: release ptr-libevent@0x7f49980096c8 | libevent_realloc: new ptr-libevent@0x7f49a800f218 size 512 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 27 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #27 | **emit ISAKMP Message: | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | ikev2 g^x 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | ikev2 g^x d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | ikev2 g^x 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | ikev2 g^x e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | ikev2 g^x dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | ikev2 g^x 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | ikev2 g^x fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | ikev2 g^x 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | ikev2 g^x be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | ikev2 g^x 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | ikev2 g^x c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ikev2 g^x ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | ikev2 g^x 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | ikev2 g^x f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | ikev2 g^x d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 eb 67 60 5f | IKEv2 nonce 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a 1c 5c b1 b5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ce e5 e4 69 4e a0 09 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1b | natd_hash: port=500 | natd_hash: hash= d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 80 85 e1 b1 | natd_hash: hash= c5 dc ef e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 80 85 e1 b1 | Notify data c5 dc ef e6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ce e5 e4 69 4e a0 09 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | natd_hash: hash= 03 3f b5 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | Notify data 03 3f b5 32 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #27 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #27: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #27 to 4294967295 after switching state | Message ID: IKE #27 skipping update_recv as MD is fake | Message ID: sent #27 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.27:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | state #27 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d98fd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49940058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #27 | libevent_malloc: new ptr-libevent@0x55564d9ab438 size 128 | #27 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.684578 | resume sending helper answer for #27 suppresed complete_v2_state_transition() and stole MD | #27 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a800cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.713798; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #12 | libevent_malloc: new ptr-libevent@0x7f49a800cd68 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x7f49980055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #12 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.724063; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499132 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #20 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x55564d99e178 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #20 spent 0.0852 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-28' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #28 at 0x55564d9aa7f8 | State DB: adding IKEv2 state #28 in UNDEFINED | pstats #28 ikev2.ike started | Message ID: init #28: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #28: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #28; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-28" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-28" IKE SA #28 "road-eastnet-nonat-28" "road-eastnet-nonat-28" #28: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-28 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-28": constructed local IKE proposals for road-eastnet-nonat-28 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 28 for state #28 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f498c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #28 | libevent_malloc: new ptr-libevent@0x55564d99e178 size 128 | #28 spent 0.151 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-28" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 starting work-order 28 for state #28 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 28 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 28 time elapsed 0.000611 seconds | (#28) spent 0.616 milliseconds in crypto helper computing work-order 28: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 28 for state #28 to event queue | scheduling resume sending helper answer for #28 | libevent_malloc: new ptr-libevent@0x7f499c00cd68 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 28 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #28 | **emit ISAKMP Message: | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | ikev2 g^x 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | ikev2 g^x 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | ikev2 g^x 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ikev2 g^x ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | ikev2 g^x 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | ikev2 g^x 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | ikev2 g^x a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ikev2 g^x ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | ikev2 g^x b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | ikev2 g^x d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | ikev2 g^x 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | ikev2 g^x c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | ikev2 g^x 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | ikev2 g^x 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | ikev2 g^x da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 66 55 aa a2 | IKEv2 nonce ef a3 1d dc 9b ac dd df e6 8e af 33 eb 72 67 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 5e 2d 53 42 c2 93 ec | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1c | natd_hash: port=500 | natd_hash: hash= 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 e4 8a 22 83 | natd_hash: hash= c9 b8 03 e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 e4 8a 22 83 | Notify data c9 b8 03 e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 5e 2d 53 42 c2 93 ec | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | natd_hash: hash= 87 58 c4 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | Notify data 87 58 c4 51 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #28 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #28: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #28 to 4294967295 after switching state | Message ID: IKE #28 skipping update_recv as MD is fake | Message ID: sent #28 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.28:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | state #28 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d99e178 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f498c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #28 | libevent_malloc: new ptr-libevent@0x55564d9acb48 size 128 | #28 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.743841 | resume sending helper answer for #28 suppresed complete_v2_state_transition() and stole MD | #28 spent 0.362 milliseconds in resume sending helper answer | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c00cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.773037; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #13 | libevent_malloc: new ptr-libevent@0x7f499c00cd68 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #13 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0794 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.816531; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x55564d9a0f38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #21 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-29' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #29 at 0x55564d9abf78 | State DB: adding IKEv2 state #29 in UNDEFINED | pstats #29 ikev2.ike started | Message ID: init #29: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #29: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #29; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-29" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-29" IKE SA #29 "road-eastnet-nonat-29" "road-eastnet-nonat-29" #29: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-29 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-29": constructed local IKE proposals for road-eastnet-nonat-29 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 29 for state #29 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #29 | libevent_malloc: new ptr-libevent@0x55564d9a0f38 size 128 | #29 spent 0.312 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 starting work-order 29 for state #29 | RESET processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 29 | RESET processing: connection "road-eastnet-nonat-29" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.556 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 29 time elapsed 0.002068 seconds | (#29) spent 2.08 milliseconds in crypto helper computing work-order 29: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 29 for state #29 to event queue | scheduling resume sending helper answer for #29 | libevent_malloc: new ptr-libevent@0x7f49a000cd68 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 29 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #29 | **emit ISAKMP Message: | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | ikev2 g^x 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | ikev2 g^x 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | ikev2 g^x 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ikev2 g^x ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | ikev2 g^x cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | ikev2 g^x f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | ikev2 g^x 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | ikev2 g^x b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | ikev2 g^x d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | ikev2 g^x 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | ikev2 g^x 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | ikev2 g^x c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | ikev2 g^x f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | ikev2 g^x 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | ikev2 g^x 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 87 23 c8 a3 | IKEv2 nonce ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 b4 db f6 53 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 42 fa c3 e1 51 6d ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1d | natd_hash: port=500 | natd_hash: hash= 11 3d 4b dd ec b2 8e 98 ab d1 62 97 39 de d7 0c | natd_hash: hash= 78 b2 24 0d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 3d 4b dd ec b2 8e 98 ab d1 62 97 39 de d7 0c | Notify data 78 b2 24 0d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 42 fa c3 e1 51 6d ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | natd_hash: hash= ea c1 64 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | Notify data ea c1 64 58 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #29 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #29: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #29 to 4294967295 after switching state | Message ID: IKE #29 skipping update_recv as MD is fake | Message ID: sent #29 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.29:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | state #29 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9a0f38 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #29 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 | #29 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.82184 | resume sending helper answer for #29 suppresed complete_v2_state_transition() and stole MD | #29 spent 1.21 milliseconds in resume sending helper answer | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a000cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.133 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.833251; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #14 | libevent_malloc: new ptr-libevent@0x7f49a000cd68 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x7f49bc00a028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #14 spent 0.35 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.874926; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f49bc00a028 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x55564d9a2708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #22 spent 0.316 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.136 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.89361; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002116 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #15 | libevent_malloc: new ptr-libevent@0x55564d9a2708 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x7f49b400a028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #15 spent 0.319 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.143 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-30' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #30 at 0x55564d9ad688 | State DB: adding IKEv2 state #30 in UNDEFINED | pstats #30 ikev2.ike started | Message ID: init #30: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #30: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #30; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-30" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-30" IKE SA #30 "road-eastnet-nonat-30" "road-eastnet-nonat-30" #30: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-30 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-30": constructed local IKE proposals for road-eastnet-nonat-30 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 30 for state #30 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a2698 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #30 | libevent_malloc: new ptr-libevent@0x7f49b400a028 size 128 | #30 spent 0.341 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-30" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 resuming | crypto helper 11 starting work-order 30 for state #30 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 30 | spent 0.547 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 30 time elapsed 0.002343 seconds | (#30) spent 2.34 milliseconds in crypto helper computing work-order 30: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 30 for state #30 to event queue | scheduling resume sending helper answer for #30 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 30 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #30 | **emit ISAKMP Message: | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | ikev2 g^x f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | ikev2 g^x af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | ikev2 g^x b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | ikev2 g^x 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ikev2 g^x ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | ikev2 g^x f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | ikev2 g^x 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | ikev2 g^x 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | ikev2 g^x eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | ikev2 g^x f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | ikev2 g^x 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | ikev2 g^x a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | ikev2 g^x 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | ikev2 g^x 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | ikev2 g^x 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 68 61 29 8a | IKEv2 nonce d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 ff 50 e5 c3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db e0 97 2c 06 21 0b ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1e | natd_hash: port=500 | natd_hash: hash= 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 bc e0 3e da | natd_hash: hash= 6e 9d 5c 85 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 bc e0 3e da | Notify data 6e 9d 5c 85 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db e0 97 2c 06 21 0b ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | natd_hash: hash= b4 97 7a 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | Notify data b4 97 7a 16 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #30 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #30: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #30 to 4294967295 after switching state | Message ID: IKE #30 skipping update_recv as MD is fake | Message ID: sent #30 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.30:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | state #30 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b400a028 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a2698 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #30 | libevent_malloc: new ptr-libevent@0x55564d9ae1e8 size 128 | #30 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.89962 | resume sending helper answer for #30 suppresed complete_v2_state_transition() and stole MD | #30 spent 1.07 milliseconds in resume sending helper answer | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499400cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.934122; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #23 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #23 spent 0.302 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.136 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10577.954752; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #16 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x7f49b800a028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #16 spent 0.307 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.135 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-31' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #31 at 0x55564d9aee98 | State DB: adding IKEv2 state #31 in UNDEFINED | pstats #31 ikev2.ike started | Message ID: init #31: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #31: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #31; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-31" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-31" IKE SA #31 "road-eastnet-nonat-31" "road-eastnet-nonat-31" #31: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-31 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-31": constructed local IKE proposals for road-eastnet-nonat-31 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 31 for state #31 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #31 | libevent_malloc: new ptr-libevent@0x7f49b800a028 size 128 | #31 spent 0.284 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-31" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 31 for state #31 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 31 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.473 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 31 time elapsed 0.00148 seconds | (#31) spent 1.49 milliseconds in crypto helper computing work-order 31: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 31 for state #31 to event queue | scheduling resume sending helper answer for #31 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 31 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #31 | **emit ISAKMP Message: | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | ikev2 g^x 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | ikev2 g^x 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | ikev2 g^x c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | ikev2 g^x 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ikev2 g^x ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | ikev2 g^x 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | ikev2 g^x a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | ikev2 g^x 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | ikev2 g^x 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | ikev2 g^x af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | ikev2 g^x 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | ikev2 g^x 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | ikev2 g^x 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | ikev2 g^x fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | ikev2 g^x aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a 6f 01 66 a4 | IKEv2 nonce f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 dd 8b 88 79 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0d fa 67 a6 72 0d e2 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1f | natd_hash: port=500 | natd_hash: hash= d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 fb be 36 5e | natd_hash: hash= ed c0 31 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 fb be 36 5e | Notify data ed c0 31 7a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0d fa 67 a6 72 0d e2 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | natd_hash: hash= 91 c5 eb a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | Notify data 91 c5 eb a7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #31 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #31: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #31 to 4294967295 after switching state | Message ID: IKE #31 skipping update_recv as MD is fake | Message ID: sent #31 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.31:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | state #31 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b800a028 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #31 | libevent_malloc: new ptr-libevent@0x55564d9b10c8 size 128 | #31 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10577.973554 | resume sending helper answer for #31 suppresed complete_v2_state_transition() and stole MD | #31 spent 0.796 milliseconds in resume sending helper answer | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499800ce98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10577.978978; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #1 spent 0.265 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10577.992523; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #24 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #24 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.116 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.018062; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002631 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x7f49ac00cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #17 spent 0.329 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-32' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #32 at 0x55564d9b04f8 | State DB: adding IKEv2 state #32 in UNDEFINED | pstats #32 ikev2.ike started | Message ID: init #32: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #32: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #32; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-32" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-32" IKE SA #32 "road-eastnet-nonat-32" "road-eastnet-nonat-32" #32: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-32 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-32": constructed local IKE proposals for road-eastnet-nonat-32 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 32 for state #32 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6cb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #32 | libevent_malloc: new ptr-libevent@0x7f49ac00cd68 size 128 | #32 spent 0.252 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 32 for state #32 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-32" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 32 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.455 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 32 time elapsed 0.001354 seconds | (#32) spent 1.35 milliseconds in crypto helper computing work-order 32: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 32 for state #32 to event queue | scheduling resume sending helper answer for #32 | libevent_malloc: new ptr-libevent@0x7f498c00cd68 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 32 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #32 | **emit ISAKMP Message: | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | ikev2 g^x 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | ikev2 g^x 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | ikev2 g^x b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | ikev2 g^x df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | ikev2 g^x b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | ikev2 g^x 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | ikev2 g^x 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | ikev2 g^x 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | ikev2 g^x 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | ikev2 g^x 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | ikev2 g^x 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | ikev2 g^x e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | ikev2 g^x 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | ikev2 g^x 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | ikev2 g^x 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 e3 09 18 df 33 0b 79 76 31 cb f1 48 f0 a3 18 | IKEv2 nonce ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 82 a8 ab c7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8b 06 91 29 d4 76 fb a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 20 | natd_hash: port=500 | natd_hash: hash= d5 91 27 e0 35 3d da f1 49 a7 45 84 7b 7b 9d 30 | natd_hash: hash= 94 60 d4 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 91 27 e0 35 3d da f1 49 a7 45 84 7b 7b 9d 30 | Notify data 94 60 d4 4e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8b 06 91 29 d4 76 fb a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | natd_hash: hash= 3e 67 54 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | Notify data 3e 67 54 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #32 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #32: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #32 to 4294967295 after switching state | Message ID: IKE #32 skipping update_recv as MD is fake | Message ID: sent #32 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.32:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | state #32 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac00cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6cb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 | #32 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.044797 | resume sending helper answer for #32 suppresed complete_v2_state_transition() and stole MD | #32 spent 1.19 milliseconds in resume sending helper answer | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c00cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.164 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.051225; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500893 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #25 | libevent_malloc: new ptr-libevent@0x7f498c00cd68 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x55564d9a6e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #25 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.092727; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564d9a6e48 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #18 spent 0.239 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.100237; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x55564d9913c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #2 spent 0.219 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0998 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-33' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #33 at 0x55564d9b1c08 | State DB: adding IKEv2 state #33 in UNDEFINED | pstats #33 ikev2.ike started | Message ID: init #33: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #33: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #33; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-33" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-33" IKE SA #33 "road-eastnet-nonat-33" "road-eastnet-nonat-33" #33: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-33 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-33": constructed local IKE proposals for road-eastnet-nonat-33 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 33 for state #33 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #33 | libevent_malloc: new ptr-libevent@0x55564d9913c8 size 128 | #33 spent 0.247 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 33 for state #33 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 33 | RESET processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-33" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.46 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 33 time elapsed 0.001927 seconds | (#33) spent 1.93 milliseconds in crypto helper computing work-order 33: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 33 for state #33 to event queue | scheduling resume sending helper answer for #33 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 33 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #33 | **emit ISAKMP Message: | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | ikev2 g^x 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | ikev2 g^x 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | ikev2 g^x 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | ikev2 g^x af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | ikev2 g^x c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | ikev2 g^x da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | ikev2 g^x 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | ikev2 g^x c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | ikev2 g^x 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | ikev2 g^x 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | ikev2 g^x 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | ikev2 g^x 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | ikev2 g^x 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | ikev2 g^x 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | ikev2 g^x 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 09 be 8a 7d | IKEv2 nonce 64 f1 22 03 a9 98 19 aa 7b e1 02 01 69 ae ea 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 63 ef b5 f2 75 93 2d e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 21 | natd_hash: port=500 | natd_hash: hash= 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 38 2a d4 6c | natd_hash: hash= 75 24 8c df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 38 2a d4 6c | Notify data 75 24 8c df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 63 ef b5 f2 75 93 2d e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | natd_hash: hash= e0 36 d8 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | Notify data e0 36 d8 bb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #33 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #33: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #33 to 4294967295 after switching state | Message ID: IKE #33 skipping update_recv as MD is fake | Message ID: sent #33 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | state #33 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9913c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #33 | libevent_malloc: new ptr-libevent@0x55564d9b3fc8 size 128 | #33 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.116308 | resume sending helper answer for #33 suppresed complete_v2_state_transition() and stole MD | #33 spent 1.18 milliseconds in resume sending helper answer | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499000cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.154 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.125707; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #26 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x55564d9a9cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #26 spent 0.227 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.156235; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564d9a9cb8 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #19 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.16274; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #3 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #3 spent 0.25 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.107 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.185241; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #27 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x55564d9ab438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #27 spent 0.27 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-34' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #34 at 0x55564d9b3388 | State DB: adding IKEv2 state #34 in UNDEFINED | pstats #34 ikev2.ike started | Message ID: init #34: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #34: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #34; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-34" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-34" IKE SA #34 "road-eastnet-nonat-34" "road-eastnet-nonat-34" #34: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-34 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-34": constructed local IKE proposals for road-eastnet-nonat-34 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 34 for state #34 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49940058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #34 | libevent_malloc: new ptr-libevent@0x55564d9ab438 size 128 | #34 spent 0.208 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 34 for state #34 | RESET processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 34 | RESET processing: connection "road-eastnet-nonat-34" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.326 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 34 time elapsed 0.001079 seconds | (#34) spent 1.08 milliseconds in crypto helper computing work-order 34: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 34 for state #34 to event queue | scheduling resume sending helper answer for #34 | libevent_malloc: new ptr-libevent@0x7f498400cd68 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 34 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #34 | **emit ISAKMP Message: | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | ikev2 g^x 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | ikev2 g^x 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | ikev2 g^x 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | ikev2 g^x c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | ikev2 g^x 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | ikev2 g^x da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | ikev2 g^x 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | ikev2 g^x 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | ikev2 g^x cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | ikev2 g^x f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | ikev2 g^x b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | ikev2 g^x a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | ikev2 g^x a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | ikev2 g^x 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | ikev2 g^x 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc 3d 0c 9a ae | IKEv2 nonce 8a 3f 65 5e 23 47 81 df bb 46 8f 40 bf 3a 5a cb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9e a6 cc 08 1a b6 7f 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 22 | natd_hash: port=500 | natd_hash: hash= 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b b4 0b f7 88 | natd_hash: hash= 48 ad db a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b b4 0b f7 88 | Notify data 48 ad db a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9e a6 cc 08 1a b6 7f 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | natd_hash: hash= f7 d6 2a 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | Notify data f7 d6 2a 97 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #34 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #34: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #34 to 4294967295 after switching state | Message ID: IKE #34 skipping update_recv as MD is fake | Message ID: sent #34 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.34:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | state #34 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ab438 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49940058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #34 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 | #34 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.187973 | resume sending helper answer for #34 suppresed complete_v2_state_transition() and stole MD | #34 spent 0.931 milliseconds in resume sending helper answer | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498400cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.221248; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002468 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f498400cd68 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x55564d992bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #4 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.225566; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #20 | libevent_malloc: new ptr-libevent@0x55564d992bd8 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x7f49980055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #20 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.244814; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #28 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x55564d9acb48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #28 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-35' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #35 at 0x55564d9b4b08 | State DB: adding IKEv2 state #35 in UNDEFINED | pstats #35 ikev2.ike started | Message ID: init #35: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #35: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #35; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-35" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-35" IKE SA #35 "road-eastnet-nonat-35" "road-eastnet-nonat-35" #35: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-35 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-35": constructed local IKE proposals for road-eastnet-nonat-35 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 35 for state #35 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f498c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #35 | libevent_malloc: new ptr-libevent@0x55564d9acb48 size 128 | #35 spent 0.176 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-35" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.277 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 35 for state #35 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 35 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 35 time elapsed 0.000759 seconds | (#35) spent 0.764 milliseconds in crypto helper computing work-order 35: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 35 for state #35 to event queue | scheduling resume sending helper answer for #35 | libevent_malloc: new ptr-libevent@0x7f498800cd68 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 35 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #35 | **emit ISAKMP Message: | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | ikev2 g^x 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | ikev2 g^x 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ikev2 g^x ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | ikev2 g^x 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | ikev2 g^x e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | ikev2 g^x 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | ikev2 g^x 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | ikev2 g^x 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | ikev2 g^x 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | ikev2 g^x 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | ikev2 g^x 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | ikev2 g^x 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | ikev2 g^x f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | ikev2 g^x 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | ikev2 g^x f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a 81 d6 26 96 | IKEv2 nonce cf d2 f8 4c 97 09 48 74 b9 c8 83 80 bb 7f 64 a0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 55 ad 85 74 da de ea 7e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 23 | natd_hash: port=500 | natd_hash: hash= 48 03 92 87 8e c0 ae 85 91 1e 62 29 b8 de c4 f4 | natd_hash: hash= 1a 08 b3 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 03 92 87 8e c0 ae 85 91 1e 62 29 b8 de c4 f4 | Notify data 1a 08 b3 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 55 ad 85 74 da de ea 7e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | natd_hash: hash= 56 7f 86 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | Notify data 56 7f 86 0f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #35 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #35: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #35 to 4294967295 after switching state | Message ID: IKE #35 skipping update_recv as MD is fake | Message ID: sent #35 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.35:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | state #35 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9acb48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f498c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #35 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 | #35 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.249259 | resume sending helper answer for #35 suppresed complete_v2_state_transition() and stole MD | #35 spent 0.482 milliseconds in resume sending helper answer | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498800cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.284458; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003877 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f498800cd68 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x55564d986e78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #5 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-36' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #36 at 0x55564d9b6218 | State DB: adding IKEv2 state #36 in UNDEFINED | pstats #36 ikev2.ike started | Message ID: init #36: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #36: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #36; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-36" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-36" IKE SA #36 "road-eastnet-nonat-36" "road-eastnet-nonat-36" #36: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-36 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-36": constructed local IKE proposals for road-eastnet-nonat-36 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 36 for state #36 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #36 | libevent_malloc: new ptr-libevent@0x55564d986e78 size 128 | #36 spent 0.149 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-36" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 1 resuming | crypto helper 1 starting work-order 36 for state #36 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 36 | spent 0.265 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 36 time elapsed 0.000721 seconds | (#36) spent 0.726 milliseconds in crypto helper computing work-order 36: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 36 for state #36 to event queue | scheduling resume sending helper answer for #36 | libevent_malloc: new ptr-libevent@0x7f497c00cd68 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 36 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #36 | **emit ISAKMP Message: | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | ikev2 g^x 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | ikev2 g^x 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ikev2 g^x ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | ikev2 g^x 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | ikev2 g^x eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | ikev2 g^x b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | ikev2 g^x 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | ikev2 g^x f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | ikev2 g^x 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | ikev2 g^x 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | ikev2 g^x 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | ikev2 g^x e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | ikev2 g^x 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | ikev2 g^x fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | ikev2 g^x 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 48 78 a5 fa 3a 35 e7 82 04 51 bd 2f ed b6 a3 | IKEv2 nonce f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a fd e5 a3 a5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 00 fc cf fa 98 f9 af 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 24 | natd_hash: port=500 | natd_hash: hash= 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 9b 03 f2 e1 | natd_hash: hash= c7 d2 32 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 9b 03 f2 e1 | Notify data c7 d2 32 43 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 00 fc cf fa 98 f9 af 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | natd_hash: hash= 83 48 be 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | Notify data 83 48 be 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #36 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #36: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #36 to 4294967295 after switching state | Message ID: IKE #36 skipping update_recv as MD is fake | Message ID: sent #36 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.36:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | state #36 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d986e78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #36 | libevent_malloc: new ptr-libevent@0x55564d9b84f8 size 128 | #36 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.3106 | resume sending helper answer for #36 suppresed complete_v2_state_transition() and stole MD | #36 spent 0.361 milliseconds in resume sending helper answer | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c00cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.317838; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f497c00cd68 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #21 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0738 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.321178; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499338 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #29 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #29 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.345446; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #6 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x55564d9958e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #6 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-37' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #37 at 0x55564d9b7928 | State DB: adding IKEv2 state #37 in UNDEFINED | pstats #37 ikev2.ike started | Message ID: init #37: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #37: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #37; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-37" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-37" IKE SA #37 "road-eastnet-nonat-37" "road-eastnet-nonat-37" #37: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-37 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-37": constructed local IKE proposals for road-eastnet-nonat-37 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 37 for state #37 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #37 | libevent_malloc: new ptr-libevent@0x55564d9958e8 size 128 | #37 spent 0.126 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 37 for state #37 | RESET processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-37" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 37 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.212 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 37 time elapsed 0.000866 seconds | (#37) spent 0.871 milliseconds in crypto helper computing work-order 37: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 37 for state #37 to event queue | scheduling resume sending helper answer for #37 | libevent_malloc: new ptr-libevent@0x7f498000cd68 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 37 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #37 | **emit ISAKMP Message: | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | ikev2 g^x 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ikev2 g^x ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | ikev2 g^x cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | ikev2 g^x e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ikev2 g^x ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | ikev2 g^x 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | ikev2 g^x 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | ikev2 g^x 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | ikev2 g^x 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | ikev2 g^x 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | ikev2 g^x 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | ikev2 g^x aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | ikev2 g^x bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ikev2 g^x ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | ikev2 g^x e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 61 7d 03 32 | IKEv2 nonce e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 1f 17 fc c3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 42 fa eb 00 2f 48 32 f0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 25 | natd_hash: port=500 | natd_hash: hash= 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb 1d b6 10 54 | natd_hash: hash= d0 f7 19 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb 1d b6 10 54 | Notify data d0 f7 19 f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 42 fa eb 00 2f 48 32 f0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | natd_hash: hash= 26 69 8b 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | Notify data 26 69 8b 5f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #37 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #37: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #37 to 4294967295 after switching state | Message ID: IKE #37 skipping update_recv as MD is fake | Message ID: sent #37 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.37:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | state #37 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9958e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #37 | libevent_malloc: new ptr-libevent@0x55564d9b8418 size 128 | #37 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.370337 | resume sending helper answer for #37 suppresed complete_v2_state_transition() and stole MD | #37 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498000cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.376504; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f498000cd68 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x7f49bc00a028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #22 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.399796; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #30 | libevent_malloc: new ptr-libevent@0x7f49bc00a028 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x55564d9ae1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #30 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.405096; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #7 | libevent_malloc: new ptr-libevent@0x55564d9ae1e8 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x55564d996f98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #7 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-38' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #38 at 0x55564d9b9038 | State DB: adding IKEv2 state #38 in UNDEFINED | pstats #38 ikev2.ike started | Message ID: init #38: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #38: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #38; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-38" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-38" IKE SA #38 "road-eastnet-nonat-38" "road-eastnet-nonat-38" #38: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-38 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-38": constructed local IKE proposals for road-eastnet-nonat-38 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 38 for state #38 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #38 | libevent_malloc: new ptr-libevent@0x55564d996f98 size 128 | #38 spent 0.135 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-38" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 17 resuming | crypto helper 17 starting work-order 38 for state #38 | spent 0.238 milliseconds in whack | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 38 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 38 time elapsed 0.000805 seconds | (#38) spent 0.785 milliseconds in crypto helper computing work-order 38: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 38 for state #38 to event queue | scheduling resume sending helper answer for #38 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 38 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #38 | **emit ISAKMP Message: | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | ikev2 g^x eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | ikev2 g^x dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | ikev2 g^x 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | ikev2 g^x 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | ikev2 g^x 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | ikev2 g^x 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | ikev2 g^x 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | ikev2 g^x f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | ikev2 g^x 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | ikev2 g^x 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | ikev2 g^x d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | ikev2 g^x 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | ikev2 g^x d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | ikev2 g^x b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | ikev2 g^x 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d3 18 fa 05 53 63 fb c2 6b dd 1d e6 84 3a 07 b9 | IKEv2 nonce ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f f1 2a a5 61 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e2 90 50 fd ba a6 71 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 26 | natd_hash: port=500 | natd_hash: hash= 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 94 21 d1 eb | natd_hash: hash= ba fa e2 ae | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 94 21 d1 eb | Notify data ba fa e2 ae | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e2 90 50 fd ba a6 71 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | natd_hash: hash= 38 42 d2 c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | Notify data 38 42 d2 c7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #38 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #38: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #38 to 4294967295 after switching state | Message ID: IKE #38 skipping update_recv as MD is fake | Message ID: sent #38 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.38:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | state #38 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d996f98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #38 | libevent_malloc: new ptr-libevent@0x55564d9bb268 size 128 | #38 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.430535 | resume sending helper answer for #38 suppresed complete_v2_state_transition() and stole MD | #38 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497400cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.435788; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #23 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #23 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.472144; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002508 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x55564d989de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #8 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0501 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.473432; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #31 | libevent_malloc: new ptr-libevent@0x55564d989de8 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x55564d9b10c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #31 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-39' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #39 at 0x55564d9ba698 | State DB: adding IKEv2 state #39 in UNDEFINED | pstats #39 ikev2.ike started | Message ID: init #39: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #39: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #39; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-39" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-39" IKE SA #39 "road-eastnet-nonat-39" "road-eastnet-nonat-39" #39: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-39 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-39": constructed local IKE proposals for road-eastnet-nonat-39 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 39 for state #39 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #39 | libevent_malloc: new ptr-libevent@0x55564d9b10c8 size 128 | #39 spent 0.132 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | crypto helper 18 starting work-order 39 for state #39 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 39 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-39" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 39 time elapsed 0.000984 seconds | (#39) spent 0.988 milliseconds in crypto helper computing work-order 39: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 39 for state #39 to event queue | scheduling resume sending helper answer for #39 | libevent_malloc: new ptr-libevent@0x7f497800ce18 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 39 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #39 | **emit ISAKMP Message: | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | ikev2 g^x 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | ikev2 g^x 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | ikev2 g^x d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | ikev2 g^x 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | ikev2 g^x 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | ikev2 g^x bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | ikev2 g^x 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | ikev2 g^x 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ikev2 g^x ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | ikev2 g^x 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | ikev2 g^x c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | ikev2 g^x e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | ikev2 g^x 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | ikev2 g^x f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ikev2 g^x ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 4d c9 72 94 38 78 d1 87 c9 e8 72 46 55 73 f4 | IKEv2 nonce fc ad e9 38 b1 68 e3 e0 c1 47 89 5f f9 ef cf bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 31 49 75 31 b3 64 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 27 | natd_hash: port=500 | natd_hash: hash= d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc d7 65 4c a0 | natd_hash: hash= 33 2f 80 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc d7 65 4c a0 | Notify data 33 2f 80 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 31 49 75 31 b3 64 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | natd_hash: hash= 00 c0 e6 e8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | Notify data 00 c0 e6 e8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #39 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #39: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #39 to 4294967295 after switching state | Message ID: IKE #39 skipping update_recv as MD is fake | Message ID: sent #39 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.39:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | state #39 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9b10c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #39 | libevent_malloc: new ptr-libevent@0x55564d9bb188 size 128 | #39 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.492612 | resume sending helper answer for #39 suppresed complete_v2_state_transition() and stole MD | #39 spent 0.427 milliseconds in resume sending helper answer | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497800ce18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.49381; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002382 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #24 | libevent_malloc: new ptr-libevent@0x7f497800ce18 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #24 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.533082; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #9 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x55564d98b498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #9 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.54445; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564d98b498 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #32 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.552741; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002409 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #25 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x7f498c00cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #25 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-40' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #40 at 0x55564d9bbda8 | State DB: adding IKEv2 state #40 in UNDEFINED | pstats #40 ikev2.ike started | Message ID: init #40: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #40: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #40; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-40" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-40" IKE SA #40 "road-eastnet-nonat-40" "road-eastnet-nonat-40" #40: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-40 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-40": constructed local IKE proposals for road-eastnet-nonat-40 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 40 for state #40 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b27d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #40 | libevent_malloc: new ptr-libevent@0x7f498c00cd68 size 128 | #40 spent 0.148 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 40 for state #40 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 40 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-40" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 40 time elapsed 0.000621 seconds | (#40) spent 0.626 milliseconds in crypto helper computing work-order 40: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 40 for state #40 to event queue | scheduling resume sending helper answer for #40 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 40 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #40 | **emit ISAKMP Message: | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | ikev2 g^x cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | ikev2 g^x 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | ikev2 g^x 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | ikev2 g^x fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | ikev2 g^x c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | ikev2 g^x 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | ikev2 g^x 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | ikev2 g^x 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | ikev2 g^x 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | ikev2 g^x c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | ikev2 g^x 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | ikev2 g^x 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | ikev2 g^x aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | ikev2 g^x 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ikev2 g^x ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 4c bf b2 7d 34 69 35 86 c2 8a 5d 90 b0 c7 51 | IKEv2 nonce ab ea 34 52 80 2b 3b 09 e7 3f d8 bd 32 07 c2 69 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6a a1 8b 34 ef 63 32 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 28 | natd_hash: port=500 | natd_hash: hash= 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e 30 73 31 d0 | natd_hash: hash= e4 51 d7 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e 30 73 31 d0 | Notify data e4 51 d7 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6a a1 8b 34 ef 63 32 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | natd_hash: hash= 36 c4 02 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | Notify data 36 c4 02 72 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #40 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #40: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #40 to 4294967295 after switching state | Message ID: IKE #40 skipping update_recv as MD is fake | Message ID: sent #40 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.40:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | state #40 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c00cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b27d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #40 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 | #40 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.555349 | resume sending helper answer for #40 suppresed complete_v2_state_transition() and stole MD | #40 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c00ce18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.595568; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003898 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #10 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #10 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.616904; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #33 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x55564d9b3fc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #33 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-41' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #41 at 0x55564d9bd5b8 | State DB: adding IKEv2 state #41 in UNDEFINED | pstats #41 ikev2.ike started | Message ID: init #41: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #41: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #41; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-41" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-41" IKE SA #41 "road-eastnet-nonat-41" "road-eastnet-nonat-41" #41: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-41 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-41": constructed local IKE proposals for road-eastnet-nonat-41 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 41 for state #41 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #41 | libevent_malloc: new ptr-libevent@0x55564d9b3fc8 size 128 | crypto helper 0 resuming | crypto helper 0 starting work-order 41 for state #41 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 41 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 41 time elapsed 0.000976 seconds | (#41) spent 0.973 milliseconds in crypto helper computing work-order 41: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 41 for state #41 to event queue | scheduling resume sending helper answer for #41 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 | crypto helper 0 waiting (nothing to do) | #41 spent 0.159 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-41" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.236 milliseconds in whack | processing resume sending helper answer for #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 41 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #41 | **emit ISAKMP Message: | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | ikev2 g^x c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ikev2 g^x ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | ikev2 g^x 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | ikev2 g^x 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | ikev2 g^x 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | ikev2 g^x e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | ikev2 g^x 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | ikev2 g^x 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | ikev2 g^x a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | ikev2 g^x 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | ikev2 g^x 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ikev2 g^x ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | ikev2 g^x 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | ikev2 g^x 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | ikev2 g^x 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c a4 70 86 1e | IKEv2 nonce 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf 9b 6d ea d8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 c4 c7 81 8e fb d1 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 29 | natd_hash: port=500 | natd_hash: hash= d0 08 ab f6 41 27 3e 7e cb aa 8d 94 f5 26 79 02 | natd_hash: hash= 39 80 05 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 08 ab f6 41 27 3e 7e cb aa 8d 94 f5 26 79 02 | Notify data 39 80 05 6a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 c4 c7 81 8e fb d1 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | natd_hash: hash= 0b 01 1e 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | Notify data 0b 01 1e 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #41 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #41: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #41 to 4294967295 after switching state | Message ID: IKE #41 skipping update_recv as MD is fake | Message ID: sent #41 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.41:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | state #41 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9b3fc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #41 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 | #41 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.619512 | resume sending helper answer for #41 suppresed complete_v2_state_transition() and stole MD | #41 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc00f598 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.626725; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #26 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #26 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.656073; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #11 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x7f49a400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #11 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-42' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #42 at 0x55564d9bec18 | State DB: adding IKEv2 state #42 in UNDEFINED | pstats #42 ikev2.ike started | Message ID: init #42: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #42: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #42; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-42" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-42" IKE SA #42 "road-eastnet-nonat-42" "road-eastnet-nonat-42" #42: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-42 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-42": constructed local IKE proposals for road-eastnet-nonat-42 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 42 for state #42 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a9c48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #42 | libevent_malloc: new ptr-libevent@0x7f49a400cd68 size 128 | #42 spent 0.153 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 42 for state #42 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-42" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 42 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.258 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 42 time elapsed 0.000819 seconds | (#42) spent 0.798 milliseconds in crypto helper computing work-order 42: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 42 for state #42 to event queue | scheduling resume sending helper answer for #42 | libevent_malloc: new ptr-libevent@0x7f49b400f498 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 42 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #42 | **emit ISAKMP Message: | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ikev2 g^x ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | ikev2 g^x 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | ikev2 g^x 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ikev2 g^x ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | ikev2 g^x 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | ikev2 g^x d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ikev2 g^x ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | ikev2 g^x 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | ikev2 g^x 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | ikev2 g^x 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | ikev2 g^x af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | ikev2 g^x 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | ikev2 g^x f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | ikev2 g^x 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | ikev2 g^x a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb df 61 a7 a2 | IKEv2 nonce 5c cf ab bd 9f ec 1f c5 28 21 62 1d 76 6b 4d 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 94 b8 c0 c5 1e 14 06 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2a | natd_hash: port=500 | natd_hash: hash= 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 90 9a 94 bf | natd_hash: hash= d7 bb 5c 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 90 9a 94 bf | Notify data d7 bb 5c 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 94 b8 c0 c5 1e 14 06 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | natd_hash: hash= 77 35 f4 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | Notify data 77 35 f4 f3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #42 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #42: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #42 to 4294967295 after switching state | Message ID: IKE #42 skipping update_recv as MD is fake | Message ID: sent #42 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.42:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | state #42 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a400cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a9c48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #42 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 | #42 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.683527 | resume sending helper answer for #42 suppresed complete_v2_state_transition() and stole MD | #42 spent 0.49 milliseconds in resume sending helper answer | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b400f498 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.686739; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #27 | libevent_malloc: new ptr-libevent@0x7f49b400f498 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #27 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.6881; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #34 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #34 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.714447; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #12 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x7f49a800cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #12 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-43' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #43 at 0x55564d9c0328 | State DB: adding IKEv2 state #43 in UNDEFINED | pstats #43 ikev2.ike started | Message ID: init #43: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #43: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #43; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-43" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-43" IKE SA #43 "road-eastnet-nonat-43" "road-eastnet-nonat-43" #43: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-43 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-43": constructed local IKE proposals for road-eastnet-nonat-43 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 43 for state #43 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #43 | libevent_malloc: new ptr-libevent@0x7f49a800cd68 size 128 | #43 spent 0.131 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 43 for state #43 | RESET processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-43" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 43 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.231 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 43 time elapsed 0.00074 seconds | (#43) spent 0.746 milliseconds in crypto helper computing work-order 43: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 43 for state #43 to event queue | scheduling resume sending helper answer for #43 | libevent_malloc: new ptr-libevent@0x7f49b800f898 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 43 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #43 | **emit ISAKMP Message: | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | ikev2 g^x e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | ikev2 g^x c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | ikev2 g^x fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | ikev2 g^x cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | ikev2 g^x 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | ikev2 g^x 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | ikev2 g^x e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | ikev2 g^x 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | ikev2 g^x 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | ikev2 g^x 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | ikev2 g^x 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | ikev2 g^x 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | ikev2 g^x 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | ikev2 g^x 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | ikev2 g^x 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d6 aa d7 33 79 89 fd 76 49 5d 1b b8 32 03 1f 8d | IKEv2 nonce c0 97 a2 45 b8 89 05 21 5b b9 0c b0 a7 ef 8b b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 17 8f 8b 0c fa 82 a9 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2b | natd_hash: port=500 | natd_hash: hash= e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 14 e4 7f f7 | natd_hash: hash= b9 55 bb 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 14 e4 7f f7 | Notify data b9 55 bb 88 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 17 8f 8b 0c fa 82 a9 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | natd_hash: hash= 30 28 1f 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | Notify data 30 28 1f 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #43 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #43: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #43 to 4294967295 after switching state | Message ID: IKE #43 skipping update_recv as MD is fake | Message ID: sent #43 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.43:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | state #43 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a800cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #43 | libevent_malloc: new ptr-libevent@0x55564d9c2678 size 128 | #43 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.745688 | resume sending helper answer for #43 suppresed complete_v2_state_transition() and stole MD | #43 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b800f898 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0789 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.74691; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #28 | libevent_malloc: new ptr-libevent@0x7f49b800f898 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x7f49980055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #28 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.74923; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #35 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #35 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.774492; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x7f499c00cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #13 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-44' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #44 at 0x55564d9c1a38 | State DB: adding IKEv2 state #44 in UNDEFINED | pstats #44 ikev2.ike started | Message ID: init #44: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #44: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #44; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-44" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-44" IKE SA #44 "road-eastnet-nonat-44" "road-eastnet-nonat-44" #44: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-44 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-44": constructed local IKE proposals for road-eastnet-nonat-44 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 44 for state #44 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #44 | libevent_malloc: new ptr-libevent@0x7f499c00cd68 size 128 | crypto helper 5 resuming | crypto helper 5 starting work-order 44 for state #44 | #44 spent 0.146 milliseconds in ikev2_parent_outI1() | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 44 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-44" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.248 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 44 time elapsed 0.000997 seconds | (#44) spent 0.988 milliseconds in crypto helper computing work-order 44: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 44 for state #44 to event queue | scheduling resume sending helper answer for #44 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 44 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #44 | **emit ISAKMP Message: | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | ikev2 g^x 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | ikev2 g^x cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | ikev2 g^x 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | ikev2 g^x 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | ikev2 g^x 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | ikev2 g^x 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | ikev2 g^x 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | ikev2 g^x d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | ikev2 g^x 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | ikev2 g^x f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | ikev2 g^x c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | ikev2 g^x 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | ikev2 g^x a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | ikev2 g^x 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | ikev2 g^x 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 de ee da d0 f3 bc a7 27 89 4e 00 48 cd 68 bb | IKEv2 nonce d8 12 c3 62 10 60 16 21 4c d8 37 83 8a 63 87 1d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 16 48 16 6b 2b 8e 4c 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2c | natd_hash: port=500 | natd_hash: hash= 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 6e 80 7b a0 | natd_hash: hash= 31 9d 76 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 6e 80 7b a0 | Notify data 31 9d 76 60 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 16 48 16 6b 2b 8e 4c 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | natd_hash: hash= 6f a1 f0 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | Notify data 6f a1 f0 7c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #44 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #44: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #44 to 4294967295 after switching state | Message ID: IKE #44 skipping update_recv as MD is fake | Message ID: sent #44 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.44:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | state #44 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c00cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #44 | libevent_malloc: new ptr-libevent@0x55564d9c3df8 size 128 | #44 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.805442 | resume sending helper answer for #44 suppresed complete_v2_state_transition() and stole MD | #44 spent 0.334 milliseconds in resume sending helper answer | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac0121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.811614; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #36 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x55564d9b84f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #36 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.821944; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000104 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #29 | libevent_malloc: new ptr-libevent@0x55564d9b84f8 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #29 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.834242; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #14 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x7f49a000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #14 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-45' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #45 at 0x55564d9c31b8 | State DB: adding IKEv2 state #45 in UNDEFINED | pstats #45 ikev2.ike started | Message ID: init #45: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #45: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #45; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-45" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-45" IKE SA #45 "road-eastnet-nonat-45" "road-eastnet-nonat-45" #45: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-45 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-45": constructed local IKE proposals for road-eastnet-nonat-45 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 45 for state #45 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #45 | libevent_malloc: new ptr-libevent@0x7f49a000cd68 size 128 | #45 spent 0.118 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | RESET processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-45" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 6 starting work-order 45 for state #45 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 45 | spent 0.201 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 45 time elapsed 0.000794 seconds | (#45) spent 0.8 milliseconds in crypto helper computing work-order 45: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 45 for state #45 to event queue | scheduling resume sending helper answer for #45 | libevent_malloc: new ptr-libevent@0x7f49b0012288 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 45 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #45 | **emit ISAKMP Message: | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | ikev2 g^x 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | ikev2 g^x 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ikev2 g^x ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | ikev2 g^x 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | ikev2 g^x 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | ikev2 g^x 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | ikev2 g^x 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | ikev2 g^x 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | ikev2 g^x c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | ikev2 g^x c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | ikev2 g^x 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | ikev2 g^x 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | ikev2 g^x 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | ikev2 g^x 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | ikev2 g^x 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 57 23 24 9b | IKEv2 nonce b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 d3 52 3d 7e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 8f d3 6e 18 4c 95 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2d | natd_hash: port=500 | natd_hash: hash= 5e b5 2f db 04 7f 95 86 e4 24 30 42 15 9a af 9d | natd_hash: hash= 0b 69 31 c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e b5 2f db 04 7f 95 86 e4 24 30 42 15 9a af 9d | Notify data 0b 69 31 c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 8f d3 6e 18 4c 95 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | natd_hash: hash= 1e 51 5a 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | Notify data 1e 51 5a 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #45 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #45: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #45 to 4294967295 after switching state | Message ID: IKE #45 skipping update_recv as MD is fake | Message ID: sent #45 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.45:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | state #45 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a000cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #45 | libevent_malloc: new ptr-libevent@0x55564d9c5578 size 128 | #45 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.86685 | resume sending helper answer for #45 suppresed complete_v2_state_transition() and stole MD | #45 spent 0.372 milliseconds in resume sending helper answer | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.871066; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #37 | libevent_malloc: new ptr-libevent@0x7f49b0012288 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x55564d9b8418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #37 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.894386; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #15 | libevent_malloc: new ptr-libevent@0x55564d9b8418 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x55564d9a2708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #15 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.901701; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #30 | libevent_malloc: new ptr-libevent@0x55564d9a2708 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x7f49bc00a028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #30 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-46' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #46 at 0x55564d9c4938 | State DB: adding IKEv2 state #46 in UNDEFINED | pstats #46 ikev2.ike started | Message ID: init #46: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #46: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #46; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-46" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-46" IKE SA #46 "road-eastnet-nonat-46" "road-eastnet-nonat-46" #46: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-46 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-46": constructed local IKE proposals for road-eastnet-nonat-46 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 46 for state #46 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f49bc00a028 size 128 | #46 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 46 for state #46 | RESET processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 46 | RESET processing: connection "road-eastnet-nonat-46" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.256 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 46 time elapsed 0.001008 seconds | (#46) spent 1 milliseconds in crypto helper computing work-order 46: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 46 for state #46 to event queue | scheduling resume sending helper answer for #46 | libevent_malloc: new ptr-libevent@0x7f49a40121d8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 46 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #46 | **emit ISAKMP Message: | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | ikev2 g^x 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | ikev2 g^x 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | ikev2 g^x 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | ikev2 g^x b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | ikev2 g^x f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | ikev2 g^x fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | ikev2 g^x e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | ikev2 g^x 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | ikev2 g^x 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | ikev2 g^x c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | ikev2 g^x d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | ikev2 g^x 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | ikev2 g^x a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | ikev2 g^x 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | ikev2 g^x 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 83 7b ff 73 | IKEv2 nonce 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 2f 0d 00 4d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 46 dd f0 2d 76 35 24 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2e | natd_hash: port=500 | natd_hash: hash= eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 82 16 cc 9c | natd_hash: hash= 61 d3 1e 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 82 16 cc 9c | Notify data 61 d3 1e 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 46 dd f0 2d 76 35 24 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | natd_hash: hash= 76 77 59 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | Notify data 76 77 59 43 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #46 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #46: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #46 to 4294967295 after switching state | Message ID: IKE #46 skipping update_recv as MD is fake | Message ID: sent #46 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.46:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | state #46 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc00a028 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #46 | libevent_malloc: new ptr-libevent@0x55564d9c6cf8 size 128 | #46 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.928787 | resume sending helper answer for #46 suppresed complete_v2_state_transition() and stole MD | #46 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.930999; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #38 | libevent_malloc: new ptr-libevent@0x7f49a40121d8 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x55564d9bb268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #38 spent 0.0909 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10578.955239; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #16 | libevent_malloc: new ptr-libevent@0x55564d9bb268 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #16 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10578.974524; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #31 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x55564d989de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #31 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-47' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #47 at 0x55564d9c60b8 | State DB: adding IKEv2 state #47 in UNDEFINED | pstats #47 ikev2.ike started | Message ID: init #47: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #47: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #47; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-47" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-47" IKE SA #47 "road-eastnet-nonat-47" "road-eastnet-nonat-47" #47: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-47 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-47": constructed local IKE proposals for road-eastnet-nonat-47 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 47 for state #47 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a40058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #47 | libevent_malloc: new ptr-libevent@0x55564d989de8 size 128 | #47 spent 0.112 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 47 for state #47 | RESET processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 47 | RESET processing: connection "road-eastnet-nonat-47" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.192 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 47 time elapsed 0.000546 seconds | (#47) spent 0.55 milliseconds in crypto helper computing work-order 47: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 47 for state #47 to event queue | scheduling resume sending helper answer for #47 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 47 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #47 | **emit ISAKMP Message: | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | ikev2 g^x a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | ikev2 g^x 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | ikev2 g^x 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | ikev2 g^x d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | ikev2 g^x f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | ikev2 g^x 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | ikev2 g^x e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ikev2 g^x ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | ikev2 g^x 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | ikev2 g^x 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | ikev2 g^x 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | ikev2 g^x 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | ikev2 g^x 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | ikev2 g^x a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | ikev2 g^x f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 8a e4 f9 40 | IKEv2 nonce 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c bf 80 73 62 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 06 46 83 e0 c6 c8 6f 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2f | natd_hash: port=500 | natd_hash: hash= 13 35 d5 65 88 08 fd 24 33 9d ef 6b b6 58 6b 1e | natd_hash: hash= cc 63 5c 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 35 d5 65 88 08 fd 24 33 9d ef 6b b6 58 6b 1e | Notify data cc 63 5c 98 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 06 46 83 e0 c6 c8 6f 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | natd_hash: hash= fb 86 11 a1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | Notify data fb 86 11 a1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #47 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #47: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #47 to 4294967295 after switching state | Message ID: IKE #47 skipping update_recv as MD is fake | Message ID: sent #47 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.47:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | state #47 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d989de8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a40058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #47 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 | #47 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10578.987827 | resume sending helper answer for #47 suppresed complete_v2_state_transition() and stole MD | #47 spent 0.346 milliseconds in resume sending helper answer | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a80122a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0234 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10578.99298; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #39 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x55564d9bb188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #39 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.019262; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564d9bb188 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #17 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.045551; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x55564d98b498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #32 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-48' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #48 at 0x55564d9c7838 | State DB: adding IKEv2 state #48 in UNDEFINED | pstats #48 ikev2.ike started | Message ID: init #48: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #48: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #48; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-48" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-48" IKE SA #48 "road-eastnet-nonat-48" "road-eastnet-nonat-48" #48: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-48 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-48": constructed local IKE proposals for road-eastnet-nonat-48 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 48 for state #48 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #48 | libevent_malloc: new ptr-libevent@0x55564d98b498 size 128 | #48 spent 0.119 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-48" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.182 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 48 for state #48 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 48 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 48 time elapsed 0.000556 seconds | (#48) spent 0.557 milliseconds in crypto helper computing work-order 48: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 48 for state #48 to event queue | scheduling resume sending helper answer for #48 | libevent_malloc: new ptr-libevent@0x7f499c0121d8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 48 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #48 | **emit ISAKMP Message: | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | ikev2 g^x c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | ikev2 g^x 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | ikev2 g^x b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | ikev2 g^x 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ikev2 g^x ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | ikev2 g^x 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | ikev2 g^x 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | ikev2 g^x c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | ikev2 g^x a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | ikev2 g^x 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | ikev2 g^x d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | ikev2 g^x 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | ikev2 g^x fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | ikev2 g^x b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ikev2 g^x ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e 74 46 66 03 | IKEv2 nonce e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c 86 18 73 64 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e9 d9 f0 f4 cf e4 0e 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 30 | natd_hash: port=500 | natd_hash: hash= c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 90 b3 ed 76 | natd_hash: hash= 91 35 85 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 90 b3 ed 76 | Notify data 91 35 85 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e9 d9 f0 f4 cf e4 0e 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | natd_hash: hash= 17 5e 03 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | Notify data 17 5e 03 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #48 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #48: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #48 to 4294967295 after switching state | Message ID: IKE #48 skipping update_recv as MD is fake | Message ID: sent #48 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.48:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | state #48 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d98b498 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #48 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 | #48 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.047165 | resume sending helper answer for #48 suppresed complete_v2_state_transition() and stole MD | #48 spent 0.322 milliseconds in resume sending helper answer | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.056342; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #40 | libevent_malloc: new ptr-libevent@0x7f499c0121d8 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #40 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.093601; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x55564d9a6e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #18 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-49' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #49 at 0x55564d9c8fb8 | State DB: adding IKEv2 state #49 in UNDEFINED | pstats #49 ikev2.ike started | Message ID: init #49: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #49: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #49; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-49" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-49" IKE SA #49 "road-eastnet-nonat-49" "road-eastnet-nonat-49" #49: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-49 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-49": constructed local IKE proposals for road-eastnet-nonat-49 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 49 for state #49 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #49 | libevent_malloc: new ptr-libevent@0x55564d9a6e48 size 128 | #49 spent 0.124 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-49" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 resuming | crypto helper 10 starting work-order 49 for state #49 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 49 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.214 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 49 time elapsed 0.000783 seconds | (#49) spent 0.787 milliseconds in crypto helper computing work-order 49: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 49 for state #49 to event queue | scheduling resume sending helper answer for #49 | libevent_malloc: new ptr-libevent@0x7f49a00121d8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 49 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #49 | **emit ISAKMP Message: | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | ikev2 g^x b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | ikev2 g^x da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | ikev2 g^x fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | ikev2 g^x 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | ikev2 g^x dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | ikev2 g^x 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ikev2 g^x ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | ikev2 g^x e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | ikev2 g^x fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | ikev2 g^x fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | ikev2 g^x 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | ikev2 g^x b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | ikev2 g^x 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | ikev2 g^x 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | ikev2 g^x 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 c6 4c 6e 12 | IKEv2 nonce 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 5a 66 a0 c4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 1f f7 55 27 80 62 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 31 | natd_hash: port=500 | natd_hash: hash= 29 87 89 9c 3c e1 40 cc ed c3 b8 ae 03 9d 32 80 | natd_hash: hash= 8d e9 c0 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 87 89 9c 3c e1 40 cc ed c3 b8 ae 03 9d 32 80 | Notify data 8d e9 c0 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 1f f7 55 27 80 62 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | natd_hash: hash= 2d e4 3d 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | Notify data 2d e4 3d 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #49 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #49: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #49 to 4294967295 after switching state | Message ID: IKE #49 skipping update_recv as MD is fake | Message ID: sent #49 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.49:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | state #49 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9a6e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #49 | libevent_malloc: new ptr-libevent@0x55564d9c9aa8 size 128 | #49 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.108183 | resume sending helper answer for #49 suppresed complete_v2_state_transition() and stole MD | #49 spent 0.351 milliseconds in resume sending helper answer | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.11838; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #33 | libevent_malloc: new ptr-libevent@0x7f49a00121d8 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #33 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.120676; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #41 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #41 spent 0.0963 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.156971; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x55564d9a9cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #19 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-50' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #50 at 0x55564d9ca6c8 | State DB: adding IKEv2 state #50 in UNDEFINED | pstats #50 ikev2.ike started | Message ID: init #50: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #50: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #50; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-50" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-50" IKE SA #50 "road-eastnet-nonat-50" "road-eastnet-nonat-50" #50: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-50 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-50": constructed local IKE proposals for road-eastnet-nonat-50 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 50 for state #50 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #50 | libevent_malloc: new ptr-libevent@0x55564d9a9cb8 size 128 | #50 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | RESET processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 50 for state #50 | RESET processing: connection "road-eastnet-nonat-50" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 50 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.217 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 50 time elapsed 0.001002 seconds | (#50) spent 1.01 milliseconds in crypto helper computing work-order 50: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 50 for state #50 to event queue | scheduling resume sending helper answer for #50 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 50 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #50 | **emit ISAKMP Message: | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | ikev2 g^x a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ikev2 g^x ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | ikev2 g^x 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | ikev2 g^x e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | ikev2 g^x 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | ikev2 g^x bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | ikev2 g^x d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | ikev2 g^x e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | ikev2 g^x 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | ikev2 g^x 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | ikev2 g^x 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | ikev2 g^x 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | ikev2 g^x e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | ikev2 g^x b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | ikev2 g^x 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa 78 a8 a1 35 | IKEv2 nonce 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 30 6d e9 2d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db 91 78 40 40 d2 7e 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 32 | natd_hash: port=500 | natd_hash: hash= d8 0d 03 14 6c 0c 82 31 76 27 78 bd 3e 70 1b 39 | natd_hash: hash= 7d cb 2c a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 0d 03 14 6c 0c 82 31 76 27 78 bd 3e 70 1b 39 | Notify data 7d cb 2c a8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db 91 78 40 40 d2 7e 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | natd_hash: hash= 42 7a 76 67 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | Notify data 42 7a 76 67 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #50 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #50: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #50 to 4294967295 after switching state | Message ID: IKE #50 skipping update_recv as MD is fake | Message ID: sent #50 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.50:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | state #50 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9a9cb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #50 | libevent_malloc: new ptr-libevent@0x55564d9cc8f8 size 128 | #50 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.169086 | resume sending helper answer for #50 suppresed complete_v2_state_transition() and stole MD | #50 spent 0.339 milliseconds in resume sending helper answer | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.184295; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #42 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #42 spent 0.0977 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.189585; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #34 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #34 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0802 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.226938; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #20 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x55564d992bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #20 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-51' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #51 at 0x55564d9cbd28 | State DB: adding IKEv2 state #51 in UNDEFINED | pstats #51 ikev2.ike started | Message ID: init #51: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #51: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #51; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-51" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-51" IKE SA #51 "road-eastnet-nonat-51" "road-eastnet-nonat-51" #51: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-51 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-51": constructed local IKE proposals for road-eastnet-nonat-51 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 51 for state #51 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #51 | libevent_malloc: new ptr-libevent@0x55564d992bd8 size 128 | #51 spent 0.113 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-51" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.174 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 51 for state #51 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 51 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 51 time elapsed 0.000751 seconds | (#51) spent 0.754 milliseconds in crypto helper computing work-order 51: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 51 for state #51 to event queue | scheduling resume sending helper answer for #51 | libevent_malloc: new ptr-libevent@0x7f49980123b8 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 51 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #51 | **emit ISAKMP Message: | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | ikev2 g^x a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | ikev2 g^x 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | ikev2 g^x 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | ikev2 g^x 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | ikev2 g^x 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | ikev2 g^x 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | ikev2 g^x 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | ikev2 g^x cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | ikev2 g^x 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | ikev2 g^x 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | ikev2 g^x 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | ikev2 g^x 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | ikev2 g^x 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | ikev2 g^x f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | ikev2 g^x 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 33 01 f2 76 79 bd f6 bb 64 4a 03 8e 79 3e d6 d4 | IKEv2 nonce fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 97 a6 d8 5f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe cb 8c 8f 18 d2 f0 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 33 | natd_hash: port=500 | natd_hash: hash= 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 f8 ca e0 6e | natd_hash: hash= c8 85 b7 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 f8 ca e0 6e | Notify data c8 85 b7 dc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe cb 8c 8f 18 d2 f0 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | natd_hash: hash= 44 af 6a f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | Notify data 44 af 6a f9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #51 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #51: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #51 to 4294967295 after switching state | Message ID: IKE #51 skipping update_recv as MD is fake | Message ID: sent #51 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.51:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | state #51 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d992bd8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #51 | libevent_malloc: new ptr-libevent@0x55564d9cc818 size 128 | #51 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.228836 | resume sending helper answer for #51 suppresed complete_v2_state_transition() and stole MD | #51 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49980123b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.245994; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #43 | libevent_malloc: new ptr-libevent@0x7f49980123b8 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x55564d9c2678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #43 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.250281; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #35 | libevent_malloc: new ptr-libevent@0x55564d9c2678 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x7f49980055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #35 spent 0.0891 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-52' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #52 at 0x55564d9cd438 | State DB: adding IKEv2 state #52 in UNDEFINED | pstats #52 ikev2.ike started | Message ID: init #52: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #52: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #52; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-52" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-52" IKE SA #52 "road-eastnet-nonat-52" "road-eastnet-nonat-52" #52: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-52 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-52": constructed local IKE proposals for road-eastnet-nonat-52 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 52 for state #52 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f49980055c8 size 128 | #52 spent 0.122 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | RESET processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-52" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 52 for state #52 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 52 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.206 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 52 time elapsed 0.000984 seconds | (#52) spent 0.989 milliseconds in crypto helper computing work-order 52: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 52 for state #52 to event queue | scheduling resume sending helper answer for #52 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 52 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #52 | **emit ISAKMP Message: | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | ikev2 g^x c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | ikev2 g^x 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | ikev2 g^x 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | ikev2 g^x 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | ikev2 g^x 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | ikev2 g^x 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ikev2 g^x ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | ikev2 g^x 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | ikev2 g^x c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | ikev2 g^x 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | ikev2 g^x f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | ikev2 g^x 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | ikev2 g^x 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | ikev2 g^x 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | ikev2 g^x 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 03 c8 69 24 20 91 47 02 fb e0 80 78 a3 b0 d4 f7 | IKEv2 nonce c4 b5 bf b5 86 10 76 74 58 07 f5 eb 9b 0e 58 9e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db ae a6 24 39 a6 0c 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 34 | natd_hash: port=500 | natd_hash: hash= b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e 48 d5 d7 b1 | natd_hash: hash= 80 11 5d c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e 48 d5 d7 b1 | Notify data 80 11 5d c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db ae a6 24 39 a6 0c 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | natd_hash: hash= bc 07 30 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | Notify data bc 07 30 1e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #52 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #52: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #52 to 4294967295 after switching state | Message ID: IKE #52 skipping update_recv as MD is fake | Message ID: sent #52 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.52:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | state #52 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49980055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #52 | libevent_malloc: new ptr-libevent@0x55564d9cdf98 size 128 | #52 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.288184 | resume sending helper answer for #52 suppresed complete_v2_state_transition() and stole MD | #52 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c0121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.306375; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #44 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x55564d9c3df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #44 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.31267; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #36 | libevent_malloc: new ptr-libevent@0x55564d9c3df8 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #36 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.318941; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x7f497c00cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #21 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-53' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #53 at 0x55564d9cec48 | State DB: adding IKEv2 state #53 in UNDEFINED | pstats #53 ikev2.ike started | Message ID: init #53: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #53: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #53; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-53" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-53" IKE SA #53 "road-eastnet-nonat-53" "road-eastnet-nonat-53" #53: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-53 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-53": constructed local IKE proposals for road-eastnet-nonat-53 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 53 for state #53 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f497c00cd68 size 128 | #53 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-53" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.224 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 53 for state #53 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 53 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 53 time elapsed 0.00085 seconds | (#53) spent 0.86 milliseconds in crypto helper computing work-order 53: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 53 for state #53 to event queue | scheduling resume sending helper answer for #53 | libevent_malloc: new ptr-libevent@0x7f4990012288 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 53 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #53 | **emit ISAKMP Message: | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | ikev2 g^x 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | ikev2 g^x e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | ikev2 g^x 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | ikev2 g^x b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | ikev2 g^x 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | ikev2 g^x 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | ikev2 g^x 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | ikev2 g^x 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | ikev2 g^x 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | ikev2 g^x 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | ikev2 g^x 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | ikev2 g^x 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | ikev2 g^x a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | ikev2 g^x 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | ikev2 g^x 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 87 92 41 d1 | IKEv2 nonce f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 4e 18 e4 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 92 36 ba a1 0a 4d 3e 94 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 35 | natd_hash: port=500 | natd_hash: hash= b8 2f c3 97 67 08 79 30 2f 84 31 8c b0 70 46 9b | natd_hash: hash= f8 12 7b 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 2f c3 97 67 08 79 30 2f 84 31 8c b0 70 46 9b | Notify data f8 12 7b 02 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 92 36 ba a1 0a 4d 3e 94 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | natd_hash: hash= 4b c5 99 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | Notify data 4b c5 99 b4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #53 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #53: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #53 to 4294967295 after switching state | Message ID: IKE #53 skipping update_recv as MD is fake | Message ID: sent #53 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.53:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | state #53 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c00cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #53 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 | #53 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.348468 | resume sending helper answer for #53 suppresed complete_v2_state_transition() and stole MD | #53 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.367725; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #45 | libevent_malloc: new ptr-libevent@0x7f4990012288 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x55564d9c5578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #45 spent 0.262 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.109 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.372274; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #37 | libevent_malloc: new ptr-libevent@0x55564d9c5578 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x7f49b0012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #37 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.377836; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004249 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f49b0012288 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x7f498000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #22 spent 0.535 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.266 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.42995; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f498000cd68 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x55564d9c6cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #46 spent 0.513 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.321 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.433147; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #38 | libevent_malloc: new ptr-libevent@0x55564d9c6cf8 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x7f49a40121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #38 spent 0.567 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.233 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-54' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #54 at 0x55564d9d02a8 | State DB: adding IKEv2 state #54 in UNDEFINED | pstats #54 ikev2.ike started | Message ID: init #54: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #54: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #54; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-54" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-54" IKE SA #54 "road-eastnet-nonat-54" "road-eastnet-nonat-54" #54: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-54 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-54": constructed local IKE proposals for road-eastnet-nonat-54 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 54 for state #54 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c6c88 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #54 | libevent_malloc: new ptr-libevent@0x7f49a40121d8 size 128 | #54 spent 0.455 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | RESET processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-54" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 starting work-order 54 for state #54 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 54 | spent 0.705 milliseconds in whack | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.436968; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #23 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #23 spent 0.587 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 54 time elapsed 0.003626 seconds | (#54) spent 3.58 milliseconds in crypto helper computing work-order 54: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 54 for state #54 to event queue | scheduling resume sending helper answer for #54 | libevent_malloc: new ptr-libevent@0x7f4984012288 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 54 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #54 | **emit ISAKMP Message: | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | ikev2 g^x 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | ikev2 g^x f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | ikev2 g^x 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | ikev2 g^x 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | ikev2 g^x 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | ikev2 g^x 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | ikev2 g^x 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | ikev2 g^x bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | ikev2 g^x 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | ikev2 g^x 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | ikev2 g^x 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | ikev2 g^x 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | ikev2 g^x 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | ikev2 g^x fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | ikev2 g^x 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f2 73 17 5c 76 18 24 da c1 74 39 e5 2c 7b 97 e5 | IKEv2 nonce de 1e da c1 b2 15 d4 8a c0 2b ea 1b 16 1b 2f e1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 de ce e9 5f c7 58 b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 36 | natd_hash: port=500 | natd_hash: hash= a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 b0 24 0f 79 | natd_hash: hash= 7f 72 85 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 b0 24 0f 79 | Notify data 7f 72 85 6c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 de ce e9 5f c7 58 b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | natd_hash: hash= ac 6f 25 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | Notify data ac 6f 25 17 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #54 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #54: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #54 to 4294967295 after switching state | Message ID: IKE #54 skipping update_recv as MD is fake | Message ID: sent #54 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.54:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | state #54 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40121d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c6c88 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #54 | libevent_malloc: new ptr-libevent@0x55564d9d2548 size 128 | #54 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.439728 | resume sending helper answer for #54 suppresed complete_v2_state_transition() and stole MD | #54 spent 1.18 milliseconds in resume sending helper answer | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.14 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.488098; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #47 | libevent_malloc: new ptr-libevent@0x7f4984012288 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #47 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.494344; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #39 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #39 spent 0.0878 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.495614; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #24 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x7f497800ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #24 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-55' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #55 at 0x55564d9d1908 | State DB: adding IKEv2 state #55 in UNDEFINED | pstats #55 ikev2.ike started | Message ID: init #55: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #55: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #55; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-55" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-55" IKE SA #55 "road-eastnet-nonat-55" "road-eastnet-nonat-55" #55: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-55 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-55": constructed local IKE proposals for road-eastnet-nonat-55 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 55 for state #55 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #55 | libevent_malloc: new ptr-libevent@0x7f497800ce18 size 128 | #55 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 55 for state #55 | RESET processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-55" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 55 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.286 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 55 time elapsed 0.001093 seconds | (#55) spent 1.09 milliseconds in crypto helper computing work-order 55: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 55 for state #55 to event queue | scheduling resume sending helper answer for #55 | libevent_malloc: new ptr-libevent@0x7f4988012288 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 55 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #55 | **emit ISAKMP Message: | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | ikev2 g^x c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | ikev2 g^x 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | ikev2 g^x e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | ikev2 g^x 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | ikev2 g^x fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | ikev2 g^x d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ikev2 g^x ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | ikev2 g^x cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | ikev2 g^x 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | ikev2 g^x bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | ikev2 g^x c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | ikev2 g^x 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | ikev2 g^x f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | ikev2 g^x 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | ikev2 g^x 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 2a cb b7 60 | IKEv2 nonce da e8 61 e2 f9 ec 1e f7 61 0e 16 fd 37 26 da 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 94 50 a2 8f 31 56 2f 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 37 | natd_hash: port=500 | natd_hash: hash= 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 0c 81 c1 25 | natd_hash: hash= 21 59 3e b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 0c 81 c1 25 | Notify data 21 59 3e b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 94 50 a2 8f 31 56 2f 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | natd_hash: hash= 23 e7 bb da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | Notify data 23 e7 bb da | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #55 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #55: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #55 to 4294967295 after switching state | Message ID: IKE #55 skipping update_recv as MD is fake | Message ID: sent #55 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.55:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | state #55 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497800ce18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #55 | libevent_malloc: new ptr-libevent@0x55564d9d3cc8 size 128 | #55 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.500593 | resume sending helper answer for #55 suppresed complete_v2_state_transition() and stole MD | #55 spent 0.344 milliseconds in resume sending helper answer | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.548775; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #48 | libevent_malloc: new ptr-libevent@0x7f4988012288 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #48 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.553117; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #25 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #25 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.55739; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #40 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x7f499c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #40 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-56' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #56 at 0x55564d9d3088 | State DB: adding IKEv2 state #56 in UNDEFINED | pstats #56 ikev2.ike started | Message ID: init #56: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #56: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #56; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-56" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-56" IKE SA #56 "road-eastnet-nonat-56" "road-eastnet-nonat-56" #56: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-56 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-56": constructed local IKE proposals for road-eastnet-nonat-56 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 56 for state #56 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8328 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #56 | libevent_malloc: new ptr-libevent@0x7f499c0121d8 size 128 | #56 spent 0.12 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | RESET processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-56" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 starting work-order 56 for state #56 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.196 milliseconds in whack | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 56 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 56 time elapsed 0.000566 seconds | (#56) spent 0.568 milliseconds in crypto helper computing work-order 56: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 56 for state #56 to event queue | scheduling resume sending helper answer for #56 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 56 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #56 | **emit ISAKMP Message: | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | ikev2 g^x 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | ikev2 g^x 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | ikev2 g^x a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | ikev2 g^x a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | ikev2 g^x 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | ikev2 g^x a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | ikev2 g^x 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | ikev2 g^x c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | ikev2 g^x b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | ikev2 g^x 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | ikev2 g^x 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | ikev2 g^x e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | ikev2 g^x 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | ikev2 g^x 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | ikev2 g^x d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed 98 c4 e7 73 | IKEv2 nonce 99 6a 10 03 4c 05 d2 47 b7 63 01 df 84 ab f5 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7e 13 a0 a8 d4 bb cd 52 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 38 | natd_hash: port=500 | natd_hash: hash= 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 44 f3 0f 36 | natd_hash: hash= 3f 0e fb 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 44 f3 0f 36 | Notify data 3f 0e fb 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7e 13 a0 a8 d4 bb cd 52 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | natd_hash: hash= 48 7d 7d 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | Notify data 48 7d 7d 53 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #56 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #56: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #56 to 4294967295 after switching state | Message ID: IKE #56 skipping update_recv as MD is fake | Message ID: sent #56 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.56:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | state #56 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c0121d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8328 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #56 | libevent_malloc: new ptr-libevent@0x55564d9d5448 size 128 | #56 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.558968 | resume sending helper answer for #56 suppresed complete_v2_state_transition() and stole MD | #56 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c0121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.609232; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #49 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x55564d9c9aa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #49 spent 0.328 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-57' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #57 at 0x55564d9d4808 | State DB: adding IKEv2 state #57 in UNDEFINED | pstats #57 ikev2.ike started | Message ID: init #57: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #57: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #57; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-57" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-57" IKE SA #57 "road-eastnet-nonat-57" "road-eastnet-nonat-57" #57: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-57 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-57": constructed local IKE proposals for road-eastnet-nonat-57 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 57 for state #57 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #57 | libevent_malloc: new ptr-libevent@0x55564d9c9aa8 size 128 | #57 spent 0.119 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-57" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.397 milliseconds in whack | crypto helper 3 resuming | crypto helper 3 starting work-order 57 for state #57 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 57 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 57 time elapsed 0.000592 seconds | (#57) spent 0.596 milliseconds in crypto helper computing work-order 57: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 57 for state #57 to event queue | scheduling resume sending helper answer for #57 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 57 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #57 | **emit ISAKMP Message: | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | ikev2 g^x 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | ikev2 g^x 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | ikev2 g^x bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | ikev2 g^x 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | ikev2 g^x 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | ikev2 g^x d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | ikev2 g^x 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | ikev2 g^x a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | ikev2 g^x f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | ikev2 g^x 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | ikev2 g^x 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | ikev2 g^x be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | ikev2 g^x 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | ikev2 g^x 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | ikev2 g^x 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a 64 a1 20 61 | IKEv2 nonce d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 0a 52 b5 05 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f4 89 eb 80 d6 38 b3 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 39 | natd_hash: port=500 | natd_hash: hash= e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 83 be f4 f9 | natd_hash: hash= ff 1a 96 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 83 be f4 f9 | Notify data ff 1a 96 5d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f4 89 eb 80 d6 38 b3 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | natd_hash: hash= 43 8d df d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | Notify data 43 8d df d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #57 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #57: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #57 to 4294967295 after switching state | Message ID: IKE #57 skipping update_recv as MD is fake | Message ID: sent #57 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.57:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | state #57 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9c9aa8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #57 | libevent_malloc: new ptr-libevent@0x55564d9d6bc8 size 128 | #57 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.617906 | resume sending helper answer for #57 suppresed complete_v2_state_transition() and stole MD | #57 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.621052; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #41 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #41 spent 0.0859 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.627297; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00178 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #26 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #26 spent 0.0916 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.669675; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #50 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x55564d9cc8f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #50 spent 0.396 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.179 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.685555; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #42 | libevent_malloc: new ptr-libevent@0x55564d9cc8f8 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #42 spent 0.424 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.687459; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #27 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x7f49b400f498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #27 spent 0.411 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-58' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #58 at 0x55564d9d5f88 | State DB: adding IKEv2 state #58 in UNDEFINED | pstats #58 ikev2.ike started | Message ID: init #58: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #58: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #58; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-58" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-58" IKE SA #58 "road-eastnet-nonat-58" "road-eastnet-nonat-58" #58: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-58 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-58": constructed local IKE proposals for road-eastnet-nonat-58 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 58 for state #58 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9bf708 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #58 | libevent_malloc: new ptr-libevent@0x7f49b400f498 size 128 | #58 spent 0.451 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | crypto helper 17 starting work-order 58 for state #58 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 58 | RESET processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-58" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.754 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 58 time elapsed 0.002689 seconds | (#58) spent 2.66 milliseconds in crypto helper computing work-order 58: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 58 for state #58 to event queue | scheduling resume sending helper answer for #58 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 58 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #58 | **emit ISAKMP Message: | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | ikev2 g^x d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | ikev2 g^x b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | ikev2 g^x 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | ikev2 g^x c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | ikev2 g^x 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | ikev2 g^x cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | ikev2 g^x df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | ikev2 g^x 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | ikev2 g^x 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | ikev2 g^x 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ikev2 g^x ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | ikev2 g^x f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | ikev2 g^x e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | ikev2 g^x 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | ikev2 g^x 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 73 d4 28 da 8a 47 15 66 82 b5 f0 7a e0 2f 71 | IKEv2 nonce 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 06 51 e5 19 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe ea ef 64 44 40 e5 d7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3a | natd_hash: port=500 | natd_hash: hash= 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb 79 63 8d 12 | natd_hash: hash= e8 e6 52 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb 79 63 8d 12 | Notify data e8 e6 52 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe ea ef 64 44 40 e5 d7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | natd_hash: hash= b6 fa e2 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | Notify data b6 fa e2 27 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #58 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #58: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #58 to 4294967295 after switching state | Message ID: IKE #58 skipping update_recv as MD is fake | Message ID: sent #58 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.58:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | state #58 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b400f498 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9bf708 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564d9d82d8 size 128 | #58 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.706257 | resume sending helper answer for #58 suppresed complete_v2_state_transition() and stole MD | #58 spent 1.59 milliseconds in resume sending helper answer | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.729832; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #51 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x55564d9cc818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #51 spent 0.308 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.747519; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #43 | libevent_malloc: new ptr-libevent@0x55564d9cc818 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x7f49980123b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #43 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.74829; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #28 | libevent_malloc: new ptr-libevent@0x7f49980123b8 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x7f49b800f898 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #28 spent 0.354 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-59' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #59 at 0x55564d9d7708 | State DB: adding IKEv2 state #59 in UNDEFINED | pstats #59 ikev2.ike started | Message ID: init #59: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #59: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #59; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-59" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-59" IKE SA #59 "road-eastnet-nonat-59" "road-eastnet-nonat-59" #59: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-59 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-59": constructed local IKE proposals for road-eastnet-nonat-59 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 59 for state #59 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c2608 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #59 | libevent_malloc: new ptr-libevent@0x7f49b800f898 size 128 | #59 spent 0.308 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | RESET processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-59" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 starting work-order 59 for state #59 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 59 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.526 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 59 time elapsed 0.002904 seconds | (#59) spent 2.89 milliseconds in crypto helper computing work-order 59: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 59 for state #59 to event queue | scheduling resume sending helper answer for #59 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 | libevent_realloc: release ptr-libevent@0x7f49a800f218 | libevent_realloc: new ptr-libevent@0x7f4978014c98 size 1024 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 59 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #59 | **emit ISAKMP Message: | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | ikev2 g^x 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | ikev2 g^x 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | ikev2 g^x 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | ikev2 g^x 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ikev2 g^x ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | ikev2 g^x 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ikev2 g^x ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | ikev2 g^x 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | ikev2 g^x 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | ikev2 g^x 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | ikev2 g^x 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | ikev2 g^x 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | ikev2 g^x 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | ikev2 g^x d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | ikev2 g^x 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a 7f 56 89 4d | IKEv2 nonce 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 f2 0e 05 68 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 56 9f f4 03 42 0d 48 fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3b | natd_hash: port=500 | natd_hash: hash= e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca 30 e1 4b 88 | natd_hash: hash= 38 f5 51 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca 30 e1 4b 88 | Notify data 38 f5 51 02 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 56 9f f4 03 42 0d 48 fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | natd_hash: hash= 5f 79 63 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | Notify data 5f 79 63 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #59 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #59: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #59 to 4294967295 after switching state | Message ID: IKE #59 skipping update_recv as MD is fake | Message ID: sent #59 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.59:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | state #59 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b800f898 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c2608 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #59 | libevent_malloc: new ptr-libevent@0x55564d9d99e8 size 128 | #59 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.785466 | resume sending helper answer for #59 suppresed complete_v2_state_transition() and stole MD | #59 spent 1.05 milliseconds in resume sending helper answer | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.135 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.78988; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x55564d9cdf98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #52 spent 0.406 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.807658; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #44 | libevent_malloc: new ptr-libevent@0x55564d9cdf98 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x7f498c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #44 spent 0.306 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.823215; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001375 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #29 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x55564d9b84f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #29 spent 0.251 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-60' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #60 at 0x55564d9d8e18 | State DB: adding IKEv2 state #60 in UNDEFINED | pstats #60 ikev2.ike started | Message ID: init #60: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #60: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #60; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-60" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-60" IKE SA #60 "road-eastnet-nonat-60" "road-eastnet-nonat-60" #60: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-60 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-60": constructed local IKE proposals for road-eastnet-nonat-60 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 60 for state #60 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #60 | libevent_malloc: new ptr-libevent@0x55564d9b84f8 size 128 | #60 spent 0.134 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 resuming | RESET processing: connection "road-eastnet-nonat-60" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 19 starting work-order 60 for state #60 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 60 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.219 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 60 time elapsed 0.000692 seconds | (#60) spent 0.693 milliseconds in crypto helper computing work-order 60: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 60 for state #60 to event queue | scheduling resume sending helper answer for #60 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 60 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #60 | **emit ISAKMP Message: | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | ikev2 g^x 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | ikev2 g^x d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | ikev2 g^x c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | ikev2 g^x fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | ikev2 g^x 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | ikev2 g^x 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | ikev2 g^x 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | ikev2 g^x a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | ikev2 g^x b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | ikev2 g^x 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | ikev2 g^x a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | ikev2 g^x 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | ikev2 g^x 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | ikev2 g^x a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | ikev2 g^x 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 a2 8e d0 55 22 3f f5 38 61 25 5b 41 d4 36 6b | IKEv2 nonce 98 fd f5 69 d2 60 0a 2b 4e b8 db de 2a 18 c0 ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b9 ec 4a e5 91 2e e5 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3c | natd_hash: port=500 | natd_hash: hash= 18 89 01 aa 56 d0 2f df db 86 d7 09 92 98 b5 ab | natd_hash: hash= 53 a6 be eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 89 01 aa 56 d0 2f df db 86 d7 09 92 98 b5 ab | Notify data 53 a6 be eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b9 ec 4a e5 91 2e e5 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | natd_hash: hash= de d9 c4 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | Notify data de d9 c4 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #60 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #60: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #60 to 4294967295 after switching state | Message ID: IKE #60 skipping update_recv as MD is fake | Message ID: sent #60 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.60:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | state #60 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9b84f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #60 | libevent_malloc: new ptr-libevent@0x55564d9db168 size 128 | #60 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.8469 | resume sending helper answer for #60 suppresed complete_v2_state_transition() and stole MD | #60 spent 0.357 milliseconds in resume sending helper answer | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c012338 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.849078; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #53 spent 0.0827 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.868334; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #45 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x7f4990012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #45 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.90263; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #30 | libevent_malloc: new ptr-libevent@0x7f4990012288 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x55564d9a2708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #30 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0493 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-61' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #61 at 0x55564d9da528 | State DB: adding IKEv2 state #61 in UNDEFINED | pstats #61 ikev2.ike started | Message ID: init #61: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #61: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #61; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-61" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-61" IKE SA #61 "road-eastnet-nonat-61" "road-eastnet-nonat-61" #61: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-61 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-61": constructed local IKE proposals for road-eastnet-nonat-61 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 61 for state #61 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49840058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #61 | libevent_malloc: new ptr-libevent@0x55564d9a2708 size 128 | #61 spent 0.113 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-61" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.174 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 61 for state #61 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 61 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 61 time elapsed 0.000663 seconds | (#61) spent 0.667 milliseconds in crypto helper computing work-order 61: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 61 for state #61 to event queue | scheduling resume sending helper answer for #61 | libevent_malloc: new ptr-libevent@0x7f49bc014da8 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 61 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #61 | **emit ISAKMP Message: | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | ikev2 g^x 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | ikev2 g^x 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | ikev2 g^x 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | ikev2 g^x be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | ikev2 g^x 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | ikev2 g^x 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | ikev2 g^x a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | ikev2 g^x e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | ikev2 g^x 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | ikev2 g^x 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ikev2 g^x ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | ikev2 g^x 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | ikev2 g^x 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | ikev2 g^x 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | ikev2 g^x 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 18 84 ed 60 b0 44 f7 15 23 9d 77 2d 45 88 d3 c5 | IKEv2 nonce 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 32 df 2a ed | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 97 75 e2 bc 23 01 80 52 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3d | natd_hash: port=500 | natd_hash: hash= 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c 6e 9e bb 3e | natd_hash: hash= 7f 56 6f 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c 6e 9e bb 3e | Notify data 7f 56 6f 14 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 97 75 e2 bc 23 01 80 52 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | natd_hash: hash= 92 c8 3d bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | Notify data 92 c8 3d bd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #61 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #61: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #61 to 4294967295 after switching state | Message ID: IKE #61 skipping update_recv as MD is fake | Message ID: sent #61 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.61:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | state #61 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9a2708 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49840058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #61 | libevent_malloc: new ptr-libevent@0x55564d9dc878 size 128 | #61 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.905365 | resume sending helper answer for #61 suppresed complete_v2_state_transition() and stole MD | #61 spent 0.322 milliseconds in resume sending helper answer | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc014da8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.931583; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002796 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f49bc014da8 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x7f498000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #46 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10579.939014; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #54 | libevent_malloc: new ptr-libevent@0x7f498000cd68 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x55564d9d2548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #54 spent 0.282 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10579.975709; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #31 | libevent_malloc: new ptr-libevent@0x55564d9d2548 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #31 spent 0.435 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10579.980615; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #1 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #1 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10579.989493; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #47 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x7f4984012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #47 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-62' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #62 at 0x55564d9dbca8 | State DB: adding IKEv2 state #62 in UNDEFINED | pstats #62 ikev2.ike started | Message ID: init #62: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #62: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #62; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-62" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-62" IKE SA #62 "road-eastnet-nonat-62" "road-eastnet-nonat-62" #62: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-62 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-62": constructed local IKE proposals for road-eastnet-nonat-62 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 62 for state #62 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #62 | libevent_malloc: new ptr-libevent@0x7f4984012288 size 128 | #62 spent 0.41 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 62 for state #62 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 62 | RESET processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-62" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.709 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 62 time elapsed 0.004449 seconds | (#62) spent 4.44 milliseconds in crypto helper computing work-order 62: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 62 for state #62 to event queue | scheduling resume sending helper answer for #62 | libevent_malloc: new ptr-libevent@0x7f49b4014ca8 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 62 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #62 | **emit ISAKMP Message: | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | ikev2 g^x 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | ikev2 g^x 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ikev2 g^x ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ikev2 g^x ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | ikev2 g^x bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | ikev2 g^x cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | ikev2 g^x 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | ikev2 g^x 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | ikev2 g^x cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | ikev2 g^x 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | ikev2 g^x 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | ikev2 g^x 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | ikev2 g^x 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | ikev2 g^x a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | ikev2 g^x f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cf ac 0e f6 77 95 81 42 bf a8 42 1e e4 9d 56 7d | IKEv2 nonce b0 24 83 76 1a 60 d6 04 26 c3 2b b0 30 d2 ef b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 84 b5 0b 8d 2e f8 83 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3e | natd_hash: port=500 | natd_hash: hash= 23 66 47 f4 0b 62 20 91 3d 53 b7 39 8e 7e 2e 85 | natd_hash: hash= 2a 0e 2d b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 66 47 f4 0b 62 20 91 3d 53 b7 39 8e 7e 2e 85 | Notify data 2a 0e 2d b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 84 b5 0b 8d 2e f8 83 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | natd_hash: hash= 2b 46 6e d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | Notify data 2b 46 6e d6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #62 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #62: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #62 to 4294967295 after switching state | Message ID: IKE #62 skipping update_recv as MD is fake | Message ID: sent #62 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.62:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | state #62 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984012288 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #62 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 | #62 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10579.997213 | resume sending helper answer for #62 suppresed complete_v2_state_transition() and stole MD | #62 spent 1.54 milliseconds in resume sending helper answer | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4014ca8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.00177; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #55 | libevent_malloc: new ptr-libevent@0x7f49b4014ca8 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x55564d9d3cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #55 spent 0.412 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.046665; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001868 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564d9d3cc8 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #32 spent 0.609 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.329 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.049905; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00274 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #48 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x7f4988012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #48 spent 0.397 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.059796; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #56 | libevent_malloc: new ptr-libevent@0x7f4988012288 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x55564d9d5448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #56 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-63' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #63 at 0x55564d9dd3b8 | State DB: adding IKEv2 state #63 in UNDEFINED | pstats #63 ikev2.ike started | Message ID: init #63: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #63: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #63; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-63" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-63" IKE SA #63 "road-eastnet-nonat-63" "road-eastnet-nonat-63" #63: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-63 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-63": constructed local IKE proposals for road-eastnet-nonat-63 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 63 for state #63 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8328 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #63 | libevent_malloc: new ptr-libevent@0x55564d9d5448 size 128 | #63 spent 0.409 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-63" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 63 for state #63 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 63 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.697 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 63 time elapsed 0.002718 seconds | (#63) spent 2.69 milliseconds in crypto helper computing work-order 63: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 63 for state #63 to event queue | scheduling resume sending helper answer for #63 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 63 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #63 | **emit ISAKMP Message: | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | ikev2 g^x 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | ikev2 g^x 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | ikev2 g^x 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | ikev2 g^x 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | ikev2 g^x 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | ikev2 g^x 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | ikev2 g^x 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | ikev2 g^x 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | ikev2 g^x 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | ikev2 g^x c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ikev2 g^x ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ikev2 g^x ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | ikev2 g^x a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | ikev2 g^x 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | ikev2 g^x f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 25 ff e6 a5 | IKEv2 nonce f3 88 1f f7 b5 7d 41 2e e6 59 92 90 ef 08 75 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 14 40 af b8 b2 de 93 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3f | natd_hash: port=500 | natd_hash: hash= 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b b7 09 ec 03 | natd_hash: hash= 6d 03 e0 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b b7 09 ec 03 | Notify data 6d 03 e0 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 14 40 af b8 b2 de 93 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | natd_hash: hash= cd a2 55 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | Notify data cd a2 55 10 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #63 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #63: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #63 to 4294967295 after switching state | Message ID: IKE #63 skipping update_recv as MD is fake | Message ID: sent #63 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.63:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | state #63 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9d5448 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8328 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #63 | libevent_malloc: new ptr-libevent@0x55564d9ddf98 size 128 | #63 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.085022 | resume sending helper answer for #63 suppresed complete_v2_state_transition() and stole MD | #63 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8014d08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.101572; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #2 spent 0.436 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.110434; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #49 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #49 spent 0.288 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.146 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.119018; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #57 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x55564d9d6bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #57 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.119236; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #33 | libevent_malloc: new ptr-libevent@0x55564d9d6bc8 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x7f49a00121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #33 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0807 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-64' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #64 at 0x55564d9debc8 | State DB: adding IKEv2 state #64 in UNDEFINED | pstats #64 ikev2.ike started | Message ID: init #64: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #64: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #64; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-64" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-64" IKE SA #64 "road-eastnet-nonat-64" "road-eastnet-nonat-64" #64: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-64 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-64": constructed local IKE proposals for road-eastnet-nonat-64 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 64 for state #64 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8398 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #64 | libevent_malloc: new ptr-libevent@0x7f49a00121d8 size 128 | #64 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-64" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 5 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 5 starting work-order 64 for state #64 | spent 0.26 milliseconds in whack | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 64 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 64 time elapsed 0.000901 seconds | (#64) spent 0.911 milliseconds in crypto helper computing work-order 64: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 64 for state #64 to event queue | scheduling resume sending helper answer for #64 | libevent_malloc: new ptr-libevent@0x7f49ac017a48 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 64 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #64 | **emit ISAKMP Message: | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ikev2 g^x ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | ikev2 g^x 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | ikev2 g^x 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | ikev2 g^x 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | ikev2 g^x 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | ikev2 g^x 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | ikev2 g^x f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | ikev2 g^x 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | ikev2 g^x 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | ikev2 g^x 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | ikev2 g^x 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | ikev2 g^x 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | ikev2 g^x 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | ikev2 g^x 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | ikev2 g^x a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b 51 44 18 9a | IKEv2 nonce 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 24 cd 56 6d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 4f 4b 15 71 bd 1d ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 40 | natd_hash: port=500 | natd_hash: hash= 37 a2 76 26 20 c0 94 19 01 d5 27 9c af 81 dc 89 | natd_hash: hash= 3a 15 b7 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 a2 76 26 20 c0 94 19 01 d5 27 9c af 81 dc 89 | Notify data 3a 15 b7 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 4f 4b 15 71 bd 1d ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | natd_hash: hash= 81 97 24 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | Notify data 81 97 24 39 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #64 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #64: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #64 to 4294967295 after switching state | Message ID: IKE #64 skipping update_recv as MD is fake | Message ID: sent #64 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.64:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | state #64 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00121d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8398 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #64 | libevent_malloc: new ptr-libevent@0x55564d9e0df8 size 128 | #64 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.149778 | resume sending helper answer for #64 suppresed complete_v2_state_transition() and stole MD | #64 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac017a48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.162968; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004769 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f49ac017a48 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #3 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.170288; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #50 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #50 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.190677; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002704 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #34 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #34 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.204965; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x55564d9d82d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #58 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0516 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-65' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #65 at 0x55564d9e0228 | State DB: adding IKEv2 state #65 in UNDEFINED | pstats #65 ikev2.ike started | Message ID: init #65: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #65: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #65; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-65" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-65" IKE SA #65 "road-eastnet-nonat-65" "road-eastnet-nonat-65" #65: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-65 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-65": constructed local IKE proposals for road-eastnet-nonat-65 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 65 for state #65 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9bf708 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #65 | libevent_malloc: new ptr-libevent@0x55564d9d82d8 size 128 | #65 spent 0.141 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-65" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.216 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 65 for state #65 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 65 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 65 time elapsed 0.000701 seconds | (#65) spent 0.706 milliseconds in crypto helper computing work-order 65: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 65 for state #65 to event queue | scheduling resume sending helper answer for #65 | libevent_malloc: new ptr-libevent@0x7f49b0017af8 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 65 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #65 | **emit ISAKMP Message: | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | ikev2 g^x b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | ikev2 g^x 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | ikev2 g^x d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | ikev2 g^x a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | ikev2 g^x 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | ikev2 g^x 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | ikev2 g^x 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | ikev2 g^x 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | ikev2 g^x 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | ikev2 g^x 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | ikev2 g^x 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | ikev2 g^x 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | ikev2 g^x 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | ikev2 g^x f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | ikev2 g^x 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a 0d 4a 48 31 | IKEv2 nonce d0 77 88 fd cb ce df 79 87 cc 9a 9a bc a6 87 37 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8a 90 18 74 c9 34 56 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 41 | natd_hash: port=500 | natd_hash: hash= e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 78 e9 32 25 | natd_hash: hash= ff b5 f0 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 78 e9 32 25 | Notify data ff b5 f0 f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8a 90 18 74 c9 34 56 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | natd_hash: hash= 4e ac d9 cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | Notify data 4e ac d9 cd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #65 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #65: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #65 to 4294967295 after switching state | Message ID: IKE #65 skipping update_recv as MD is fake | Message ID: sent #65 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.65:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | state #65 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9d82d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9bf708 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #65 | libevent_malloc: new ptr-libevent@0x55564d9e2508 size 128 | #65 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.210099 | resume sending helper answer for #65 suppresed complete_v2_state_transition() and stole MD | #65 spent 0.414 milliseconds in resume sending helper answer | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0017af8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.052 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.222335; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f49b0017af8 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x7f498400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #4 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0879 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.23075; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #51 | libevent_malloc: new ptr-libevent@0x7f498400cd68 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #51 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.251103; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #35 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x55564d9c2678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #35 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-66' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #66 at 0x55564d9e1938 | State DB: adding IKEv2 state #66 in UNDEFINED | pstats #66 ikev2.ike started | Message ID: init #66: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #66: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #66; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-66" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-66" IKE SA #66 "road-eastnet-nonat-66" "road-eastnet-nonat-66" #66: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-66 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-66": constructed local IKE proposals for road-eastnet-nonat-66 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 66 for state #66 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #66 | libevent_malloc: new ptr-libevent@0x55564d9c2678 size 128 | #66 spent 0.147 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 66 for state #66 | RESET processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-66" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 66 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 66 time elapsed 0.001242 seconds | (#66) spent 1.25 milliseconds in crypto helper computing work-order 66: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 66 for state #66 to event queue | scheduling resume sending helper answer for #66 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 66 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #66 | **emit ISAKMP Message: | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ikev2 g^x ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | ikev2 g^x b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | ikev2 g^x fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | ikev2 g^x 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | ikev2 g^x 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | ikev2 g^x 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | ikev2 g^x f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | ikev2 g^x c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | ikev2 g^x 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | ikev2 g^x 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | ikev2 g^x af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | ikev2 g^x 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | ikev2 g^x 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | ikev2 g^x 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | ikev2 g^x cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa f1 02 17 7a d2 79 f0 b3 91 08 2d 7c 5c 1f 82 | IKEv2 nonce 70 41 6b 2b e8 22 07 c7 18 37 b5 89 ee 18 b9 8b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 de 88 f6 25 39 76 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 42 | natd_hash: port=500 | natd_hash: hash= 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 fb f8 03 36 | natd_hash: hash= 21 96 fb 93 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 fb f8 03 36 | Notify data 21 96 fb 93 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 de 88 f6 25 39 76 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | natd_hash: hash= 52 0c ca 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | Notify data 52 0c ca 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #66 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #66: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #66 to 4294967295 after switching state | Message ID: IKE #66 skipping update_recv as MD is fake | Message ID: sent #66 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.66:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | state #66 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9c2678 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #66 | libevent_malloc: new ptr-libevent@0x55564d9e3c18 size 128 | #66 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.271615 | resume sending helper answer for #66 suppresed complete_v2_state_transition() and stole MD | #66 spent 0.406 milliseconds in resume sending helper answer | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40179e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.285837; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #59 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x55564d9d99e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #59 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.286017; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #5 | libevent_malloc: new ptr-libevent@0x55564d9d99e8 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x7f498800cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #5 spent 0.0954 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.29034; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f498800cd68 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #52 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.313632; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #36 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x55564d9c3df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #36 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-67' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #67 at 0x55564d9e3048 | State DB: adding IKEv2 state #67 in UNDEFINED | pstats #67 ikev2.ike started | Message ID: init #67: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #67: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #67; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-67" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-67" IKE SA #67 "road-eastnet-nonat-67" "road-eastnet-nonat-67" #67: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-67 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-67": constructed local IKE proposals for road-eastnet-nonat-67 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 67 for state #67 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #67 | libevent_malloc: new ptr-libevent@0x55564d9c3df8 size 128 | #67 spent 0.124 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | RESET processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-67" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 8 starting work-order 67 for state #67 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 67 | spent 0.205 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 67 time elapsed 0.000957 seconds | (#67) spent 0.963 milliseconds in crypto helper computing work-order 67: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 67 for state #67 to event queue | scheduling resume sending helper answer for #67 | libevent_malloc: new ptr-libevent@0x7f49a8017b18 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 67 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #67 | **emit ISAKMP Message: | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | ikev2 g^x fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | ikev2 g^x f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | ikev2 g^x 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | ikev2 g^x 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | ikev2 g^x b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | ikev2 g^x 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | ikev2 g^x cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | ikev2 g^x 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | ikev2 g^x 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | ikev2 g^x 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | ikev2 g^x 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ikev2 g^x ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | ikev2 g^x b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | ikev2 g^x a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | ikev2 g^x 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fa 88 56 20 4a 8c 4f a2 22 8f f4 54 44 a4 bb 65 | IKEv2 nonce 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 01 84 96 e9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0d 8b 05 79 3d 0e 35 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 43 | natd_hash: port=500 | natd_hash: hash= d8 31 8d df c9 c8 4a d7 43 4c 5e 56 a2 24 84 92 | natd_hash: hash= 70 65 e4 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 31 8d df c9 c8 4a d7 43 4c 5e 56 a2 24 84 92 | Notify data 70 65 e4 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0d 8b 05 79 3d 0e 35 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | natd_hash: hash= 3b f3 8c 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | Notify data 3b f3 8c 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #67 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #67: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #67 to 4294967295 after switching state | Message ID: IKE #67 skipping update_recv as MD is fake | Message ID: sent #67 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.67:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | state #67 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9c3df8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #67 | libevent_malloc: new ptr-libevent@0x55564d9e5328 size 128 | #67 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.331152 | resume sending helper answer for #67 suppresed complete_v2_state_transition() and stole MD | #67 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8017b18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.346332; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #6 | libevent_malloc: new ptr-libevent@0x7f49a8017b18 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #6 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.347595; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500695 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #60 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x55564d9db168 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #60 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.350906; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #53 | libevent_malloc: new ptr-libevent@0x55564d9db168 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #53 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.373266; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #37 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x55564d9c5578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #37 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-68' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #68 at 0x55564d9e4758 | State DB: adding IKEv2 state #68 in UNDEFINED | pstats #68 ikev2.ike started | Message ID: init #68: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #68: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #68; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-68" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-68" IKE SA #68 "road-eastnet-nonat-68" "road-eastnet-nonat-68" #68: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-68 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-68": constructed local IKE proposals for road-eastnet-nonat-68 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 68 for state #68 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #68 | libevent_malloc: new ptr-libevent@0x55564d9c5578 size 128 | #68 spent 0.17 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | crypto helper 9 starting work-order 68 for state #68 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 68 | RESET processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-68" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.269 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 68 time elapsed 0.001031 seconds | (#68) spent 1.03 milliseconds in crypto helper computing work-order 68: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 68 for state #68 to event queue | scheduling resume sending helper answer for #68 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 68 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #68 | **emit ISAKMP Message: | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | ikev2 g^x 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | ikev2 g^x d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | ikev2 g^x 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | ikev2 g^x 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | ikev2 g^x 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | ikev2 g^x 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | ikev2 g^x 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | ikev2 g^x 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | ikev2 g^x 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ikev2 g^x ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | ikev2 g^x 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | ikev2 g^x 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | ikev2 g^x bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | ikev2 g^x 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | ikev2 g^x f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ed d7 0b ff d6 0c 12 ea a1 a5 32 fa b5 b9 89 bc | IKEv2 nonce 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 36 2a 26 3c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b3 eb fb d5 64 69 17 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 44 | natd_hash: port=500 | natd_hash: hash= 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 c4 99 21 56 | natd_hash: hash= 27 89 e7 e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 c4 99 21 56 | Notify data 27 89 e7 e4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b3 eb fb d5 64 69 17 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | natd_hash: hash= 56 28 d6 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | Notify data 56 28 d6 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #68 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #68: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #68 to 4294967295 after switching state | Message ID: IKE #68 skipping update_recv as MD is fake | Message ID: sent #68 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.68:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | state #68 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9c5578 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #68 | libevent_malloc: new ptr-libevent@0x55564d9e5248 size 128 | #68 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.392454 | resume sending helper answer for #68 suppresed complete_v2_state_transition() and stole MD | #68 spent 0.416 milliseconds in resume sending helper answer | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0179e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.406631; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #61 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x55564d9dc878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #61 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.406834; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #7 | libevent_malloc: new ptr-libevent@0x55564d9dc878 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x55564d9ae1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #7 spent 0.0677 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.434124; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #38 | libevent_malloc: new ptr-libevent@0x55564d9ae1e8 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x55564d9c6cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #38 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.44048; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #54 | libevent_malloc: new ptr-libevent@0x55564d9c6cf8 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x7f498000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #54 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-69' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #69 at 0x55564d9e5e68 | State DB: adding IKEv2 state #69 in UNDEFINED | pstats #69 ikev2.ike started | Message ID: init #69: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #69: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #69; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-69" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-69" IKE SA #69 "road-eastnet-nonat-69" "road-eastnet-nonat-69" #69: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-69 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-69": constructed local IKE proposals for road-eastnet-nonat-69 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 69 for state #69 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f498000cd68 size 128 | #69 spent 0.144 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 starting work-order 69 for state #69 | RESET processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-69" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 69 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 69 time elapsed 0.000759 seconds | (#69) spent 0.758 milliseconds in crypto helper computing work-order 69: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 69 for state #69 to event queue | scheduling resume sending helper answer for #69 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 69 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #69 | **emit ISAKMP Message: | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | ikev2 g^x c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | ikev2 g^x 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | ikev2 g^x 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | ikev2 g^x 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | ikev2 g^x 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | ikev2 g^x 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | ikev2 g^x 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | ikev2 g^x 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ikev2 g^x ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | ikev2 g^x 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | ikev2 g^x b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | ikev2 g^x cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | ikev2 g^x 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | ikev2 g^x 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | ikev2 g^x 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 77 d4 5d c8 7c ae 56 10 64 88 cf 82 06 44 1d 09 | IKEv2 nonce 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 ac 05 9b 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5e 0e 52 7e 44 75 60 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 45 | natd_hash: port=500 | natd_hash: hash= 72 25 28 c2 57 de e0 38 77 dc c1 cf 18 51 b8 bc | natd_hash: hash= 2c f9 5c e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 25 28 c2 57 de e0 38 77 dc c1 cf 18 51 b8 bc | Notify data 2c f9 5c e5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5e 0e 52 7e 44 75 60 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | natd_hash: hash= 84 95 e6 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | Notify data 84 95 e6 e2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #69 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #69: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #69 to 4294967295 after switching state | Message ID: IKE #69 skipping update_recv as MD is fake | Message ID: sent #69 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.69:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | state #69 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498000cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #69 | libevent_malloc: new ptr-libevent@0x55564d9e69c8 size 128 | #69 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.452055 | resume sending helper answer for #69 suppresed complete_v2_state_transition() and stole MD | #69 spent 0.422 milliseconds in resume sending helper answer | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00179e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.473229; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #8 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.495501; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002889 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #39 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #39 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.496762; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #62 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #62 spent 0.088 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.502011; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #55 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x7f49b4014ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #55 spent 0.0919 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-70' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #70 at 0x55564d9e7678 | State DB: adding IKEv2 state #70 in UNDEFINED | pstats #70 ikev2.ike started | Message ID: init #70: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #70: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #70; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-70" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-70" IKE SA #70 "road-eastnet-nonat-70" "road-eastnet-nonat-70" #70: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-70 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-70": constructed local IKE proposals for road-eastnet-nonat-70 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 70 for state #70 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db088 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #70 | libevent_malloc: new ptr-libevent@0x7f49b4014ca8 size 128 | #70 spent 0.132 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 70 for state #70 | RESET processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 70 | RESET processing: connection "road-eastnet-nonat-70" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.227 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 70 time elapsed 0.000553 seconds | (#70) spent 0.558 milliseconds in crypto helper computing work-order 70: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 70 for state #70 to event queue | scheduling resume sending helper answer for #70 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 70 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #70 | **emit ISAKMP Message: | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | ikev2 g^x 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | ikev2 g^x 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | ikev2 g^x 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | ikev2 g^x 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | ikev2 g^x b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | ikev2 g^x 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | ikev2 g^x 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | ikev2 g^x 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | ikev2 g^x dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | ikev2 g^x 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | ikev2 g^x 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | ikev2 g^x 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | ikev2 g^x c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | ikev2 g^x b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | ikev2 g^x 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 ae 30 3e 73 | IKEv2 nonce 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 b0 99 fd 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6f c5 a8 53 b1 c3 90 21 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 46 | natd_hash: port=500 | natd_hash: hash= fc 58 55 1c 75 bb 97 2b 9a bd b8 0b 31 d4 8f 58 | natd_hash: hash= d3 22 99 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 58 55 1c 75 bb 97 2b 9a bd b8 0b 31 d4 8f 58 | Notify data d3 22 99 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6f c5 a8 53 b1 c3 90 21 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | natd_hash: hash= dd f6 e1 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | Notify data dd f6 e1 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #70 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #70: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #70 to 4294967295 after switching state | Message ID: IKE #70 skipping update_recv as MD is fake | Message ID: sent #70 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.70:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | state #70 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4014ca8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db088 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #70 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 | #70 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.51087 | resume sending helper answer for #70 suppresed complete_v2_state_transition() and stole MD | #70 spent 0.497 milliseconds in resume sending helper answer | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994017af8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.534065; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #9 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #9 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.558353; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #40 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #40 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.56071; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #56 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x7f4988012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #56 spent 0.0947 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-71' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #71 at 0x55564d9e8cd8 | State DB: adding IKEv2 state #71 in UNDEFINED | pstats #71 ikev2.ike started | Message ID: init #71: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #71: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #71; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-71" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-71" IKE SA #71 "road-eastnet-nonat-71" "road-eastnet-nonat-71" #71: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-71 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-71": constructed local IKE proposals for road-eastnet-nonat-71 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 71 for state #71 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d3c58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #71 | libevent_malloc: new ptr-libevent@0x7f4988012288 size 128 | #71 spent 0.124 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 71 for state #71 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 71 | RESET processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-71" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.211 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 71 time elapsed 0.000976 seconds | (#71) spent 0.983 milliseconds in crypto helper computing work-order 71: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 71 for state #71 to event queue | scheduling resume sending helper answer for #71 | libevent_malloc: new ptr-libevent@0x7f4998017bc8 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 71 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #71 | **emit ISAKMP Message: | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | ikev2 g^x e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | ikev2 g^x 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | ikev2 g^x 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | ikev2 g^x c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | ikev2 g^x 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | ikev2 g^x 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | ikev2 g^x d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | ikev2 g^x dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | ikev2 g^x fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | ikev2 g^x 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | ikev2 g^x 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | ikev2 g^x f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | ikev2 g^x 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | ikev2 g^x 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | ikev2 g^x 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 79 4c e4 be e7 f6 8c d2 25 59 bd 6f d7 88 3d 8f | IKEv2 nonce 24 6f be 40 34 66 24 14 c6 5c 1d 2c 3d d0 e4 cc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d8 08 46 c9 59 b2 ee 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 47 | natd_hash: port=500 | natd_hash: hash= 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 1b 5c 8f 60 | natd_hash: hash= 1e a6 62 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 1b 5c 8f 60 | Notify data 1e a6 62 16 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d8 08 46 c9 59 b2 ee 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | natd_hash: hash= 01 67 e2 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | Notify data 01 67 e2 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #71 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #71: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #71 to 4294967295 after switching state | Message ID: IKE #71 skipping update_recv as MD is fake | Message ID: sent #71 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.71:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | state #71 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988012288 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d3c58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #71 | libevent_malloc: new ptr-libevent@0x55564d9eb028 size 128 | #71 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.570382 | resume sending helper answer for #71 suppresed complete_v2_state_transition() and stole MD | #71 spent 0.339 milliseconds in resume sending helper answer | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998017bc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.584547; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #63 | libevent_malloc: new ptr-libevent@0x7f4998017bc8 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x55564d9ddf98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #63 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.596836; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #10 | libevent_malloc: new ptr-libevent@0x55564d9ddf98 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #10 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.087 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.620255; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #57 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #57 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.622515; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #41 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #41 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-72' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #72 at 0x55564d9ea3e8 | State DB: adding IKEv2 state #72 in UNDEFINED | pstats #72 ikev2.ike started | Message ID: init #72: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #72: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #72; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-72" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-72" IKE SA #72 "road-eastnet-nonat-72" "road-eastnet-nonat-72" #72: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-72 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-72": constructed local IKE proposals for road-eastnet-nonat-72 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 72 for state #72 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6b58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 | crypto helper 13 resuming | #72 spent 0.121 milliseconds in ikev2_parent_outI1() | crypto helper 13 starting work-order 72 for state #72 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 72 | RESET processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-72" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.202 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 72 time elapsed 0.000633 seconds | (#72) spent 0.637 milliseconds in crypto helper computing work-order 72: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 72 for state #72 to event queue | scheduling resume sending helper answer for #72 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 72 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #72 | **emit ISAKMP Message: | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | ikev2 g^x 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | ikev2 g^x 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | ikev2 g^x 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | ikev2 g^x b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | ikev2 g^x dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | ikev2 g^x be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | ikev2 g^x 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | ikev2 g^x 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | ikev2 g^x 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | ikev2 g^x e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | ikev2 g^x e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ikev2 g^x ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | ikev2 g^x c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | ikev2 g^x 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | ikev2 g^x da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 12 12 09 36 17 f2 8d b1 cc 89 95 23 26 9a 60 | IKEv2 nonce 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e cc fc 78 bc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 3e 29 46 70 31 01 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 48 | natd_hash: port=500 | natd_hash: hash= 34 00 88 40 31 84 60 68 77 ee af 89 57 14 11 44 | natd_hash: hash= 89 37 2f 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 00 88 40 31 84 60 68 77 ee af 89 57 14 11 44 | Notify data 89 37 2f 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 3e 29 46 70 31 01 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | natd_hash: hash= c8 3b b5 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | Notify data c8 3b b5 6d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #72 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #72: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #72 to 4294967295 after switching state | Message ID: IKE #72 skipping update_recv as MD is fake | Message ID: sent #72 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.72:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | state #72 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6b58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #72 | libevent_malloc: new ptr-libevent@0x55564d9ec7a8 size 128 | #72 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.628889 | resume sending helper answer for #72 suppresed complete_v2_state_transition() and stole MD | #72 spent 0.373 milliseconds in resume sending helper answer | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c017a48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.650061; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #64 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x55564d9e0df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #64 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0756 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.657436; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #11 | libevent_malloc: new ptr-libevent@0x55564d9e0df8 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #11 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.6867; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #42 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x55564d9cc8f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #42 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-73' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #73 at 0x55564d9ebb68 | State DB: adding IKEv2 state #73 in UNDEFINED | pstats #73 ikev2.ike started | Message ID: init #73: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #73: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #73; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-73" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-73" IKE SA #73 "road-eastnet-nonat-73" "road-eastnet-nonat-73" #73: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-73 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-73": constructed local IKE proposals for road-eastnet-nonat-73 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 73 for state #73 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #73 | libevent_malloc: new ptr-libevent@0x55564d9cc8f8 size 128 | #73 spent 0.111 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-73" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 14 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 14 starting work-order 73 for state #73 | spent 0.186 milliseconds in whack | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 73 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 73 time elapsed 0.000583 seconds | (#73) spent 0.587 milliseconds in crypto helper computing work-order 73: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 73 for state #73 to event queue | scheduling resume sending helper answer for #73 | libevent_malloc: new ptr-libevent@0x7f4990017af8 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 73 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #73 | **emit ISAKMP Message: | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | ikev2 g^x e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | ikev2 g^x 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | ikev2 g^x 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | ikev2 g^x 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | ikev2 g^x c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | ikev2 g^x 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | ikev2 g^x 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | ikev2 g^x 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | ikev2 g^x 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | ikev2 g^x 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | ikev2 g^x 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | ikev2 g^x 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | ikev2 g^x 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | ikev2 g^x 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | ikev2 g^x 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 00 61 f2 7a b4 76 2b 39 29 30 25 1a 30 db 3e 39 | IKEv2 nonce 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 0b ef 5b b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 e8 4f fe 5a 00 15 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 49 | natd_hash: port=500 | natd_hash: hash= bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 8e a2 c3 ff | natd_hash: hash= 57 26 5a df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 8e a2 c3 ff | Notify data 57 26 5a df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 e8 4f fe 5a 00 15 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | natd_hash: hash= e1 d7 c6 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | Notify data e1 d7 c6 52 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #73 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #73: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #73 to 4294967295 after switching state | Message ID: IKE #73 skipping update_recv as MD is fake | Message ID: sent #73 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.73:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | state #73 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9cc8f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #73 | libevent_malloc: new ptr-libevent@0x55564d9edf28 size 128 | #73 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.68818 | resume sending helper answer for #73 suppresed complete_v2_state_transition() and stole MD | #73 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990017af8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.706528; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #58 | libevent_malloc: new ptr-libevent@0x7f4990017af8 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #58 spent 0.493 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.710457; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #65 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x55564d9e2508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #65 spent 0.61 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.313 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.715691; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #12 | libevent_malloc: new ptr-libevent@0x55564d9e2508 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #12 spent 0.564 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.296 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.748794; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #43 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x55564d9cc818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #43 spent 0.274 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-74' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #74 at 0x55564d9ed2e8 | State DB: adding IKEv2 state #74 in UNDEFINED | pstats #74 ikev2.ike started | Message ID: init #74: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #74: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #74; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-74" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-74" IKE SA #74 "road-eastnet-nonat-74" "road-eastnet-nonat-74" #74: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-74 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-74": constructed local IKE proposals for road-eastnet-nonat-74 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 74 for state #74 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #74 | libevent_malloc: new ptr-libevent@0x55564d9cc818 size 128 | #74 spent 0.169 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-74" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 15 starting work-order 74 for state #74 | spent 0.271 milliseconds in whack | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 74 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 74 time elapsed 0.001103 seconds | (#74) spent 1.11 milliseconds in crypto helper computing work-order 74: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 74 for state #74 to event queue | scheduling resume sending helper answer for #74 | libevent_malloc: new ptr-libevent@0x7f4984017a98 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 74 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #74 | **emit ISAKMP Message: | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | ikev2 g^x 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | ikev2 g^x dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | ikev2 g^x 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ikev2 g^x ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | ikev2 g^x 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | ikev2 g^x 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | ikev2 g^x 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | ikev2 g^x 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | ikev2 g^x 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | ikev2 g^x 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | ikev2 g^x 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | ikev2 g^x 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | ikev2 g^x af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | ikev2 g^x c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | ikev2 g^x 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf 07 aa ae 2f | IKEv2 nonce e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 5f 74 71 f1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b2 1b 85 a3 09 0b 1d 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4a | natd_hash: port=500 | natd_hash: hash= a7 89 29 8e 70 88 96 c6 82 77 ae 47 32 e8 b9 cf | natd_hash: hash= a1 60 d1 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 89 29 8e 70 88 96 c6 82 77 ae 47 32 e8 b9 cf | Notify data a1 60 d1 22 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b2 1b 85 a3 09 0b 1d 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | natd_hash: hash= 79 5d f5 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | Notify data 79 5d f5 2c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #74 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #74: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #74 to 4294967295 after switching state | Message ID: IKE #74 skipping update_recv as MD is fake | Message ID: sent #74 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.74:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | state #74 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9cc818 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #74 | libevent_malloc: new ptr-libevent@0x55564d9ef638 size 128 | #74 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.761934 | resume sending helper answer for #74 suppresed complete_v2_state_transition() and stole MD | #74 spent 0.529 milliseconds in resume sending helper answer | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984017a98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.772158; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #66 | libevent_malloc: new ptr-libevent@0x7f4984017a98 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x55564d9e3c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #66 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.775411; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564d9e3c18 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #13 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.787699; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #59 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x7f49a40179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #59 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.807987; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002545 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #44 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x55564d9cdf98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #44 spent 0.0933 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-75' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #75 at 0x55564d9eea68 | State DB: adding IKEv2 state #75 in UNDEFINED | pstats #75 ikev2.ike started | Message ID: init #75: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #75: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #75; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-75" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-75" IKE SA #75 "road-eastnet-nonat-75" "road-eastnet-nonat-75" #75: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-75 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-75": constructed local IKE proposals for road-eastnet-nonat-75 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 75 for state #75 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #75 | libevent_malloc: new ptr-libevent@0x55564d9cdf98 size 128 | #75 spent 0.121 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-75" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.188 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 75 for state #75 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 75 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 75 time elapsed 0.000577 seconds | (#75) spent 0.581 milliseconds in crypto helper computing work-order 75: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 75 for state #75 to event queue | scheduling resume sending helper answer for #75 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 75 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #75 | **emit ISAKMP Message: | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | ikev2 g^x a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | ikev2 g^x b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | ikev2 g^x 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | ikev2 g^x 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | ikev2 g^x 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | ikev2 g^x f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | ikev2 g^x 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | ikev2 g^x 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | ikev2 g^x 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | ikev2 g^x e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | ikev2 g^x 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | ikev2 g^x e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | ikev2 g^x 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | ikev2 g^x a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | ikev2 g^x 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 18 98 72 13 93 ad 52 97 0b 53 ed 43 61 b8 ad 4c | IKEv2 nonce a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 7d b9 25 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 5b 3c 62 46 5a f4 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4b | natd_hash: port=500 | natd_hash: hash= 5c 04 08 1d 84 eb fc 49 29 3e a8 48 b7 97 d0 90 | natd_hash: hash= 5f f5 53 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 04 08 1d 84 eb fc 49 29 3e a8 48 b7 97 d0 90 | Notify data 5f f5 53 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 5b 3c 62 46 5a f4 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | natd_hash: hash= de a6 5d 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | Notify data de a6 5d 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #75 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #75: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #75 to 4294967295 after switching state | Message ID: IKE #75 skipping update_recv as MD is fake | Message ID: sent #75 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.75:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | state #75 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9cdf98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #75 | libevent_malloc: new ptr-libevent@0x55564d9ef558 size 128 | #75 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.820618 | resume sending helper answer for #75 suppresed complete_v2_state_transition() and stole MD | #75 spent 0.344 milliseconds in resume sending helper answer | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988017a98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.831813; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #67 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x55564d9e5328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #67 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0489 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.835073; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #14 | libevent_malloc: new ptr-libevent@0x55564d9e5328 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #14 spent 0.0957 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.848365; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #60 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #60 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.869864; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #45 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #45 spent 0.305 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.893538; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #68 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x55564d9e5248 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #68 spent 0.36 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.895358; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #15 | libevent_malloc: new ptr-libevent@0x55564d9e5248 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x55564d9b8418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #15 spent 0.49 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.237 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-76' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #76 at 0x55564d9f0178 | State DB: adding IKEv2 state #76 in UNDEFINED | pstats #76 ikev2.ike started | Message ID: init #76: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #76: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #76; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-76" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-76" IKE SA #76 "road-eastnet-nonat-76" "road-eastnet-nonat-76" #76: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-76 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-76": constructed local IKE proposals for road-eastnet-nonat-76 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 76 for state #76 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #76 | libevent_malloc: new ptr-libevent@0x55564d9b8418 size 128 | #76 spent 0.47 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-76" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 1 resuming | crypto helper 1 starting work-order 76 for state #76 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.761 milliseconds in whack | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 76 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 76 time elapsed 0.002911 seconds | (#76) spent 2.88 milliseconds in crypto helper computing work-order 76: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 76 for state #76 to event queue | scheduling resume sending helper answer for #76 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 76 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #76 | **emit ISAKMP Message: | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | ikev2 g^x db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | ikev2 g^x a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | ikev2 g^x 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | ikev2 g^x 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | ikev2 g^x d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | ikev2 g^x f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | ikev2 g^x 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | ikev2 g^x e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | ikev2 g^x d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | ikev2 g^x cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | ikev2 g^x 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | ikev2 g^x 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | ikev2 g^x 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | ikev2 g^x 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | ikev2 g^x 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 d3 d7 79 07 | IKEv2 nonce bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 b5 95 d3 57 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 90 ca 9f 26 b7 88 be fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4c | natd_hash: port=500 | natd_hash: hash= 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 88 3a 71 aa | natd_hash: hash= e3 e2 ff c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 88 3a 71 aa | Notify data e3 e2 ff c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 90 ca 9f 26 b7 88 be fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | natd_hash: hash= c9 5a d8 d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | Notify data c9 5a d8 d7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #76 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #76: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #76 to 4294967295 after switching state | Message ID: IKE #76 skipping update_recv as MD is fake | Message ID: sent #76 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.76:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | state #76 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9b8418 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #76 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 | #76 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.905339 | resume sending helper answer for #76 suppresed complete_v2_state_transition() and stole MD | #76 spent 1.87 milliseconds in resume sending helper answer | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c017a48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.238 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.907901; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002536 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #61 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #61 spent 0.458 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.23 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.932803; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x7f49bc014da8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #46 spent 0.216 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0905 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10580.952259; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f49bc014da8 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x55564d9e69c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #69 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10580.956603; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #16 | libevent_malloc: new ptr-libevent@0x55564d9e69c8 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x55564d9bb268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #16 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-77' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #77 at 0x55564d9f1988 | State DB: adding IKEv2 state #77 in UNDEFINED | pstats #77 ikev2.ike started | Message ID: init #77: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #77: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #77; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-77" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-77" IKE SA #77 "road-eastnet-nonat-77" "road-eastnet-nonat-77" #77: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-77 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-77": constructed local IKE proposals for road-eastnet-nonat-77 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 77 for state #77 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #77 | libevent_malloc: new ptr-libevent@0x55564d9bb268 size 128 | #77 spent 0.119 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | RESET processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-77" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 77 for state #77 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 77 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.208 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 77 time elapsed 0.001046 seconds | (#77) spent 1.05 milliseconds in crypto helper computing work-order 77: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 77 for state #77 to event queue | scheduling resume sending helper answer for #77 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 77 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #77 | **emit ISAKMP Message: | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | ikev2 g^x 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | ikev2 g^x 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ikev2 g^x ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | ikev2 g^x 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | ikev2 g^x 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | ikev2 g^x 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | ikev2 g^x 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | ikev2 g^x 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | ikev2 g^x 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | ikev2 g^x b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | ikev2 g^x 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | ikev2 g^x f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | ikev2 g^x 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | ikev2 g^x 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | ikev2 g^x b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d 90 ab 03 06 | IKEv2 nonce 97 96 59 e2 1a bb a2 81 38 0f 57 49 c2 69 c1 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 74 d7 42 6f f6 28 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4d | natd_hash: port=500 | natd_hash: hash= d1 35 de 0a f4 01 e7 da f8 58 ee e0 1e 74 0c 27 | natd_hash: hash= 5a 76 f8 ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d1 35 de 0a f4 01 e7 da f8 58 ee e0 1e 74 0c 27 | Notify data 5a 76 f8 ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 74 d7 42 6f f6 28 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | natd_hash: hash= 02 d9 25 e8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | Notify data 02 d9 25 e8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #77 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #77: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #77 to 4294967295 after switching state | Message ID: IKE #77 skipping update_recv as MD is fake | Message ID: sent #77 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.77:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | state #77 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9bb268 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #77 | libevent_malloc: new ptr-libevent@0x55564d9f2478 size 128 | #77 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10580.964456 | resume sending helper answer for #77 suppresed complete_v2_state_transition() and stole MD | #77 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10580.990649; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #47 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #47 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10580.996945; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #62 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #62 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.011237; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #70 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #70 spent 0.0946 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.020507; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x55564d9bb188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #17 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-78' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #78 at 0x55564d9f2fe8 | State DB: adding IKEv2 state #78 in UNDEFINED | pstats #78 ikev2.ike started | Message ID: init #78: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #78: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #78; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-78" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-78" IKE SA #78 "road-eastnet-nonat-78" "road-eastnet-nonat-78" #78: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-78 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-78": constructed local IKE proposals for road-eastnet-nonat-78 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 78 for state #78 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #78 | libevent_malloc: new ptr-libevent@0x55564d9bb188 size 128 | #78 spent 0.168 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 starting work-order 78 for state #78 | RESET processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 78 | RESET processing: connection "road-eastnet-nonat-78" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 78 time elapsed 0.001086 seconds | (#78) spent 1.08 milliseconds in crypto helper computing work-order 78: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 78 for state #78 to event queue | scheduling resume sending helper answer for #78 | libevent_malloc: new ptr-libevent@0x7f4974017af8 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 78 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #78 | **emit ISAKMP Message: | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | ikev2 g^x 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | ikev2 g^x f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | ikev2 g^x a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | ikev2 g^x c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | ikev2 g^x d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | ikev2 g^x 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | ikev2 g^x 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | ikev2 g^x db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | ikev2 g^x 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | ikev2 g^x c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | ikev2 g^x c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | ikev2 g^x f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ikev2 g^x ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | ikev2 g^x fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | ikev2 g^x fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 60 25 c9 82 fd 86 c1 87 19 16 9f 2a 01 d4 81 b4 | IKEv2 nonce 06 5b ab cf 20 bd 7f a5 8b ed 28 1f 8d b9 5c fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf a0 d7 be c2 44 33 ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4e | natd_hash: port=500 | natd_hash: hash= da ce 07 3d 1c f1 28 94 25 96 78 02 bd bc bc 39 | natd_hash: hash= b8 14 46 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da ce 07 3d 1c f1 28 94 25 96 78 02 bd bc bc 39 | Notify data b8 14 46 84 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf a0 d7 be c2 44 33 ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | natd_hash: hash= 67 a0 c0 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | Notify data 67 a0 c0 d3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #78 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #78: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #78 to 4294967295 after switching state | Message ID: IKE #78 skipping update_recv as MD is fake | Message ID: sent #78 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.78:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | state #78 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9bb188 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #78 | libevent_malloc: new ptr-libevent@0x55564d9f3b48 size 128 | #78 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.025499 | resume sending helper answer for #78 suppresed complete_v2_state_transition() and stole MD | #78 spent 0.446 milliseconds in resume sending helper answer | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974017af8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.051705; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #48 | libevent_malloc: new ptr-libevent@0x7f4974017af8 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #48 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.070988; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #71 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x55564d9eb028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #71 spent 0.098 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-79' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #79 at 0x55564d9f47f8 | State DB: adding IKEv2 state #79 in UNDEFINED | pstats #79 ikev2.ike started | Message ID: init #79: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #79: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #79; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-79" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-79" IKE SA #79 "road-eastnet-nonat-79" "road-eastnet-nonat-79" #79: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-79 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-79": constructed local IKE proposals for road-eastnet-nonat-79 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 79 for state #79 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d3c58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564d9eb028 size 128 | #79 spent 0.12 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | RESET processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-79" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 18 starting work-order 79 for state #79 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 79 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.444 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 79 time elapsed 0.000597 seconds | (#79) spent 0.599 milliseconds in crypto helper computing work-order 79: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 79 for state #79 to event queue | scheduling resume sending helper answer for #79 | libevent_malloc: new ptr-libevent@0x7f4978017f28 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 79 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #79 | **emit ISAKMP Message: | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | ikev2 g^x 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | ikev2 g^x 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | ikev2 g^x fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | ikev2 g^x e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ikev2 g^x ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | ikev2 g^x 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | ikev2 g^x c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | ikev2 g^x dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | ikev2 g^x b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | ikev2 g^x 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | ikev2 g^x 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | ikev2 g^x 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | ikev2 g^x d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | ikev2 g^x af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | ikev2 g^x 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 17 26 76 a4 00 97 bb 1f cd 1c 61 6b 51 c5 ee 61 | IKEv2 nonce 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e 57 95 b6 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ae cb 7b fa aa 8b 17 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4f | natd_hash: port=500 | natd_hash: hash= 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c 12 eb 98 ce | natd_hash: hash= e2 2f b3 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c 12 eb 98 ce | Notify data e2 2f b3 0b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ae cb 7b fa aa 8b 17 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | natd_hash: hash= e1 2a 4c d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | Notify data e1 2a 4c d7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #79 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #79: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #79 to 4294967295 after switching state | Message ID: IKE #79 skipping update_recv as MD is fake | Message ID: sent #79 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.79:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | state #79 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9eb028 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d3c58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564d9f3bf8 size 128 | #79 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.083745 | resume sending helper answer for #79 suppresed complete_v2_state_transition() and stole MD | #79 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978017f28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.084944; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999922 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #63 | libevent_malloc: new ptr-libevent@0x7f4978017f28 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x7f4998017bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #63 spent 0.094 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.094279; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #18 | libevent_malloc: new ptr-libevent@0x7f4998017bc8 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #18 spent 0.0804 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.111521; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003338 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #49 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #49 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.129893; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x55564d9ec7a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #72 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-80' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #80 at 0x55564d9f5e58 | State DB: adding IKEv2 state #80 in UNDEFINED | pstats #80 ikev2.ike started | Message ID: init #80: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #80: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #80; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-80" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-80" IKE SA #80 "road-eastnet-nonat-80" "road-eastnet-nonat-80" #80: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-80 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-80": constructed local IKE proposals for road-eastnet-nonat-80 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 80 for state #80 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6b58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #80 | libevent_malloc: new ptr-libevent@0x55564d9ec7a8 size 128 | crypto helper 19 resuming | crypto helper 19 starting work-order 80 for state #80 | #80 spent 0.183 milliseconds in ikev2_parent_outI1() | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 80 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-80" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.308 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 80 time elapsed 0.000866 seconds | (#80) spent 0.866 milliseconds in crypto helper computing work-order 80: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 80 for state #80 to event queue | scheduling resume sending helper answer for #80 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 80 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #80 | **emit ISAKMP Message: | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | ikev2 g^x c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | ikev2 g^x 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | ikev2 g^x 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | ikev2 g^x eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | ikev2 g^x 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | ikev2 g^x 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | ikev2 g^x 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | ikev2 g^x 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | ikev2 g^x e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ikev2 g^x ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | ikev2 g^x 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | ikev2 g^x 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | ikev2 g^x 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | ikev2 g^x 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | ikev2 g^x c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 68 64 cc 03 74 db 65 21 e3 4b b8 7a 6f 5c 7e 2b | IKEv2 nonce 05 07 6a 3a 8f f8 c0 26 9a f9 61 af c4 13 5a 66 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd 2f 60 88 b2 6e 8e 79 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 50 | natd_hash: port=500 | natd_hash: hash= d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 bf 5d 92 f7 | natd_hash: hash= 0b 07 fb ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 bf 5d 92 f7 | Notify data 0b 07 fb ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd 2f 60 88 b2 6e 8e 79 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | natd_hash: hash= 55 02 fd 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | Notify data 55 02 fd 87 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #80 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #80: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #80 to 4294967295 after switching state | Message ID: IKE #80 skipping update_recv as MD is fake | Message ID: sent #80 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.80:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | state #80 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ec7a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6b58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #80 | libevent_malloc: new ptr-libevent@0x55564d9f6948 size 128 | #80 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.147021 | resume sending helper answer for #80 suppresed complete_v2_state_transition() and stole MD | #80 spent 0.497 milliseconds in resume sending helper answer | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c017ba8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.151259; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #64 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #64 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0713 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.158679; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004017 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #19 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #19 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0833 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.171195; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #50 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #50 spent 0.259 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.189862; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501682 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #73 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x55564d9edf28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #73 spent 0.41 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.211753; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #65 | libevent_malloc: new ptr-libevent@0x55564d9edf28 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #65 spent 0.449 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.228688; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #20 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #20 spent 0.352 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.231391; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #51 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x7f498400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #51 spent 0.427 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.185 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-81' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #81 at 0x55564d9f74b8 | State DB: adding IKEv2 state #81 in UNDEFINED | pstats #81 ikev2.ike started | Message ID: init #81: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #81: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #81; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-81" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-81" IKE SA #81 "road-eastnet-nonat-81" "road-eastnet-nonat-81" #81: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-81 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-81": constructed local IKE proposals for road-eastnet-nonat-81 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 81 for state #81 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b3e78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #81 | libevent_malloc: new ptr-libevent@0x7f498400cd68 size 128 | #81 spent 0.236 milliseconds in ikev2_parent_outI1() | crypto helper 0 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 starting work-order 81 for state #81 | RESET processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 81 | RESET processing: connection "road-eastnet-nonat-81" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.399 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 81 time elapsed 0.001445 seconds | (#81) spent 1.46 milliseconds in crypto helper computing work-order 81: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 81 for state #81 to event queue | scheduling resume sending helper answer for #81 | libevent_malloc: new ptr-libevent@0x7f49bc01a5b8 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 81 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #81 | **emit ISAKMP Message: | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | ikev2 g^x b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | ikev2 g^x 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | ikev2 g^x d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | ikev2 g^x 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | ikev2 g^x e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | ikev2 g^x 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | ikev2 g^x dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | ikev2 g^x f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | ikev2 g^x 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | ikev2 g^x 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | ikev2 g^x c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ikev2 g^x ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | ikev2 g^x bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | ikev2 g^x 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | ikev2 g^x c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 27 62 de b1 e4 9a ea b8 f4 ab 7e 97 55 a6 fb | IKEv2 nonce ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 8e db a4 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 64 34 fd 30 b8 77 ef f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 51 | natd_hash: port=500 | natd_hash: hash= aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 6a b2 92 36 | natd_hash: hash= f4 66 bb f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 6a b2 92 36 | Notify data f4 66 bb f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 64 34 fd 30 b8 77 ef f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | natd_hash: hash= 76 f5 f8 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | Notify data 76 f5 f8 61 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #81 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #81: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #81 to 4294967295 after switching state | Message ID: IKE #81 skipping update_recv as MD is fake | Message ID: sent #81 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.81:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | state #81 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498400cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b3e78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #81 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 | #81 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.236667 | resume sending helper answer for #81 suppresed complete_v2_state_transition() and stole MD | #81 spent 0.766 milliseconds in resume sending helper answer | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc01a5b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.26299; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #74 | libevent_malloc: new ptr-libevent@0x7f49bc01a5b8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x55564d9ef638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #74 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.273332; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #66 | libevent_malloc: new ptr-libevent@0x55564d9ef638 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x7f4984017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #66 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0532 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.291636; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f4984017a98 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x7f498800cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #52 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-82' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #82 at 0x55564d9f8cc8 | State DB: adding IKEv2 state #82 in UNDEFINED | pstats #82 ikev2.ike started | Message ID: init #82: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #82: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #82; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-82" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-82" IKE SA #82 "road-eastnet-nonat-82" "road-eastnet-nonat-82" #82: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-82 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-82": constructed local IKE proposals for road-eastnet-nonat-82 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 82 for state #82 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b55f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #82 | libevent_malloc: new ptr-libevent@0x7f498800cd68 size 128 | #82 spent 0.127 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | RESET processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 82 for state #82 | RESET processing: connection "road-eastnet-nonat-82" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 82 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.219 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 82 time elapsed 0.001067 seconds | (#82) spent 1.07 milliseconds in crypto helper computing work-order 82: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 82 for state #82 to event queue | scheduling resume sending helper answer for #82 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 82 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #82 | **emit ISAKMP Message: | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | ikev2 g^x be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | ikev2 g^x 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | ikev2 g^x be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | ikev2 g^x d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | ikev2 g^x 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | ikev2 g^x c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | ikev2 g^x 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | ikev2 g^x 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | ikev2 g^x b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | ikev2 g^x 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | ikev2 g^x 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | ikev2 g^x 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ikev2 g^x ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | ikev2 g^x b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | ikev2 g^x 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 0b 30 00 50 ca 2d 8b 08 84 cf ee 17 e4 a3 18 | IKEv2 nonce c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a 50 60 5e 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a6 8d 55 05 59 06 64 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 52 | natd_hash: port=500 | natd_hash: hash= cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 0a c0 20 a8 | natd_hash: hash= 8d 42 af 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 0a c0 20 a8 | Notify data 8d 42 af 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a6 8d 55 05 59 06 64 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | natd_hash: hash= af 2b b8 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | Notify data af 2b b8 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #82 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #82: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #82 to 4294967295 after switching state | Message ID: IKE #82 skipping update_recv as MD is fake | Message ID: sent #82 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.82:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | state #82 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498800cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b55f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564d9faef8 size 128 | #82 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.29684 | resume sending helper answer for #82 suppresed complete_v2_state_transition() and stole MD | #82 spent 0.392 milliseconds in resume sending helper answer | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b401a408 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0253 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.320022; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #21 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.321322; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500704 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #75 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x55564d9ef558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #75 spent 0.0814 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.332658; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #67 | libevent_malloc: new ptr-libevent@0x55564d9ef558 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #67 spent 0.0807 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.352907; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x55564d9db168 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #53 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-83' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #83 at 0x55564d9fa328 | State DB: adding IKEv2 state #83 in UNDEFINED | pstats #83 ikev2.ike started | Message ID: init #83: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #83: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #83; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-83" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-83" IKE SA #83 "road-eastnet-nonat-83" "road-eastnet-nonat-83" #83: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-83 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-83": constructed local IKE proposals for road-eastnet-nonat-83 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 83 for state #83 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #83 | libevent_malloc: new ptr-libevent@0x55564d9db168 size 128 | #83 spent 0.146 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 83 for state #83 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 83 | RESET processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-83" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 83 time elapsed 0.000775 seconds | (#83) spent 0.782 milliseconds in crypto helper computing work-order 83: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 83 for state #83 to event queue | scheduling resume sending helper answer for #83 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 83 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #83 | **emit ISAKMP Message: | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | ikev2 g^x 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | ikev2 g^x 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | ikev2 g^x 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | ikev2 g^x b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | ikev2 g^x 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ikev2 g^x ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | ikev2 g^x e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | ikev2 g^x 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | ikev2 g^x 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | ikev2 g^x 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | ikev2 g^x 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | ikev2 g^x 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | ikev2 g^x 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | ikev2 g^x e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | ikev2 g^x 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 3f 13 29 05 | IKEv2 nonce 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c 9d 55 31 dc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 44 ad d7 dd 5a 47 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 53 | natd_hash: port=500 | natd_hash: hash= a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 3f 34 3f 6f | natd_hash: hash= 59 78 77 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 3f 34 3f 6f | Notify data 59 78 77 d3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 44 ad d7 dd 5a 47 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | natd_hash: hash= ba 6c 7f 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | Notify data ba 6c 7f 1d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #83 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #83: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #83 to 4294967295 after switching state | Message ID: IKE #83 skipping update_recv as MD is fake | Message ID: sent #83 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.83:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | state #83 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9db168 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #83 | libevent_malloc: new ptr-libevent@0x55564d9fc678 size 128 | #83 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.358511 | resume sending helper answer for #83 suppresed complete_v2_state_transition() and stole MD | #83 spent 0.508 milliseconds in resume sending helper answer | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b801a578 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.084 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.378858; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x7f49b0012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #22 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.394308; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #68 | libevent_malloc: new ptr-libevent@0x7f49b0012288 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #68 spent 0.254 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.404129; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #76 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #76 spent 0.306 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.438959; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #23 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #23 spent 0.431 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.441886; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #54 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x55564d9c6cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #54 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-84' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #84 at 0x55564d9fba38 | State DB: adding IKEv2 state #84 in UNDEFINED | pstats #84 ikev2.ike started | Message ID: init #84: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #84: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #84; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-84" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-84" IKE SA #84 "road-eastnet-nonat-84" "road-eastnet-nonat-84" #84: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-84 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-84": constructed local IKE proposals for road-eastnet-nonat-84 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 84 for state #84 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #84 | libevent_malloc: new ptr-libevent@0x55564d9c6cf8 size 128 | #84 spent 0.436 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | crypto helper 5 starting work-order 84 for state #84 | RESET processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 84 | RESET processing: connection "road-eastnet-nonat-84" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.702 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 84 time elapsed 0.002739 seconds | (#84) spent 2.73 milliseconds in crypto helper computing work-order 84: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 84 for state #84 to event queue | scheduling resume sending helper answer for #84 | libevent_malloc: new ptr-libevent@0x7f49ac01d2b8 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 84 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #84 | **emit ISAKMP Message: | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | ikev2 g^x 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | ikev2 g^x 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | ikev2 g^x 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | ikev2 g^x a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | ikev2 g^x bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | ikev2 g^x 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | ikev2 g^x 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | ikev2 g^x 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | ikev2 g^x 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | ikev2 g^x c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | ikev2 g^x c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | ikev2 g^x 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | ikev2 g^x 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | ikev2 g^x 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | ikev2 g^x b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb 39 5b 2f 96 | IKEv2 nonce 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 6a 79 97 74 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a af 15 16 83 9b 55 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 54 | natd_hash: port=500 | natd_hash: hash= 50 64 b0 bd fd 06 2d ff 86 8a 40 1f 7b b0 16 43 | natd_hash: hash= 29 ee 00 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 64 b0 bd fd 06 2d ff 86 8a 40 1f 7b b0 16 43 | Notify data 29 ee 00 b2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a af 15 16 83 9b 55 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | natd_hash: hash= aa f1 a9 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | Notify data aa f1 a9 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #84 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #84: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #84 to 4294967295 after switching state | Message ID: IKE #84 skipping update_recv as MD is fake | Message ID: sent #84 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.84:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | state #84 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9c6cf8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #84 | libevent_malloc: new ptr-libevent@0x55564d9fdd88 size 128 | #84 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.448743 | resume sending helper answer for #84 suppresed complete_v2_state_transition() and stole MD | #84 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac01d2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.453336; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001281 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f49ac01d2b8 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x7f49bc014da8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #69 spent 0.39 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.229 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.46622; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #77 | libevent_malloc: new ptr-libevent@0x7f49bc014da8 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x55564d9f2478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #77 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.229 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.497168; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #24 | libevent_malloc: new ptr-libevent@0x55564d9f2478 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #24 spent 0.424 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.222 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.504066; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #55 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #55 spent 0.402 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.512942; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #70 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #70 spent 0.397 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.526721; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #78 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x55564d9f3b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #78 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0995 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-85' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #85 at 0x55564d9fd1b8 | State DB: adding IKEv2 state #85 in UNDEFINED | pstats #85 ikev2.ike started | Message ID: init #85: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #85: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #85; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-85" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-85" IKE SA #85 "road-eastnet-nonat-85" "road-eastnet-nonat-85" #85: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-85 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-85": constructed local IKE proposals for road-eastnet-nonat-85 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 85 for state #85 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #85 | libevent_malloc: new ptr-libevent@0x55564d9f3b48 size 128 | #85 spent 0.234 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-85" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | crypto helper 6 starting work-order 85 for state #85 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 85 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.403 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 85 time elapsed 0.001518 seconds | (#85) spent 1.51 milliseconds in crypto helper computing work-order 85: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 85 for state #85 to event queue | scheduling resume sending helper answer for #85 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 85 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #85 | **emit ISAKMP Message: | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | ikev2 g^x 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | ikev2 g^x 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | ikev2 g^x 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ikev2 g^x ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | ikev2 g^x a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | ikev2 g^x 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | ikev2 g^x 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | ikev2 g^x 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | ikev2 g^x 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | ikev2 g^x 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | ikev2 g^x f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | ikev2 g^x af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | ikev2 g^x 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | ikev2 g^x 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | ikev2 g^x 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b 4b 40 d4 8d | IKEv2 nonce f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 90 26 85 80 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= af 13 2f dc 68 f3 d9 3d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 55 | natd_hash: port=500 | natd_hash: hash= 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 eb 3a ae 3c | natd_hash: hash= f6 70 9e 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 eb 3a ae 3c | Notify data f6 70 9e 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= af 13 2f dc 68 f3 d9 3d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | natd_hash: hash= ba 63 68 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | Notify data ba 63 68 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #85 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #85: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #85 to 4294967295 after switching state | Message ID: IKE #85 skipping update_recv as MD is fake | Message ID: sent #85 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.85:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | state #85 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9f3b48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #85 | libevent_malloc: new ptr-libevent@0x55564d9ff498 size 128 | #85 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.529792 | resume sending helper answer for #85 suppresed complete_v2_state_transition() and stole MD | #85 spent 0.623 milliseconds in resume sending helper answer | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b001d368 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0797 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.554041; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #25 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #25 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.561295; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #56 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #56 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.572585; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #71 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #71 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.584855; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x55564d9f3bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #79 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-86' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #86 at 0x55564d9fe8c8 | State DB: adding IKEv2 state #86 in UNDEFINED | pstats #86 ikev2.ike started | Message ID: init #86: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #86: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #86; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-86" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-86" IKE SA #86 "road-eastnet-nonat-86" "road-eastnet-nonat-86" #86: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-86 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-86": constructed local IKE proposals for road-eastnet-nonat-86 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 86 for state #86 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d3c58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #86 | libevent_malloc: new ptr-libevent@0x55564d9f3bf8 size 128 | #86 spent 0.116 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-86" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 7 resuming | crypto helper 7 starting work-order 86 for state #86 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 86 | spent 0.202 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 86 time elapsed 0.000621 seconds | (#86) spent 0.625 milliseconds in crypto helper computing work-order 86: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 86 for state #86 to event queue | scheduling resume sending helper answer for #86 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 86 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #86 | **emit ISAKMP Message: | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | ikev2 g^x b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | ikev2 g^x 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | ikev2 g^x 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | ikev2 g^x da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | ikev2 g^x 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | ikev2 g^x 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | ikev2 g^x 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | ikev2 g^x 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | ikev2 g^x 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | ikev2 g^x 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | ikev2 g^x 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | ikev2 g^x c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | ikev2 g^x af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | ikev2 g^x c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | ikev2 g^x c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0b d1 2a ea 84 81 de 39 fe a6 c2 08 d7 e4 43 c2 | IKEv2 nonce e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 09 a4 a3 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8c b2 ee 4b 2c a6 80 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 56 | natd_hash: port=500 | natd_hash: hash= 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 45 ca ae d0 | natd_hash: hash= 98 b3 b1 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 45 ca ae d0 | Notify data 98 b3 b1 3b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8c b2 ee 4b 2c a6 80 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | natd_hash: hash= c7 78 41 ad | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | Notify data c7 78 41 ad | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #86 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #86: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #86 to 4294967295 after switching state | Message ID: IKE #86 skipping update_recv as MD is fake | Message ID: sent #86 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.86:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | state #86 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9f3bf8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d3c58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #86 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 | #86 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.590448 | resume sending helper answer for #86 suppresed complete_v2_state_transition() and stole MD | #86 spent 0.346 milliseconds in resume sending helper answer | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a401d1f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.621642; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #57 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #57 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.627933; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002416 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #26 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #26 spent 0.0842 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.631182; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #72 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #72 spent 0.0824 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.647429; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #80 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x55564d9f6948 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #80 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-87' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #87 at 0x55564d9fffd8 | State DB: adding IKEv2 state #87 in UNDEFINED | pstats #87 ikev2.ike started | Message ID: init #87: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #87: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #87; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-87" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-87" IKE SA #87 "road-eastnet-nonat-87" "road-eastnet-nonat-87" #87: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-87 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-87": constructed local IKE proposals for road-eastnet-nonat-87 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 87 for state #87 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6b58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #87 | libevent_malloc: new ptr-libevent@0x55564d9f6948 size 128 | #87 spent 0.114 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | RESET processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-87" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 8 starting work-order 87 for state #87 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 87 | spent 0.184 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 87 time elapsed 0.000763 seconds | (#87) spent 0.768 milliseconds in crypto helper computing work-order 87: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 87 for state #87 to event queue | scheduling resume sending helper answer for #87 | libevent_malloc: new ptr-libevent@0x7f49a801d388 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 87 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #87 | **emit ISAKMP Message: | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | ikev2 g^x bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | ikev2 g^x 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | ikev2 g^x 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | ikev2 g^x c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | ikev2 g^x 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | ikev2 g^x 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | ikev2 g^x f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | ikev2 g^x 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | ikev2 g^x 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | ikev2 g^x c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | ikev2 g^x 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | ikev2 g^x d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | ikev2 g^x 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | ikev2 g^x 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | ikev2 g^x cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 99 f5 7a 3d db 73 03 2d c7 50 e7 9c 88 18 99 | IKEv2 nonce ce 68 26 97 1b f1 7e 53 eb 6c 45 79 95 eb c7 3b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f4 23 d8 63 5c 4f ff a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 57 | natd_hash: port=500 | natd_hash: hash= 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e 12 02 9d 64 | natd_hash: hash= ec d3 a6 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e 12 02 9d 64 | Notify data ec d3 a6 57 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f4 23 d8 63 5c 4f ff a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | natd_hash: hash= 90 e7 61 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | Notify data 90 e7 61 b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #87 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #87: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #87 to 4294967295 after switching state | Message ID: IKE #87 skipping update_recv as MD is fake | Message ID: sent #87 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.87:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | state #87 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9f6948 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6b58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #87 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 | #87 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.649179 | resume sending helper answer for #87 suppresed complete_v2_state_transition() and stole MD | #87 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a801d388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.688395; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #27 | libevent_malloc: new ptr-libevent@0x7f49a801d388 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #27 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0789 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.690867; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #73 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #73 spent 0.266 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.707455; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x7f4990017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #58 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0981 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-88' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #88 at 0x55564da016e8 | State DB: adding IKEv2 state #88 in UNDEFINED | pstats #88 ikev2.ike started | Message ID: init #88: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #88: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #88; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-88" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-88" IKE SA #88 "road-eastnet-nonat-88" "road-eastnet-nonat-88" #88: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-88 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-88": constructed local IKE proposals for road-eastnet-nonat-88 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 88 for state #88 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #88 | libevent_malloc: new ptr-libevent@0x7f4990017af8 size 128 | #88 spent 0.222 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 starting work-order 88 for state #88 | RESET processing: connection "road-eastnet-nonat-88" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 88 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.382 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 88 time elapsed 0.001193 seconds | (#88) spent 1.2 milliseconds in crypto helper computing work-order 88: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 88 for state #88 to event queue | scheduling resume sending helper answer for #88 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 88 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #88 | **emit ISAKMP Message: | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | ikev2 g^x 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | ikev2 g^x 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | ikev2 g^x 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | ikev2 g^x 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | ikev2 g^x 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | ikev2 g^x 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | ikev2 g^x c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | ikev2 g^x e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | ikev2 g^x 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | ikev2 g^x 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | ikev2 g^x 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | ikev2 g^x a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | ikev2 g^x 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | ikev2 g^x 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ikev2 g^x ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 68 5b cc 69 fb d0 13 3b e8 08 a4 7f 64 dd 90 05 | IKEv2 nonce 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae ad 0f 65 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= df a9 ce c3 5d 1d d4 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 58 | natd_hash: port=500 | natd_hash: hash= 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 ff 32 29 9e | natd_hash: hash= 1f 22 19 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 ff 32 29 9e | Notify data 1f 22 19 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= df a9 ce c3 5d 1d d4 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | natd_hash: hash= 09 2b b0 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | Notify data 09 2b b0 20 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #88 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #88: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #88 to 4294967295 after switching state | Message ID: IKE #88 skipping update_recv as MD is fake | Message ID: sent #88 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.88:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | state #88 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4990017af8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #88 | libevent_malloc: new ptr-libevent@0x55564da021d8 size 128 | #88 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.716891 | resume sending helper answer for #88 suppresed complete_v2_state_transition() and stole MD | #88 spent 0.672 milliseconds in resume sending helper answer | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c01d1f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.091 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.737303; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500636 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #81 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #81 spent 0.422 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.750262; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #28 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x7f49980123b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #28 spent 0.454 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.765214; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #74 | libevent_malloc: new ptr-libevent@0x7f49980123b8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x7f49bc01a5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #74 spent 0.592 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.285 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.788425; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #59 | libevent_malloc: new ptr-libevent@0x7f49bc01a5b8 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #59 spent 0.427 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.797333; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x55564d9faef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #82 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-89' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #89 at 0x55564da02df8 | State DB: adding IKEv2 state #89 in UNDEFINED | pstats #89 ikev2.ike started | Message ID: init #89: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #89: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #89; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-89" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-89" IKE SA #89 "road-eastnet-nonat-89" "road-eastnet-nonat-89" #89: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-89 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-89": constructed local IKE proposals for road-eastnet-nonat-89 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 89 for state #89 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b55f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #89 | libevent_malloc: new ptr-libevent@0x55564d9faef8 size 128 | #89 spent 0.426 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 starting work-order 89 for state #89 | RESET processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-89" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 89 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.724 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 89 time elapsed 0.00292 seconds | (#89) spent 2.88 milliseconds in crypto helper computing work-order 89: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 89 for state #89 to event queue | scheduling resume sending helper answer for #89 | libevent_malloc: new ptr-libevent@0x7f49a001d1f8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 89 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #89 | **emit ISAKMP Message: | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | ikev2 g^x 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | ikev2 g^x 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | ikev2 g^x f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | ikev2 g^x 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | ikev2 g^x d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | ikev2 g^x 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | ikev2 g^x 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | ikev2 g^x eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | ikev2 g^x 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | ikev2 g^x dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | ikev2 g^x fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | ikev2 g^x af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | ikev2 g^x c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | ikev2 g^x 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ikev2 g^x ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 b5 6e 88 9a | IKEv2 nonce 36 71 5e 28 57 07 2c 17 63 fe 00 64 85 64 e4 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5a 4f cc 5e f9 a5 eb 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 59 | natd_hash: port=500 | natd_hash: hash= f0 8e 06 eb 62 29 ac 94 0f 78 de 59 a0 ee c3 20 | natd_hash: hash= ce c8 f2 d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 8e 06 eb 62 29 ac 94 0f 78 de 59 a0 ee c3 20 | Notify data ce c8 f2 d4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5a 4f cc 5e f9 a5 eb 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | natd_hash: hash= 60 22 bd 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | Notify data 60 22 bd 55 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #89 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #89: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #89 to 4294967295 after switching state | Message ID: IKE #89 skipping update_recv as MD is fake | Message ID: sent #89 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.89:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | state #89 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9faef8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b55f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #89 | libevent_malloc: new ptr-libevent@0x55564da05098 size 128 | #89 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.807491 | resume sending helper answer for #89 suppresed complete_v2_state_transition() and stole MD | #89 spent 1.55 milliseconds in resume sending helper answer | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a001d1f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.823023; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #75 | libevent_malloc: new ptr-libevent@0x7f49a001d1f8 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #75 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.82489; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #29 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x7f498c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #29 spent 0.405 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.193 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.849737; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #60 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #60 spent 0.432 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.204 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.859643; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501132 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #83 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x55564d9fc678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #83 spent 0.417 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-90' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #90 at 0x55564da04458 | State DB: adding IKEv2 state #90 in UNDEFINED | pstats #90 ikev2.ike started | Message ID: init #90: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #90: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #90; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-90" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-90" IKE SA #90 "road-eastnet-nonat-90" "road-eastnet-nonat-90" #90: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-90 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-90": constructed local IKE proposals for road-eastnet-nonat-90 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 90 for state #90 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564d9fc678 size 128 | #90 spent 0.285 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | crypto helper 11 starting work-order 90 for state #90 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 90 | RESET processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-90" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.503 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 90 time elapsed 0.001393 seconds | (#90) spent 1.39 milliseconds in crypto helper computing work-order 90: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 90 for state #90 to event queue | scheduling resume sending helper answer for #90 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 90 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #90 | **emit ISAKMP Message: | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | ikev2 g^x fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | ikev2 g^x 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | ikev2 g^x 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | ikev2 g^x 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | ikev2 g^x 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | ikev2 g^x 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | ikev2 g^x 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | ikev2 g^x 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | ikev2 g^x 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | ikev2 g^x 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | ikev2 g^x 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | ikev2 g^x 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | ikev2 g^x d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | ikev2 g^x 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | ikev2 g^x e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 29 78 89 e6 | IKEv2 nonce 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f 86 88 b2 3d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cc 8b a2 03 f7 e1 87 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5a | natd_hash: port=500 | natd_hash: hash= 42 ce c4 98 23 d2 ea a4 59 9e 32 5c 8d 58 d2 c7 | natd_hash: hash= 65 d6 46 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 ce c4 98 23 d2 ea a4 59 9e 32 5c 8d 58 d2 c7 | Notify data 65 d6 46 56 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cc 8b a2 03 f7 e1 87 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | natd_hash: hash= 5c 0e 37 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | Notify data 5c 0e 37 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #90 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #90: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #90 to 4294967295 after switching state | Message ID: IKE #90 skipping update_recv as MD is fake | Message ID: sent #90 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.90:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | state #90 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9fc678 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564da067a8 size 128 | #90 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.886814 | resume sending helper answer for #90 suppresed complete_v2_state_transition() and stole MD | #90 spent 1.13 milliseconds in resume sending helper answer | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499401d368 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.154 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.903309; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #30 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x7f4990012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #30 spent 0.639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.284 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.906531; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #76 | libevent_malloc: new ptr-libevent@0x7f4990012288 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #76 spent 0.422 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.909411; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #61 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #61 spent 0.496 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.281 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10581.948501; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #84 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x55564d9fdd88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #84 spent 0.439 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-91' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #91 at 0x55564da05bd8 | State DB: adding IKEv2 state #91 in UNDEFINED | pstats #91 ikev2.ike started | Message ID: init #91: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #91: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #91; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-91" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-91" IKE SA #91 "road-eastnet-nonat-91" "road-eastnet-nonat-91" #91: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-91 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-91": constructed local IKE proposals for road-eastnet-nonat-91 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 91 for state #91 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #91 | libevent_malloc: new ptr-libevent@0x55564d9fdd88 size 128 | #91 spent 0.369 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 91 for state #91 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 91 | RESET processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-91" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.635 milliseconds in whack | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10581.968169; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #77 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x7f49bc014da8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #77 spent 0.405 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 91 time elapsed 0.00204 seconds | (#91) spent 2.03 milliseconds in crypto helper computing work-order 91: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 91 for state #91 to event queue | scheduling resume sending helper answer for #91 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 91 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #91 | **emit ISAKMP Message: | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | ikev2 g^x 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | ikev2 g^x 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ikev2 g^x ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | ikev2 g^x 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | ikev2 g^x bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | ikev2 g^x 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | ikev2 g^x e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | ikev2 g^x 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | ikev2 g^x b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | ikev2 g^x 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | ikev2 g^x 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | ikev2 g^x 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | ikev2 g^x 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | ikev2 g^x 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | ikev2 g^x 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e 27 cd 67 20 | IKEv2 nonce ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf 7c 2c f1 ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 83 55 07 64 21 cd 61 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5b | natd_hash: port=500 | natd_hash: hash= ed 55 ef 46 92 32 47 f6 f8 30 5a db 76 93 b6 47 | natd_hash: hash= ef 3d 05 d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed 55 ef 46 92 32 47 f6 f8 30 5a db 76 93 b6 47 | Notify data ef 3d 05 d8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 83 55 07 64 21 cd 61 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | natd_hash: hash= fd 4a 08 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | Notify data fd 4a 08 fd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #91 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #91: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #91 to 4294967295 after switching state | Message ID: IKE #91 skipping update_recv as MD is fake | Message ID: sent #91 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.91:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | state #91 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9fdd88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #91 | libevent_malloc: new ptr-libevent@0x55564da07eb8 size 128 | #91 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10581.970256 | resume sending helper answer for #91 suppresed complete_v2_state_transition() and stole MD | #91 spent 1.15 milliseconds in resume sending helper answer | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499801d3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.131 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10581.976655; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #31 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x55564d9d2548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #31 spent 0.405 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10581.998497; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001284 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #62 | libevent_malloc: new ptr-libevent@0x55564d9d2548 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #62 spent 0.458 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.24 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.027432; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #78 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #78 spent 0.303 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.155 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.030122; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #85 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x55564d9ff498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #85 spent 0.277 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.047802; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564d9ff498 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x55564d9d3cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #32 spent 0.307 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.143 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-92' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #92 at 0x55564da072e8 | State DB: adding IKEv2 state #92 in UNDEFINED | pstats #92 ikev2.ike started | Message ID: init #92: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #92: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #92; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-92" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-92" IKE SA #92 "road-eastnet-nonat-92" "road-eastnet-nonat-92" #92: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-92 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-92": constructed local IKE proposals for road-eastnet-nonat-92 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 92 for state #92 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #92 | libevent_malloc: new ptr-libevent@0x55564d9d3cc8 size 128 | #92 spent 0.308 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-92" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 13 resuming | crypto helper 13 starting work-order 92 for state #92 | spent 0.479 milliseconds in whack | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 92 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 92 time elapsed 0.002096 seconds | (#92) spent 2.11 milliseconds in crypto helper computing work-order 92: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 92 for state #92 to event queue | scheduling resume sending helper answer for #92 | libevent_malloc: new ptr-libevent@0x7f498c01d2b8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 92 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #92 | **emit ISAKMP Message: | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ikev2 g^x ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | ikev2 g^x 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | ikev2 g^x 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | ikev2 g^x 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | ikev2 g^x 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | ikev2 g^x 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | ikev2 g^x 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | ikev2 g^x f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | ikev2 g^x 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | ikev2 g^x c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | ikev2 g^x 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | ikev2 g^x 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | ikev2 g^x 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | ikev2 g^x 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | ikev2 g^x 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff 5c 18 54 1c 0b aa cc 4d 42 86 40 27 20 cb 18 | IKEv2 nonce 2d 75 28 47 45 dd 37 69 5e a7 2b 6f 80 46 ef 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 4e 1d cc f8 5e a6 ba | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5c | natd_hash: port=500 | natd_hash: hash= f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 24 45 aa 09 | natd_hash: hash= d6 4f 8a f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 24 45 aa 09 | Notify data d6 4f 8a f9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 4e 1d cc f8 5e a6 ba | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | natd_hash: hash= bf d7 f9 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | Notify data bf d7 f9 12 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #92 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #92: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #92 to 4294967295 after switching state | Message ID: IKE #92 skipping update_recv as MD is fake | Message ID: sent #92 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.92:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | state #92 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9d3cc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #92 | libevent_malloc: new ptr-libevent@0x55564da095c8 size 128 | #92 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.052867 | resume sending helper answer for #92 suppresed complete_v2_state_transition() and stole MD | #92 spent 1.04 milliseconds in resume sending helper answer | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c01d2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.086312; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #79 | libevent_malloc: new ptr-libevent@0x7f498c01d2b8 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #79 spent 0.391 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.086805; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #63 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x7f4978017f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #63 spent 0.299 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.178 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.153 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.091706; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #86 | libevent_malloc: new ptr-libevent@0x7f4978017f28 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #86 spent 0.375 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.12053; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #33 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x55564d9d6bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #33 spent 0.445 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-93' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #93 at 0x55564da089f8 | State DB: adding IKEv2 state #93 in UNDEFINED | pstats #93 ikev2.ike started | Message ID: init #93: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #93: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #93; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-93" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-93" IKE SA #93 "road-eastnet-nonat-93" "road-eastnet-nonat-93" #93: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-93 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-93": constructed local IKE proposals for road-eastnet-nonat-93 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 93 for state #93 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #93 | libevent_malloc: new ptr-libevent@0x55564d9d6bc8 size 128 | #93 spent 0.446 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | RESET processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 starting work-order 93 for state #93 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 93 | RESET processing: connection "road-eastnet-nonat-93" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.815 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 93 time elapsed 0.003002 seconds | (#93) spent 3 milliseconds in crypto helper computing work-order 93: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 93 for state #93 to event queue | scheduling resume sending helper answer for #93 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 93 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #93 | **emit ISAKMP Message: | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | ikev2 g^x 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | ikev2 g^x 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | ikev2 g^x 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | ikev2 g^x 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | ikev2 g^x aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | ikev2 g^x 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | ikev2 g^x 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | ikev2 g^x e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | ikev2 g^x 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | ikev2 g^x c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | ikev2 g^x c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | ikev2 g^x b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | ikev2 g^x 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | ikev2 g^x 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | ikev2 g^x 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cb c0 ab ef ab 09 68 3d 33 64 44 8e bf 81 75 40 | IKEv2 nonce 43 51 55 ea fd 8d 3b 27 dd d4 dc bb b5 57 ef d8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 60 c3 6f fa 22 40 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5d | natd_hash: port=500 | natd_hash: hash= a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d 6b 1e e6 6f | natd_hash: hash= 69 cc 74 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d 6b 1e e6 6f | Notify data 69 cc 74 2c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 60 c3 6f fa 22 40 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | natd_hash: hash= 8c b2 dc e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | Notify data 8c b2 dc e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #93 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #93: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #93 to 4294967295 after switching state | Message ID: IKE #93 skipping update_recv as MD is fake | Message ID: sent #93 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.93:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | state #93 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9d6bc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49800058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #93 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 | #93 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.145673 | resume sending helper answer for #93 suppresed complete_v2_state_transition() and stole MD | #93 spent 1.54 milliseconds in resume sending helper answer | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499001d308 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.148258; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #80 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #80 spent 0.396 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.231 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.151099; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #87 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #87 spent 0.396 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.152955; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #64 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #64 spent 0.4 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.191881; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #34 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #34 spent 0.427 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.212737; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #65 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x55564d9edf28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #65 spent 0.429 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.217642; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #88 | libevent_malloc: new ptr-libevent@0x55564d9edf28 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x55564da021d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #88 spent 0.415 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-94' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #94 at 0x55564da0a108 | State DB: adding IKEv2 state #94 in UNDEFINED | pstats #94 ikev2.ike started | Message ID: init #94: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #94: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #94; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-94" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-94" IKE SA #94 "road-eastnet-nonat-94" "road-eastnet-nonat-94" #94: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-94 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-94": constructed local IKE proposals for road-eastnet-nonat-94 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 94 for state #94 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #94 | libevent_malloc: new ptr-libevent@0x55564da021d8 size 128 | #94 spent 0.481 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 94 for state #94 | RESET processing: connection "road-eastnet-nonat-94" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 94 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.802 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 94 time elapsed 0.002668 seconds | (#94) spent 2.67 milliseconds in crypto helper computing work-order 94: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 94 for state #94 to event queue | scheduling resume sending helper answer for #94 | libevent_malloc: new ptr-libevent@0x7f498401d1f8 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 94 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #94 | **emit ISAKMP Message: | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | ikev2 g^x b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | ikev2 g^x c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | ikev2 g^x e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | ikev2 g^x 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | ikev2 g^x 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | ikev2 g^x 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | ikev2 g^x 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | ikev2 g^x f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | ikev2 g^x c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | ikev2 g^x 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | ikev2 g^x 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | ikev2 g^x 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | ikev2 g^x b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | ikev2 g^x e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | ikev2 g^x 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 f1 06 6c 70 | IKEv2 nonce f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 75 d1 99 6a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= df d7 ad f8 cf 16 bf cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5e | natd_hash: port=500 | natd_hash: hash= 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 0b a1 ca ee | natd_hash: hash= a2 11 61 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 0b a1 ca ee | Notify data a2 11 61 69 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= df d7 ad f8 cf 16 bf cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | natd_hash: hash= 23 b5 99 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | Notify data 23 b5 99 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #94 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #94: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #94 to 4294967295 after switching state | Message ID: IKE #94 skipping update_recv as MD is fake | Message ID: sent #94 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.94:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | state #94 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da021d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #94 | libevent_malloc: new ptr-libevent@0x55564da0ac68 size 128 | #94 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.235522 | resume sending helper answer for #94 suppresed complete_v2_state_transition() and stole MD | #94 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498401d1f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.239067; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #81 | libevent_malloc: new ptr-libevent@0x7f498401d1f8 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x7f499c01d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #81 spent 0.401 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.252978; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #35 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #35 spent 0.453 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.274926; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #66 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x55564d9ef638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #66 spent 0.435 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.224 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.2989; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564d9ef638 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #82 spent 0.597 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.293 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.307953; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #89 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x55564da05098 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #89 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-95' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #95 at 0x55564da0b918 | State DB: adding IKEv2 state #95 in UNDEFINED | pstats #95 ikev2.ike started | Message ID: init #95: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #95: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #95; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-95" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-95" IKE SA #95 "road-eastnet-nonat-95" "road-eastnet-nonat-95" #95: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-95 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-95": constructed local IKE proposals for road-eastnet-nonat-95 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 95 for state #95 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b55f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #95 | libevent_malloc: new ptr-libevent@0x55564da05098 size 128 | #95 spent 0.279 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-95" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 16 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 16 starting work-order 95 for state #95 | spent 0.436 milliseconds in whack | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 95 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 95 time elapsed 0.001368 seconds | (#95) spent 1.38 milliseconds in crypto helper computing work-order 95: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 95 for state #95 to event queue | scheduling resume sending helper answer for #95 | libevent_malloc: new ptr-libevent@0x7f498801d1f8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 95 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #95 | **emit ISAKMP Message: | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | ikev2 g^x 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | ikev2 g^x e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | ikev2 g^x 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | ikev2 g^x 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | ikev2 g^x 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | ikev2 g^x 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | ikev2 g^x e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | ikev2 g^x b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | ikev2 g^x 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | ikev2 g^x be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | ikev2 g^x bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ikev2 g^x ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | ikev2 g^x 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | ikev2 g^x a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | ikev2 g^x d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa cf 2a 5a cd 25 ef de 09 6f 7d 10 8c 85 90 63 | IKEv2 nonce 75 f0 a0 52 51 ce b7 86 c1 80 07 40 12 73 a8 8d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4b 54 f0 26 ed 26 22 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5f | natd_hash: port=500 | natd_hash: hash= 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b 8b 22 d9 43 | natd_hash: hash= b7 98 57 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b 8b 22 d9 43 | Notify data b7 98 57 d1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4b 54 f0 26 ed 26 22 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | natd_hash: hash= 93 4d 35 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | Notify data 93 4d 35 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #95 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #95: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #95 to 4294967295 after switching state | Message ID: IKE #95 skipping update_recv as MD is fake | Message ID: sent #95 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.95:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | state #95 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da05098 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b55f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #95 | libevent_malloc: new ptr-libevent@0x55564da0c408 size 128 | #95 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.314642 | resume sending helper answer for #95 suppresed complete_v2_state_transition() and stole MD | #95 spent 1.09 milliseconds in resume sending helper answer | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498801d1f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.149 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.314934; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #36 | libevent_malloc: new ptr-libevent@0x7f498801d1f8 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #36 spent 0.247 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.13 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.333437; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #67 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x55564d9ef558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #67 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.36084; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #83 | libevent_malloc: new ptr-libevent@0x55564d9ef558 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #83 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-96' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #96 at 0x55564da0cf78 | State DB: adding IKEv2 state #96 in UNDEFINED | pstats #96 ikev2.ike started | Message ID: init #96: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #96: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #96; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-96" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-96" IKE SA #96 "road-eastnet-nonat-96" "road-eastnet-nonat-96" #96: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-96 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-96": constructed local IKE proposals for road-eastnet-nonat-96 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 96 for state #96 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f496c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #96 | libevent_malloc: new ptr-libevent@0x7f496c0055c8 size 128 | #96 spent 0.218 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-96" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.3 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 96 for state #96 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 96 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 96 time elapsed 0.000577 seconds | (#96) spent 0.58 milliseconds in crypto helper computing work-order 96: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 96 for state #96 to event queue | scheduling resume sending helper answer for #96 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 96 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #96 | **emit ISAKMP Message: | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | ikev2 g^x 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | ikev2 g^x 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | ikev2 g^x 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | ikev2 g^x b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | ikev2 g^x c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | ikev2 g^x 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | ikev2 g^x 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | ikev2 g^x b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | ikev2 g^x 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | ikev2 g^x 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | ikev2 g^x c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | ikev2 g^x 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | ikev2 g^x 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | ikev2 g^x a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | ikev2 g^x 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 a8 cf 08 07 9a a2 23 df a2 2f e2 b8 dd 4e f8 | IKEv2 nonce e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 01 6b 2d 17 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f3 ea 95 70 ed ce f4 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 60 | natd_hash: port=500 | natd_hash: hash= 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 f9 6c 04 c4 | natd_hash: hash= 32 35 05 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 f9 6c 04 c4 | Notify data 32 35 05 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f3 ea 95 70 ed ce f4 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | natd_hash: hash= ef 66 c4 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | Notify data ef 66 c4 12 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #96 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #96: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #96 to 4294967295 after switching state | Message ID: IKE #96 skipping update_recv as MD is fake | Message ID: sent #96 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.96:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | state #96 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c0055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f496c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #96 | libevent_malloc: new ptr-libevent@0x55564da0f1a8 size 128 | #96 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.373148 | resume sending helper answer for #96 suppresed complete_v2_state_transition() and stole MD | #96 spent 0.483 milliseconds in resume sending helper answer | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c01d2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.374321; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #37 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #37 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.386604; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #90 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x55564da067a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #90 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.396921; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #68 | libevent_malloc: new ptr-libevent@0x55564da067a8 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x7f49b0012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #68 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-97' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #97 at 0x55564da0e5d8 | State DB: adding IKEv2 state #97 in UNDEFINED | pstats #97 ikev2.ike started | Message ID: init #97: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #97: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #97; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-97" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-97" IKE SA #97 "road-eastnet-nonat-97" "road-eastnet-nonat-97" #97: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-97 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-97": constructed local IKE proposals for road-eastnet-nonat-97 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 97 for state #97 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c5508 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f49b0012288 size 128 | #97 spent 0.152 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 97 for state #97 | RESET processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 97 | RESET processing: connection "road-eastnet-nonat-97" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.265 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 97 time elapsed 0.001104 seconds | (#97) spent 1.09 milliseconds in crypto helper computing work-order 97: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 97 for state #97 to event queue | scheduling resume sending helper answer for #97 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 97 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #97 | **emit ISAKMP Message: | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | ikev2 g^x c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | ikev2 g^x d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | ikev2 g^x 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | ikev2 g^x df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | ikev2 g^x 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ikev2 g^x ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | ikev2 g^x e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | ikev2 g^x 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | ikev2 g^x f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | ikev2 g^x 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | ikev2 g^x 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | ikev2 g^x 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | ikev2 g^x 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | ikev2 g^x 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | ikev2 g^x 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 65 d2 a9 48 | IKEv2 nonce da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 a6 aa f1 8a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 87 ef 20 74 a3 87 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 61 | natd_hash: port=500 | natd_hash: hash= 1c d0 62 1a a3 f8 ad a0 17 be 31 10 2f 5a c3 86 | natd_hash: hash= 32 1c 48 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c d0 62 1a a3 f8 ad a0 17 be 31 10 2f 5a c3 86 | Notify data 32 1c 48 82 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 87 ef 20 74 a3 87 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | natd_hash: hash= 49 28 dc 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | Notify data 49 28 dc 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #97 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #97: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #97 to 4294967295 after switching state | Message ID: IKE #97 skipping update_recv as MD is fake | Message ID: sent #97 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.97:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | state #97 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0012288 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c5508 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #97 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 | #97 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.43427 | resume sending helper answer for #97 suppresed complete_v2_state_transition() and stole MD | #97 spent 0.369 milliseconds in resume sending helper answer | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498001d1e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.435409; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #38 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x55564d9ae1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #38 spent 0.0748 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.449653; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #84 | libevent_malloc: new ptr-libevent@0x55564d9ae1e8 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #84 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0528 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.454025; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x7f49ac01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #69 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.470405; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #91 | libevent_malloc: new ptr-libevent@0x7f49ac01d2b8 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x55564da07eb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #91 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-98' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #98 at 0x55564da0fce8 | State DB: adding IKEv2 state #98 in UNDEFINED | pstats #98 ikev2.ike started | Message ID: init #98: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #98: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #98; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-98" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-98" IKE SA #98 "road-eastnet-nonat-98" "road-eastnet-nonat-98" #98: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-98 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-98": constructed local IKE proposals for road-eastnet-nonat-98 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 98 for state #98 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #98 | libevent_malloc: new ptr-libevent@0x55564da07eb8 size 128 | #98 spent 0.194 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | crypto helper 17 starting work-order 98 for state #98 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 98 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 98 time elapsed 0.000767 seconds | (#98) spent 0.742 milliseconds in crypto helper computing work-order 98: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 98 for state #98 to event queue | scheduling resume sending helper answer for #98 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 | crypto helper 17 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-98" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.283 milliseconds in whack | processing resume sending helper answer for #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 98 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #98 | **emit ISAKMP Message: | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | ikev2 g^x b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | ikev2 g^x dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | ikev2 g^x 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | ikev2 g^x 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | ikev2 g^x 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | ikev2 g^x 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | ikev2 g^x 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | ikev2 g^x 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | ikev2 g^x e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | ikev2 g^x fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | ikev2 g^x c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | ikev2 g^x a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | ikev2 g^x 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | ikev2 g^x 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | ikev2 g^x bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 76 6b 16 02 76 8d 57 ff cd 95 16 7c 29 dd 07 46 | IKEv2 nonce a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 e3 6f c9 32 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd f4 e6 fa e9 6c c2 e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 62 | natd_hash: port=500 | natd_hash: hash= 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 78 0a e6 f3 | natd_hash: hash= 13 4d 68 ca | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 78 0a e6 f3 | Notify data 13 4d 68 ca | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd f4 e6 fa e9 6c c2 e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | natd_hash: hash= 09 41 d6 e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | Notify data 09 41 d6 e7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #98 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #98: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #98 to 4294967295 after switching state | Message ID: IKE #98 skipping update_recv as MD is fake | Message ID: sent #98 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.98:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | state #98 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da07eb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49bc002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #98 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 | #98 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.496723 | resume sending helper answer for #98 suppresed complete_v2_state_transition() and stole MD | #98 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497401d368 | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.496793; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #39 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #39 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.514234; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #70 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #70 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.531596; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #85 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #85 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0932 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.552966; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #92 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x55564da095c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #92 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-99' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #99 at 0x55564da11468 | State DB: adding IKEv2 state #99 in UNDEFINED | pstats #99 ikev2.ike started | Message ID: init #99: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #99: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #99; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-99" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-99" IKE SA #99 "road-eastnet-nonat-99" "road-eastnet-nonat-99" #99: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-99 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-99": constructed local IKE proposals for road-eastnet-nonat-99 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 99 for state #99 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #99 | libevent_malloc: new ptr-libevent@0x55564da095c8 size 128 | #99 spent 0.134 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-99" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.209 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 99 for state #99 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 99 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 99 time elapsed 0.000582 seconds | (#99) spent 0.57 milliseconds in crypto helper computing work-order 99: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 99 for state #99 to event queue | scheduling resume sending helper answer for #99 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 99 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #99 | **emit ISAKMP Message: | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | ikev2 g^x 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ikev2 g^x ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | ikev2 g^x 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | ikev2 g^x 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | ikev2 g^x 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | ikev2 g^x 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | ikev2 g^x b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | ikev2 g^x 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | ikev2 g^x e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | ikev2 g^x d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ikev2 g^x ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | ikev2 g^x e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | ikev2 g^x e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | ikev2 g^x 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | ikev2 g^x e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce de 03 07 e1 d1 7e bf 61 a5 52 fd fb 8a 2a a3 67 | IKEv2 nonce 57 1f 0c 21 38 be e2 b1 68 14 0e a5 6b a0 1f 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 0d c9 79 d0 64 09 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 63 | natd_hash: port=500 | natd_hash: hash= 9e af ef c4 27 a4 59 bb 11 c0 03 a7 b3 21 51 01 | natd_hash: hash= be 6f ad 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e af ef c4 27 a4 59 bb 11 c0 03 a7 b3 21 51 01 | Notify data be 6f ad 41 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 0d c9 79 d0 64 09 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | natd_hash: hash= af d5 b1 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | Notify data af d5 b1 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #99 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #99: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #99 to 4294967295 after switching state | Message ID: IKE #99 skipping update_recv as MD is fake | Message ID: sent #99 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.99:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | state #99 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da095c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #99 | libevent_malloc: new ptr-libevent@0x55564da137b8 size 128 | #99 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.556583 | resume sending helper answer for #99 suppresed complete_v2_state_transition() and stole MD | #99 spent 0.35 milliseconds in resume sending helper answer | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497801d798 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.559775; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #40 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #40 spent 0.0932 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.573031; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #71 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #71 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.592397; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #86 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x7f4978017f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #86 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0783 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-100' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #100 at 0x55564da12be8 | State DB: adding IKEv2 state #100 in UNDEFINED | pstats #100 ikev2.ike started | Message ID: init #100: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #100: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #100; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-100" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-100" IKE SA #100 "road-eastnet-nonat-100" "road-eastnet-nonat-100" #100: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-100 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-100": constructed local IKE proposals for road-eastnet-nonat-100 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 100 for state #100 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f52e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #100 | libevent_malloc: new ptr-libevent@0x7f4978017f28 size 128 | crypto helper 19 resuming | #100 spent 0.164 milliseconds in ikev2_parent_outI1() | crypto helper 19 starting work-order 100 for state #100 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 100 | RESET processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-100" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.253 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 100 time elapsed 0.000557 seconds | (#100) spent 0.561 milliseconds in crypto helper computing work-order 100: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 100 for state #100 to event queue | scheduling resume sending helper answer for #100 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 100 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #100 | **emit ISAKMP Message: | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | ikev2 g^x 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | ikev2 g^x 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | ikev2 g^x 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | ikev2 g^x 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ikev2 g^x ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | ikev2 g^x 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | ikev2 g^x 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | ikev2 g^x 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | ikev2 g^x 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | ikev2 g^x 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | ikev2 g^x 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | ikev2 g^x 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | ikev2 g^x 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | ikev2 g^x 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | ikev2 g^x 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 8c 14 15 23 ec 2b c7 16 a7 33 9d ed dd fe f1 | IKEv2 nonce 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 e7 ab 1f 83 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ab 06 57 37 67 a3 c6 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 64 | natd_hash: port=500 | natd_hash: hash= d3 80 9a 03 06 67 ed cd ea 37 18 cc 06 20 56 bd | natd_hash: hash= a1 55 0c c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 80 9a 03 06 67 ed cd ea 37 18 cc 06 20 56 bd | Notify data a1 55 0c c7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ab 06 57 37 67 a3 c6 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | natd_hash: hash= 14 a2 ff 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | Notify data 14 a2 ff 9e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #100 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #100: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #100 to 4294967295 after switching state | Message ID: IKE #100 skipping update_recv as MD is fake | Message ID: sent #100 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.100:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | state #100 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4978017f28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f52e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #100 | libevent_malloc: new ptr-libevent@0x55564da14ec8 size 128 | #100 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.615934 | resume sending helper answer for #100 suppresed complete_v2_state_transition() and stole MD | #100 spent 0.391 milliseconds in resume sending helper answer | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c01d3b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.623126; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #41 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #41 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.63242; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #72 spent 0.0992 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.645715; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #93 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #93 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.652063; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #87 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #87 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-101' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #101 at 0x55564da142f8 | State DB: adding IKEv2 state #101 in UNDEFINED | pstats #101 ikev2.ike started | Message ID: init #101: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #101: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #101; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-101" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-101" IKE SA #101 "road-eastnet-nonat-101" "road-eastnet-nonat-101" #101: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-101 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-101": constructed local IKE proposals for road-eastnet-nonat-101 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 101 for state #101 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6dd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #101 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 | crypto helper 0 resuming | #101 spent 0.139 milliseconds in ikev2_parent_outI1() | crypto helper 0 starting work-order 101 for state #101 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 101 | RESET processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-101" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.256 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 101 time elapsed 0.000627 seconds | (#101) spent 0.63 milliseconds in crypto helper computing work-order 101: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 101 for state #101 to event queue | scheduling resume sending helper answer for #101 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 101 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #101 | **emit ISAKMP Message: | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | ikev2 g^x 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | ikev2 g^x 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | ikev2 g^x 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | ikev2 g^x a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | ikev2 g^x e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | ikev2 g^x 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | ikev2 g^x 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | ikev2 g^x af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | ikev2 g^x 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | ikev2 g^x 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | ikev2 g^x 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | ikev2 g^x 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | ikev2 g^x b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | ikev2 g^x 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | ikev2 g^x 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 af 23 1d d9 ff db fd b6 c3 a1 ea 79 2c 7d fb | IKEv2 nonce b5 8a e6 ce 09 9b 19 d1 c6 13 1c af d4 fd 34 ce | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dd f0 70 d5 46 04 08 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 65 | natd_hash: port=500 | natd_hash: hash= 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 eb bf 6c ed | natd_hash: hash= b0 68 7f 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 eb bf 6c ed | Notify data b0 68 7f 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dd f0 70 d5 46 04 08 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | natd_hash: hash= 08 da ae 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | Notify data 08 da ae 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #101 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #101: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #101 to 4294967295 after switching state | Message ID: IKE #101 skipping update_recv as MD is fake | Message ID: sent #101 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.101:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | state #101 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6dd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #101 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 | #101 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.674872 | resume sending helper answer for #101 suppresed complete_v2_state_transition() and stole MD | #101 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc01fe28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.687056; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #42 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #42 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.692341; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #73 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #73 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.718689; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #88 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x55564d9edf28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #88 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-102' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #102 at 0x55564da15a08 | State DB: adding IKEv2 state #102 in UNDEFINED | pstats #102 ikev2.ike started | Message ID: init #102: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #102: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #102; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-102" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-102" IKE SA #102 "road-eastnet-nonat-102" "road-eastnet-nonat-102" #102: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-102 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-102": constructed local IKE proposals for road-eastnet-nonat-102 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 102 for state #102 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #102 | libevent_malloc: new ptr-libevent@0x55564d9edf28 size 128 | #102 spent 0.157 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 102 for state #102 | RESET processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-102" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 102 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.542 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 102 time elapsed 0.000658 seconds | (#102) spent 0.659 milliseconds in crypto helper computing work-order 102: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 102 for state #102 to event queue | scheduling resume sending helper answer for #102 | libevent_malloc: new ptr-libevent@0x7f49b401fc78 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 102 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #102 | **emit ISAKMP Message: | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | ikev2 g^x 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | ikev2 g^x 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | ikev2 g^x c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | ikev2 g^x 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | ikev2 g^x 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | ikev2 g^x fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | ikev2 g^x 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | ikev2 g^x 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | ikev2 g^x 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | ikev2 g^x d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | ikev2 g^x d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | ikev2 g^x d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | ikev2 g^x d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | ikev2 g^x e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | ikev2 g^x c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 07 bc 73 ab e2 33 74 8f 35 75 b3 ab ed bb 23 14 | IKEv2 nonce 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d 3c 12 1e 74 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= be 28 61 e5 47 55 c1 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 66 | natd_hash: port=500 | natd_hash: hash= a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 32 40 20 dd | natd_hash: hash= 12 6c 7d e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 32 40 20 dd | Notify data 12 6c 7d e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= be 28 61 e5 47 55 c1 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | natd_hash: hash= 69 c5 9c d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | Notify data 69 c5 9c d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #102 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #102: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #102 to 4294967295 after switching state | Message ID: IKE #102 skipping update_recv as MD is fake | Message ID: sent #102 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.102:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | state #102 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9edf28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49740058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #102 | libevent_malloc: new ptr-libevent@0x55564da17d58 size 128 | #102 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.734628 | resume sending helper answer for #102 suppresed complete_v2_state_transition() and stole MD | #102 spent 0.37 milliseconds in resume sending helper answer | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b401fc78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.735786; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #94 | libevent_malloc: new ptr-libevent@0x7f49b401fc78 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x55564da0ac68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #94 spent 0.0905 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.749029; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #43 | libevent_malloc: new ptr-libevent@0x55564da0ac68 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #43 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.766412; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004478 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #74 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x7f49980123b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #74 spent 0.0898 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-103' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #103 at 0x55564da17118 | State DB: adding IKEv2 state #103 in UNDEFINED | pstats #103 ikev2.ike started | Message ID: init #103: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #103: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #103; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-103" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-103" IKE SA #103 "road-eastnet-nonat-103" "road-eastnet-nonat-103" #103: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-103 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-103": constructed local IKE proposals for road-eastnet-nonat-103 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 103 for state #103 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a9cb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #103 | libevent_malloc: new ptr-libevent@0x7f49980123b8 size 128 | #103 spent 0.193 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 103 for state #103 | RESET processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-103" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 103 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.331 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 103 time elapsed 0.001049 seconds | (#103) spent 1.05 milliseconds in crypto helper computing work-order 103: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 103 for state #103 to event queue | scheduling resume sending helper answer for #103 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 103 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #103 | **emit ISAKMP Message: | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | ikev2 g^x d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | ikev2 g^x 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | ikev2 g^x 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | ikev2 g^x c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | ikev2 g^x dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | ikev2 g^x 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | ikev2 g^x 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | ikev2 g^x 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | ikev2 g^x 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | ikev2 g^x 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | ikev2 g^x 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | ikev2 g^x 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | ikev2 g^x c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ikev2 g^x ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | ikev2 g^x e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 40 9c f2 a6 | IKEv2 nonce dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 21 00 74 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= eb 17 96 53 27 a7 c6 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 67 | natd_hash: port=500 | natd_hash: hash= ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 f4 1f 8e 3c | natd_hash: hash= ad 8e 2f 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 f4 1f 8e 3c | Notify data ad 8e 2f 4e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= eb 17 96 53 27 a7 c6 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | natd_hash: hash= 53 0e 94 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | Notify data 53 0e 94 1b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #103 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #103: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #103 to 4294967295 after switching state | Message ID: IKE #103 skipping update_recv as MD is fake | Message ID: sent #103 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.103:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | state #103 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49980123b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a9cb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #103 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 | #103 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.798207 | resume sending helper answer for #103 suppresed complete_v2_state_transition() and stole MD | #103 spent 0.565 milliseconds in resume sending helper answer | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b801fde8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.809472; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #89 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #89 spent 0.187 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.809696; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #44 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x7f49a40179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #44 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0874 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.814224; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #95 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x55564da0c408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #95 spent 0.213 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0993 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.8247; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #75 | libevent_malloc: new ptr-libevent@0x55564da0c408 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x7f49a001d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #75 spent 0.303 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-104' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #104 at 0x55564da18898 | State DB: adding IKEv2 state #104 in UNDEFINED | pstats #104 ikev2.ike started | Message ID: init #104: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #104: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #104; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-104" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-104" IKE SA #104 "road-eastnet-nonat-104" "road-eastnet-nonat-104" #104: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-104 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-104": constructed local IKE proposals for road-eastnet-nonat-104 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 104 for state #104 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da05028 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #104 | libevent_malloc: new ptr-libevent@0x7f49a001d1f8 size 128 | #104 spent 0.18 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-104" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.277 milliseconds in whack | crypto helper 5 resuming | crypto helper 5 starting work-order 104 for state #104 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 104 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 104 time elapsed 0.001208 seconds | (#104) spent 1.22 milliseconds in crypto helper computing work-order 104: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 104 for state #104 to event queue | scheduling resume sending helper answer for #104 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 104 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #104 | **emit ISAKMP Message: | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | ikev2 g^x a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | ikev2 g^x d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ikev2 g^x ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ikev2 g^x ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | ikev2 g^x d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | ikev2 g^x d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | ikev2 g^x 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | ikev2 g^x 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | ikev2 g^x d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | ikev2 g^x bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | ikev2 g^x fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | ikev2 g^x d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | ikev2 g^x b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | ikev2 g^x f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ikev2 g^x ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d3 43 12 d2 53 c4 a5 2b b3 46 97 fa 13 64 19 69 | IKEv2 nonce 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c 71 37 69 2d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 58 d0 bd 55 a1 55 2e 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 68 | natd_hash: port=500 | natd_hash: hash= 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 55 53 f1 6c | natd_hash: hash= 06 7d 5b 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 55 53 f1 6c | Notify data 06 7d 5b 7e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 58 d0 bd 55 a1 55 2e 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | natd_hash: hash= 67 66 80 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | Notify data 67 66 80 98 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #104 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #104: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #104 to 4294967295 after switching state | Message ID: IKE #104 skipping update_recv as MD is fake | Message ID: sent #104 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.104:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | state #104 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a001d1f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da05028 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #104 | libevent_malloc: new ptr-libevent@0x55564da1abe8 size 128 | #104 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.863359 | resume sending helper answer for #104 suppresed complete_v2_state_transition() and stole MD | #104 spent 0.517 milliseconds in resume sending helper answer | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac022b28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.8706; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00375 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #45 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #45 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0749 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.873933; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #96 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x55564da0f1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #96 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.88729; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564da0f1a8 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #90 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0722 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.90766; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002321 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #76 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x7f4990012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #76 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0919 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-105' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #105 at 0x55564da19fa8 | State DB: adding IKEv2 state #105 in UNDEFINED | pstats #105 ikev2.ike started | Message ID: init #105: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #105: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #105; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-105" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-105" IKE SA #105 "road-eastnet-nonat-105" "road-eastnet-nonat-105" #105: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-105 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-105": constructed local IKE proposals for road-eastnet-nonat-105 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 105 for state #105 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ce048 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #105 | libevent_malloc: new ptr-libevent@0x7f4990012288 size 128 | #105 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-105" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.24 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 105 for state #105 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 105 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 105 time elapsed 0.000596 seconds | (#105) spent 0.6 milliseconds in crypto helper computing work-order 105: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 105 for state #105 to event queue | scheduling resume sending helper answer for #105 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 105 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #105 | **emit ISAKMP Message: | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | ikev2 g^x 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | ikev2 g^x 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | ikev2 g^x 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | ikev2 g^x e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | ikev2 g^x 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | ikev2 g^x fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | ikev2 g^x f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | ikev2 g^x 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | ikev2 g^x 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | ikev2 g^x 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ikev2 g^x ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | ikev2 g^x 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | ikev2 g^x 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | ikev2 g^x 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | ikev2 g^x 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 d1 e5 c2 e7 | IKEv2 nonce 15 90 ed a9 29 d1 5a 07 31 04 d9 95 1e 5a 5e 72 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b2 96 5f fd 57 7f 56 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 69 | natd_hash: port=500 | natd_hash: hash= 50 aa 9e 96 09 2a 49 03 d6 51 05 86 ae a2 66 14 | natd_hash: hash= 9f 19 ab 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 aa 9e 96 09 2a 49 03 d6 51 05 86 ae a2 66 14 | Notify data 9f 19 ab 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b2 96 5f fd 57 7f 56 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | natd_hash: hash= 57 3c b3 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | Notify data 57 3c b3 d9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #105 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #105: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #105 to 4294967295 after switching state | Message ID: IKE #105 skipping update_recv as MD is fake | Message ID: sent #105 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.105:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | state #105 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4990012288 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ce048 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #105 | libevent_malloc: new ptr-libevent@0x55564da1c368 size 128 | #105 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.922948 | resume sending helper answer for #105 suppresed complete_v2_state_transition() and stole MD | #105 spent 0.373 milliseconds in resume sending helper answer | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b000cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.933121; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #46 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.935362; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x55564da10928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #97 spent 0.0831 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10582.969611; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #77 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #77 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.076 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10582.971899; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #91 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x7f49ac01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #91 spent 0.0848 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-106' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #106 at 0x55564da1b728 | State DB: adding IKEv2 state #106 in UNDEFINED | pstats #106 ikev2.ike started | Message ID: init #106: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #106: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #106; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-106" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-106" IKE SA #106 "road-eastnet-nonat-106" "road-eastnet-nonat-106" #106: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-106 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-106": constructed local IKE proposals for road-eastnet-nonat-106 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 106 for state #106 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #106 | libevent_malloc: new ptr-libevent@0x7f49ac01d2b8 size 128 | #106 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-106" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.238 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 106 for state #106 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 106 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 106 time elapsed 0.000609 seconds | (#106) spent 0.612 milliseconds in crypto helper computing work-order 106: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 106 for state #106 to event queue | scheduling resume sending helper answer for #106 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 106 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #106 | **emit ISAKMP Message: | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | ikev2 g^x e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | ikev2 g^x b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | ikev2 g^x 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | ikev2 g^x 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | ikev2 g^x be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | ikev2 g^x 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | ikev2 g^x 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | ikev2 g^x 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | ikev2 g^x 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | ikev2 g^x b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | ikev2 g^x 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | ikev2 g^x 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | ikev2 g^x 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | ikev2 g^x 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | ikev2 g^x 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 44 4e 99 2e | IKEv2 nonce f0 13 68 64 e5 f1 33 03 b0 64 5a b1 ae 55 4e f5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3c ae 3b 35 2c f6 31 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6a | natd_hash: port=500 | natd_hash: hash= 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 6e c5 dc dc | natd_hash: hash= a8 a4 8e 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 6e c5 dc dc | Notify data a8 a4 8e 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3c ae 3b 35 2c f6 31 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | natd_hash: hash= d4 55 9d 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | Notify data d4 55 9d 4d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #106 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #106: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #106 to 4294967295 after switching state | Message ID: IKE #106 skipping update_recv as MD is fake | Message ID: sent #106 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.106:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | state #106 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac01d2b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #106 | libevent_malloc: new ptr-libevent@0x55564da1dae8 size 128 | #106 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10582.981956 | resume sending helper answer for #106 suppresed complete_v2_state_transition() and stole MD | #106 spent 0.402 milliseconds in resume sending helper answer | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4022a68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10582.991134; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #47 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #47 spent 0.0868 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10582.997388; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500665 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #98 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x55564da120a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #98 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.028642; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003143 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #78 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #78 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-107' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #107 at 0x55564da1cea8 | State DB: adding IKEv2 state #107 in UNDEFINED | pstats #107 ikev2.ike started | Message ID: init #107: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #107: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #107; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-107" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-107" IKE SA #107 "road-eastnet-nonat-107" "road-eastnet-nonat-107" #107: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-107 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-107": constructed local IKE proposals for road-eastnet-nonat-107 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 107 for state #107 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9af988 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #107 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 | #107 spent 0.142 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | crypto helper 8 starting work-order 107 for state #107 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 107 | RESET processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-107" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.227 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 107 time elapsed 0.00074 seconds | (#107) spent 0.739 milliseconds in crypto helper computing work-order 107: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 107 for state #107 to event queue | scheduling resume sending helper answer for #107 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 107 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #107 | **emit ISAKMP Message: | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | ikev2 g^x 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | ikev2 g^x 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ikev2 g^x ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | ikev2 g^x 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | ikev2 g^x a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | ikev2 g^x 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | ikev2 g^x b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | ikev2 g^x c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | ikev2 g^x d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | ikev2 g^x 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | ikev2 g^x e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | ikev2 g^x cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | ikev2 g^x 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | ikev2 g^x 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | ikev2 g^x 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 67 19 0d 80 ff f8 81 4a 63 bf 20 96 13 0e 67 18 | IKEv2 nonce c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d 58 4c 89 a3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 97 23 1f cf de ae 29 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6b | natd_hash: port=500 | natd_hash: hash= c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 65 14 07 41 | natd_hash: hash= ab af 02 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 65 14 07 41 | Notify data ab af 02 b7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 97 23 1f cf de ae 29 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | natd_hash: hash= 0d 0f c4 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | Notify data 0d 0f c4 b7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #107 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #107: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #107 to 4294967295 after switching state | Message ID: IKE #107 skipping update_recv as MD is fake | Message ID: sent #107 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.107:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | state #107 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9af988 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #107 | libevent_malloc: new ptr-libevent@0x55564da1f268 size 128 | #107 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.041886 | resume sending helper answer for #107 suppresed complete_v2_state_transition() and stole MD | #107 spent 0.365 milliseconds in resume sending helper answer | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8022bf8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.052067; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #48 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x7f4974017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #48 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.054354; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #92 | libevent_malloc: new ptr-libevent@0x7f4974017af8 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #92 spent 0.0922 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.057611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #99 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x55564da137b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #99 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.087833; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564da137b8 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x7f498c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #79 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-108' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #108 at 0x55564da1e628 | State DB: adding IKEv2 state #108 in UNDEFINED | pstats #108 ikev2.ike started | Message ID: init #108: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #108: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #108; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-108" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-108" IKE SA #108 "road-eastnet-nonat-108" "road-eastnet-nonat-108" #108: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-108 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-108": constructed local IKE proposals for road-eastnet-nonat-108 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 108 for state #108 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07dd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #108 | libevent_malloc: new ptr-libevent@0x7f498c01d2b8 size 128 | #108 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-108" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 9 resuming | crypto helper 9 starting work-order 108 for state #108 | spent 0.249 milliseconds in whack | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 108 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 108 time elapsed 0.000757 seconds | (#108) spent 0.762 milliseconds in crypto helper computing work-order 108: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 108 for state #108 to event queue | scheduling resume sending helper answer for #108 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 108 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #108 | **emit ISAKMP Message: | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ikev2 g^x ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ikev2 g^x ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | ikev2 g^x dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | ikev2 g^x 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | ikev2 g^x 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | ikev2 g^x 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | ikev2 g^x c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | ikev2 g^x 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | ikev2 g^x 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | ikev2 g^x b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | ikev2 g^x 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | ikev2 g^x 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | ikev2 g^x 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | ikev2 g^x 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | ikev2 g^x 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff 01 9c b8 d8 | IKEv2 nonce 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c d7 2d 7a 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 96 61 ff 65 03 3a d0 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6c | natd_hash: port=500 | natd_hash: hash= cf 62 63 6c ce 57 05 a6 94 f6 41 d7 7a 0d a3 89 | natd_hash: hash= bf 97 04 cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf 62 63 6c ce 57 05 a6 94 f6 41 d7 7a 0d a3 89 | Notify data bf 97 04 cf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 96 61 ff 65 03 3a d0 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | natd_hash: hash= cb 37 52 c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | Notify data cb 37 52 c2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #108 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #108: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #108 to 4294967295 after switching state | Message ID: IKE #108 skipping update_recv as MD is fake | Message ID: sent #108 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.108:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | state #108 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c01d2b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07dd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #108 | libevent_malloc: new ptr-libevent@0x55564da209e8 size 128 | #108 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.102684 | resume sending helper answer for #108 suppresed complete_v2_state_transition() and stole MD | #108 spent 0.481 milliseconds in resume sending helper answer | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c022a68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0797 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.112889; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #49 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #49 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.116167; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #100 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x55564da14ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #100 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.14646; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #93 | libevent_malloc: new ptr-libevent@0x55564da14ec8 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #93 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.14984; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002819 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #80 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #80 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-109' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #109 at 0x55564da1fda8 | State DB: adding IKEv2 state #109 in UNDEFINED | pstats #109 ikev2.ike started | Message ID: init #109: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #109: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #109; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-109" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-109" IKE SA #109 "road-eastnet-nonat-109" "road-eastnet-nonat-109" #109: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-109 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-109": constructed local IKE proposals for road-eastnet-nonat-109 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 109 for state #109 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #109 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 | #109 spent 0.12 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-109" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.185 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 109 for state #109 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 109 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 109 time elapsed 0.000666 seconds | (#109) spent 0.666 milliseconds in crypto helper computing work-order 109: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 109 for state #109 to event queue | scheduling resume sending helper answer for #109 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 109 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #109 | **emit ISAKMP Message: | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | ikev2 g^x f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | ikev2 g^x 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | ikev2 g^x 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | ikev2 g^x 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | ikev2 g^x d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | ikev2 g^x 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | ikev2 g^x 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | ikev2 g^x 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | ikev2 g^x 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | ikev2 g^x 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | ikev2 g^x cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | ikev2 g^x 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | ikev2 g^x 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | ikev2 g^x 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | ikev2 g^x 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f 25 fd 3f 4f | IKEv2 nonce ed 3f 33 c1 78 24 35 a3 2a 84 66 da 9c 1a 1e a5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9f 02 c9 a8 ac 48 46 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6d | natd_hash: port=500 | natd_hash: hash= 05 7c 5e ba 82 80 d4 39 26 27 ac 1f ab 71 f4 70 | natd_hash: hash= 17 5d 01 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 7c 5e ba 82 80 d4 39 26 27 ac 1f ab 71 f4 70 | Notify data 17 5d 01 e2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9f 02 c9 a8 ac 48 46 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | natd_hash: hash= 87 61 cc 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | Notify data 87 61 cc 0c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #109 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #109: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #109 to 4294967295 after switching state | Message ID: IKE #109 skipping update_recv as MD is fake | Message ID: sent #109 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.109:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | state #109 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #109 | libevent_malloc: new ptr-libevent@0x55564da22168 size 128 | #109 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.16125 | resume sending helper answer for #109 suppresed complete_v2_state_transition() and stole MD | #109 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0022a08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.172525; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #50 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #50 spent 0.0931 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.174902; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #101 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #101 spent 0.0896 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.232253; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #51 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #51 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-110' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #110 at 0x55564da21528 | State DB: adding IKEv2 state #110 in UNDEFINED | pstats #110 ikev2.ike started | Message ID: init #110: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #110: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #110; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-110" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-110" IKE SA #110 "road-eastnet-nonat-110" "road-eastnet-nonat-110" #110: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-110 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-110": constructed local IKE proposals for road-eastnet-nonat-110 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 110 for state #110 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49780058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #110 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 | #110 spent 0.318 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 110 for state #110 | RESET processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 110 | RESET processing: connection "road-eastnet-nonat-110" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.517 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 110 time elapsed 0.001925 seconds | (#110) spent 1.92 milliseconds in crypto helper computing work-order 110: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 110 for state #110 to event queue | scheduling resume sending helper answer for #110 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 | crypto helper 11 waiting (nothing to do) | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.235674; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #102 | libevent_malloc: new ptr-libevent@0x7f49bc014da8 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x55564da17d58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #102 spent 0.3 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 110 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #110 | **emit ISAKMP Message: | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | ikev2 g^x b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | ikev2 g^x 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | ikev2 g^x e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | ikev2 g^x fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | ikev2 g^x 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | ikev2 g^x 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | ikev2 g^x b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | ikev2 g^x c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | ikev2 g^x 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | ikev2 g^x 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | ikev2 g^x 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | ikev2 g^x 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | ikev2 g^x 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | ikev2 g^x af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | ikev2 g^x 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 24 45 a7 58 | IKEv2 nonce 85 a9 eb b4 1f 22 89 65 ca c5 9d ea ca c2 b7 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 41 ce c7 73 9e fb 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6e | natd_hash: port=500 | natd_hash: hash= 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 27 c3 82 95 | natd_hash: hash= 8b f2 c6 e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 27 c3 82 95 | Notify data 8b f2 c6 e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 41 ce c7 73 9e fb 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | natd_hash: hash= 30 fa 35 85 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | Notify data 30 fa 35 85 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #110 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #110: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #110 to 4294967295 after switching state | Message ID: IKE #110 skipping update_recv as MD is fake | Message ID: sent #110 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.110:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | state #110 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49780058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #110 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 | #110 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.237273 | resume sending helper answer for #110 suppresed complete_v2_state_transition() and stole MD | #110 spent 1.18 milliseconds in resume sending helper answer | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994022bd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.128 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.188 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.237779; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002257 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #94 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x7f49b401fc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #94 spent 0.358 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.240499; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003832 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #81 | libevent_malloc: new ptr-libevent@0x7f49b401fc78 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x7f498401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #81 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.13 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.293065; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f498401d1f8 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x7f4984017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #52 spent 0.279 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.298683; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #103 | libevent_malloc: new ptr-libevent@0x7f4984017a98 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #103 spent 0.272 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.299145; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x55564d9ef638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #82 spent 0.207 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-111' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #111 at 0x55564da22ca8 | State DB: adding IKEv2 state #111 in UNDEFINED | pstats #111 ikev2.ike started | Message ID: init #111: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #111: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #111; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-111" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-111" IKE SA #111 "road-eastnet-nonat-111" "road-eastnet-nonat-111" #111: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-111 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-111": constructed local IKE proposals for road-eastnet-nonat-111 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 111 for state #111 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #111 | libevent_malloc: new ptr-libevent@0x55564d9ef638 size 128 | #111 spent 0.323 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-111" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 111 for state #111 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 111 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.561 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 111 time elapsed 0.001688 seconds | (#111) spent 1.7 milliseconds in crypto helper computing work-order 111: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 111 for state #111 to event queue | scheduling resume sending helper answer for #111 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 111 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #111 | **emit ISAKMP Message: | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | ikev2 g^x 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | ikev2 g^x 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | ikev2 g^x 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | ikev2 g^x f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ikev2 g^x ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | ikev2 g^x e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | ikev2 g^x 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | ikev2 g^x 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | ikev2 g^x d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | ikev2 g^x c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | ikev2 g^x 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | ikev2 g^x 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | ikev2 g^x 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | ikev2 g^x 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | ikev2 g^x 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 7b ea f4 dc | IKEv2 nonce 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 46 51 8a f3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b8 6c 72 51 0a 01 3d ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6f | natd_hash: port=500 | natd_hash: hash= 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 55 27 58 ce | natd_hash: hash= 90 df 2a 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 55 27 58 ce | Notify data 90 df 2a 44 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b8 6c 72 51 0a 01 3d ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | natd_hash: hash= 37 f3 0a 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | Notify data 37 f3 0a 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #111 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #111: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #111 to 4294967295 after switching state | Message ID: IKE #111 skipping update_recv as MD is fake | Message ID: sent #111 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.111:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | state #111 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ef638 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #111 | libevent_malloc: new ptr-libevent@0x55564da25068 size 128 | #111 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.31184 | resume sending helper answer for #111 suppresed complete_v2_state_transition() and stole MD | #111 spent 0.957 milliseconds in resume sending helper answer | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499800ce98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.315217; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #95 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x7f49a40179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #95 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.13 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.35478; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #53 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.361097; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #83 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x55564d9ef558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #83 spent 0.0938 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.364342; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #104 | libevent_malloc: new ptr-libevent@0x55564d9ef558 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x55564da1abe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #104 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-112' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #112 at 0x55564da24428 | State DB: adding IKEv2 state #112 in UNDEFINED | pstats #112 ikev2.ike started | Message ID: init #112: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #112: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #112; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-112" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-112" IKE SA #112 "road-eastnet-nonat-112" "road-eastnet-nonat-112" #112: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-112 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-112": constructed local IKE proposals for road-eastnet-nonat-112 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 112 for state #112 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da05028 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #112 | libevent_malloc: new ptr-libevent@0x55564da1abe8 size 128 | #112 spent 0.126 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | RESET processing: connection "road-eastnet-nonat-112" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 starting work-order 112 for state #112 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 112 | spent 0.229 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 112 time elapsed 0.000733 seconds | (#112) spent 0.741 milliseconds in crypto helper computing work-order 112: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 112 for state #112 to event queue | scheduling resume sending helper answer for #112 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 112 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #112 | **emit ISAKMP Message: | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | ikev2 g^x 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | ikev2 g^x 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | ikev2 g^x f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | ikev2 g^x 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | ikev2 g^x 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | ikev2 g^x af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | ikev2 g^x 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | ikev2 g^x de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | ikev2 g^x 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | ikev2 g^x f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | ikev2 g^x 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | ikev2 g^x b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | ikev2 g^x e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ikev2 g^x ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | ikev2 g^x 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 33 37 30 8e 75 1b e6 91 73 ee 74 67 31 94 29 71 | IKEv2 nonce b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c 7c 97 73 f3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 3f 01 06 4d 9e 71 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 70 | natd_hash: port=500 | natd_hash: hash= 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b 9c cf 74 3e | natd_hash: hash= c9 f6 c1 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b 9c cf 74 3e | Notify data c9 f6 c1 52 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 3f 01 06 4d 9e 71 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | natd_hash: hash= 3d 19 44 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | Notify data 3d 19 44 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #112 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #112: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #112 to 4294967295 after switching state | Message ID: IKE #112 skipping update_recv as MD is fake | Message ID: sent #112 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.112:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | state #112 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da1abe8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da05028 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #112 | libevent_malloc: new ptr-libevent@0x55564da26778 size 128 | #112 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.372082 | resume sending helper answer for #112 suppresed complete_v2_state_transition() and stole MD | #112 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c022ac8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.375306; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #96 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #96 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.42369; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #105 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x55564da1c368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #105 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-113' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #113 at 0x55564da25ba8 | State DB: adding IKEv2 state #113 in UNDEFINED | pstats #113 ikev2.ike started | Message ID: init #113: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #113: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #113; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-113" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-113" IKE SA #113 "road-eastnet-nonat-113" "road-eastnet-nonat-113" #113: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-113 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-113": constructed local IKE proposals for road-eastnet-nonat-113 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 113 for state #113 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ce048 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #113 | libevent_malloc: new ptr-libevent@0x55564da1c368 size 128 | #113 spent 0.149 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 113 for state #113 | RESET processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 113 | RESET processing: connection "road-eastnet-nonat-113" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.264 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 113 time elapsed 0.000722 seconds | (#113) spent 0.72 milliseconds in crypto helper computing work-order 113: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 113 for state #113 to event queue | scheduling resume sending helper answer for #113 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 113 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #113 | **emit ISAKMP Message: | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | ikev2 g^x 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | ikev2 g^x 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | ikev2 g^x c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | ikev2 g^x 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | ikev2 g^x e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | ikev2 g^x a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | ikev2 g^x c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | ikev2 g^x 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | ikev2 g^x dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | ikev2 g^x 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | ikev2 g^x 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | ikev2 g^x 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | ikev2 g^x 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ikev2 g^x ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | ikev2 g^x 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 20 2a 90 a6 | IKEv2 nonce 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 81 3c 59 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c4 32 45 e1 75 ea 97 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 71 | natd_hash: port=500 | natd_hash: hash= 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 ce 10 bd 7e | natd_hash: hash= 49 3a 12 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 ce 10 bd 7e | Notify data 49 3a 12 0c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c4 32 45 e1 75 ea 97 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | natd_hash: hash= 6e 69 4a f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | Notify data 6e 69 4a f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #113 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #113: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #113 to 4294967295 after switching state | Message ID: IKE #113 skipping update_recv as MD is fake | Message ID: sent #113 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.113:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | state #113 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da1c368 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ce048 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #113 | libevent_malloc: new ptr-libevent@0x55564da26698 size 128 | #113 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.431693 | resume sending helper answer for #113 suppresed complete_v2_state_transition() and stole MD | #113 spent 0.356 milliseconds in resume sending helper answer | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499001d308 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.436843; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #97 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.442098; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #54 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #54 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.450434; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #84 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x55564d9ae1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #84 spent 0.0899 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.482702; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #106 | libevent_malloc: new ptr-libevent@0x55564d9ae1e8 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x55564da1dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #106 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-114' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #114 at 0x55564da272b8 | State DB: adding IKEv2 state #114 in UNDEFINED | pstats #114 ikev2.ike started | Message ID: init #114: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #114: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #114; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-114" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-114" IKE SA #114 "road-eastnet-nonat-114" "road-eastnet-nonat-114" #114: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-114 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-114": constructed local IKE proposals for road-eastnet-nonat-114 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 114 for state #114 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #114 | libevent_malloc: new ptr-libevent@0x55564da1dae8 size 128 | #114 spent 0.145 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | RESET processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-114" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 starting work-order 114 for state #114 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 114 | spent 0.227 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 114 time elapsed 0.00102 seconds | (#114) spent 1.02 milliseconds in crypto helper computing work-order 114: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 114 for state #114 to event queue | scheduling resume sending helper answer for #114 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 114 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #114 | **emit ISAKMP Message: | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | ikev2 g^x 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | ikev2 g^x 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | ikev2 g^x 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | ikev2 g^x c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | ikev2 g^x 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | ikev2 g^x d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | ikev2 g^x 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | ikev2 g^x 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | ikev2 g^x df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | ikev2 g^x 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | ikev2 g^x 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | ikev2 g^x f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | ikev2 g^x 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ikev2 g^x ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | ikev2 g^x 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 b7 08 da e8 bb 00 39 2b aa fd e2 92 b7 71 ee | IKEv2 nonce 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb 7e e7 bb ed | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3f b4 80 42 63 d4 b4 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 72 | natd_hash: port=500 | natd_hash: hash= 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f 05 9a 2f a5 | natd_hash: hash= ca 8c e2 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f 05 9a 2f a5 | Notify data ca 8c e2 61 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3f b4 80 42 63 d4 b4 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | natd_hash: hash= e2 cd 18 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | Notify data e2 cd 18 c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #114 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #114: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #114 to 4294967295 after switching state | Message ID: IKE #114 skipping update_recv as MD is fake | Message ID: sent #114 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.114:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | state #114 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da1dae8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #114 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 | #114 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.491105 | resume sending helper answer for #114 suppresed complete_v2_state_transition() and stole MD | #114 spent 0.338 milliseconds in resume sending helper answer | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984022a68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.498295; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #98 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #98 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.505589; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #55 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #55 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.532863; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #85 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #85 spent 0.0923 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.542107; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #107 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x55564da1f268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #107 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-115' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #115 at 0x55564da28ac8 | State DB: adding IKEv2 state #115 in UNDEFINED | pstats #115 ikev2.ike started | Message ID: init #115: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #115: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #115; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-115" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-115" IKE SA #115 "road-eastnet-nonat-115" "road-eastnet-nonat-115" #115: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-115 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-115": constructed local IKE proposals for road-eastnet-nonat-115 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 115 for state #115 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9af988 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #115 | libevent_malloc: new ptr-libevent@0x55564da1f268 size 128 | #115 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 115 for state #115 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 115 | RESET processing: connection "road-eastnet-nonat-115" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.306 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 115 time elapsed 0.001066 seconds | (#115) spent 1.07 milliseconds in crypto helper computing work-order 115: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 115 for state #115 to event queue | scheduling resume sending helper answer for #115 | libevent_malloc: new ptr-libevent@0x7f4988022a68 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 115 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #115 | **emit ISAKMP Message: | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | ikev2 g^x b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | ikev2 g^x 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | ikev2 g^x 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ikev2 g^x ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | ikev2 g^x 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | ikev2 g^x e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | ikev2 g^x dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | ikev2 g^x 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | ikev2 g^x 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | ikev2 g^x 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | ikev2 g^x 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | ikev2 g^x 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | ikev2 g^x 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | ikev2 g^x eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | ikev2 g^x 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 12 7c 7e 44 e4 4e ba 81 de ae f8 06 24 8c 70 | IKEv2 nonce 73 50 29 00 ef 70 c8 91 8a 53 52 42 1a 2d 65 cc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 68 9a b5 b4 9f 53 73 81 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 73 | natd_hash: port=500 | natd_hash: hash= ba 6d 23 10 18 c6 8f ab 71 3e 31 70 52 5c 7b f6 | natd_hash: hash= 36 80 4e f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 6d 23 10 18 c6 8f ab 71 3e 31 70 52 5c 7b f6 | Notify data 36 80 4e f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 68 9a b5 b4 9f 53 73 81 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | natd_hash: hash= 2c 55 c1 78 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | Notify data 2c 55 c1 78 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #115 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #115: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #115 to 4294967295 after switching state | Message ID: IKE #115 skipping update_recv as MD is fake | Message ID: sent #115 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.115:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | state #115 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da1f268 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9af988 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #115 | libevent_malloc: new ptr-libevent@0x55564da295b8 size 128 | #115 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.55094 | resume sending helper answer for #115 suppresed complete_v2_state_transition() and stole MD | #115 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988022a68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.558111; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #99 | libevent_malloc: new ptr-libevent@0x7f4988022a68 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #99 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.56246; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #56 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #56 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.593834; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #86 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #86 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.603111; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #108 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x55564da209e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #108 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0538 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-116' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #116 at 0x55564da2a128 | State DB: adding IKEv2 state #116 in UNDEFINED | pstats #116 ikev2.ike started | Message ID: init #116: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #116: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #116; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-116" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-116" IKE SA #116 "road-eastnet-nonat-116" "road-eastnet-nonat-116" #116: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-116 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-116": constructed local IKE proposals for road-eastnet-nonat-116 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 116 for state #116 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07dd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #116 | libevent_malloc: new ptr-libevent@0x55564da209e8 size 128 | #116 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 116 for state #116 | RESET processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-116" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 116 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 116 time elapsed 0.001004 seconds | (#116) spent 1 milliseconds in crypto helper computing work-order 116: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 116 for state #116 to event queue | scheduling resume sending helper answer for #116 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 116 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #116 | **emit ISAKMP Message: | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | ikev2 g^x c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | ikev2 g^x f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | ikev2 g^x 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | ikev2 g^x 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | ikev2 g^x a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | ikev2 g^x bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | ikev2 g^x f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | ikev2 g^x 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | ikev2 g^x 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | ikev2 g^x 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | ikev2 g^x 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | ikev2 g^x 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | ikev2 g^x 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | ikev2 g^x 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | ikev2 g^x c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f 90 58 40 d6 | IKEv2 nonce 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb 46 68 36 9a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a4 fe d4 9f 08 4b 75 20 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 74 | natd_hash: port=500 | natd_hash: hash= 1d 28 e6 a4 ff ad ab e8 be dd b1 72 27 91 c3 b3 | natd_hash: hash= fa 8b dd e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 28 e6 a4 ff ad ab e8 be dd b1 72 27 91 c3 b3 | Notify data fa 8b dd e2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a4 fe d4 9f 08 4b 75 20 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | natd_hash: hash= f5 6b 03 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | Notify data f5 6b 03 16 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #116 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #116: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #116 to 4294967295 after switching state | Message ID: IKE #116 skipping update_recv as MD is fake | Message ID: sent #116 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.116:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | state #116 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da209e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07dd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #116 | libevent_malloc: new ptr-libevent@0x55564da2ac88 size 128 | #116 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.610359 | resume sending helper answer for #116 suppresed complete_v2_state_transition() and stole MD | #116 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c022b28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.617556; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #100 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #100 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.622867; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #57 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #57 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.653266; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #87 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #87 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.662587; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #109 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x55564da22168 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #109 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-117' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #117 at 0x55564da2b938 | State DB: adding IKEv2 state #117 in UNDEFINED | pstats #117 ikev2.ike started | Message ID: init #117: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #117: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #117; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-117" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-117" IKE SA #117 "road-eastnet-nonat-117" "road-eastnet-nonat-117" #117: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-117 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-117": constructed local IKE proposals for road-eastnet-nonat-117 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 117 for state #117 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #117 | libevent_malloc: new ptr-libevent@0x55564da22168 size 128 | #117 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-117" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.191 milliseconds in whack | crypto helper 3 resuming | crypto helper 3 starting work-order 117 for state #117 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 117 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 117 time elapsed 0.000669 seconds | (#117) spent 0.675 milliseconds in crypto helper computing work-order 117: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 117 for state #117 to event queue | scheduling resume sending helper answer for #117 | libevent_malloc: new ptr-libevent@0x7f4980022a58 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 117 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #117 | **emit ISAKMP Message: | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | ikev2 g^x 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | ikev2 g^x 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | ikev2 g^x 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | ikev2 g^x 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | ikev2 g^x 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | ikev2 g^x b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | ikev2 g^x 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | ikev2 g^x 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | ikev2 g^x 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | ikev2 g^x 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | ikev2 g^x 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | ikev2 g^x 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | ikev2 g^x 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | ikev2 g^x bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | ikev2 g^x a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f 85 2b ff 49 | IKEv2 nonce e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a 8d c8 2b 61 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 67 13 0d cc 63 b4 8a 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 75 | natd_hash: port=500 | natd_hash: hash= 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 65 c7 cc e9 | natd_hash: hash= eb 5f ec 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 65 c7 cc e9 | Notify data eb 5f ec 6c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 67 13 0d cc 63 b4 8a 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | natd_hash: hash= c7 47 db 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | Notify data c7 47 db 5c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #117 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #117: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #117 to 4294967295 after switching state | Message ID: IKE #117 skipping update_recv as MD is fake | Message ID: sent #117 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.117:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | state #117 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da22168 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #117 | libevent_malloc: new ptr-libevent@0x55564da2c428 size 128 | #117 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.668861 | resume sending helper answer for #117 suppresed complete_v2_state_transition() and stole MD | #117 spent 0.388 milliseconds in resume sending helper answer | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980022a58 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.67602; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #101 | libevent_malloc: new ptr-libevent@0x7f4980022a58 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #101 spent 0.0888 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.708549; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #58 spent 0.438 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.719471; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #88 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #88 spent 0.49 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.736382; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #110 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #110 spent 0.447 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.736937; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #102 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x7f49bc014da8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #102 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.181 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-118' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #118 at 0x55564da2cf98 | State DB: adding IKEv2 state #118 in UNDEFINED | pstats #118 ikev2.ike started | Message ID: init #118: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #118: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #118; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-118" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-118" IKE SA #118 "road-eastnet-nonat-118" "road-eastnet-nonat-118" #118: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-118 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-118": constructed local IKE proposals for road-eastnet-nonat-118 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 118 for state #118 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da23878 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #118 | libevent_malloc: new ptr-libevent@0x7f49bc014da8 size 128 | #118 spent 0.206 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 starting work-order 118 for state #118 | RESET processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 118 | RESET processing: connection "road-eastnet-nonat-118" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.346 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 118 time elapsed 0.001169 seconds | (#118) spent 1.18 milliseconds in crypto helper computing work-order 118: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 118 for state #118 to event queue | scheduling resume sending helper answer for #118 | libevent_malloc: new ptr-libevent@0x7f4974022bd8 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 118 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #118 | **emit ISAKMP Message: | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | ikev2 g^x 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | ikev2 g^x bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | ikev2 g^x b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | ikev2 g^x 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | ikev2 g^x 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | ikev2 g^x d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | ikev2 g^x 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | ikev2 g^x a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | ikev2 g^x 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | ikev2 g^x 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | ikev2 g^x 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | ikev2 g^x c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | ikev2 g^x 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | ikev2 g^x a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | ikev2 g^x 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e 9d 62 83 81 | IKEv2 nonce 41 48 c3 16 58 e1 1b 5a e7 35 63 eb da 59 b1 ef | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 b4 a4 bf b8 af ff 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 76 | natd_hash: port=500 | natd_hash: hash= 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 3e 54 42 f4 | natd_hash: hash= 3e 4e a9 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 3e 54 42 f4 | Notify data 3e 4e a9 62 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 b4 a4 bf b8 af ff 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | natd_hash: hash= e0 e3 5c 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | Notify data e0 e3 5c 25 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #118 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #118: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #118 to 4294967295 after switching state | Message ID: IKE #118 skipping update_recv as MD is fake | Message ID: sent #118 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.118:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | state #118 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc014da8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da23878 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #118 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 | #118 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.749601 | resume sending helper answer for #118 suppresed complete_v2_state_transition() and stole MD | #118 spent 0.768 milliseconds in resume sending helper answer | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974022bd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0938 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.789943; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004477 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #59 | libevent_malloc: new ptr-libevent@0x7f4974022bd8 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x7f49bc01a5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #59 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.798326; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #103 | libevent_malloc: new ptr-libevent@0x7f49bc01a5b8 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x7f4984017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #103 spent 0.0918 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-119' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #119 at 0x55564da2e7a8 | State DB: adding IKEv2 state #119 in UNDEFINED | pstats #119 ikev2.ike started | Message ID: init #119: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #119: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #119; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-119" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-119" IKE SA #119 "road-eastnet-nonat-119" "road-eastnet-nonat-119" #119: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-119 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-119": constructed local IKE proposals for road-eastnet-nonat-119 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 119 for state #119 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9eddd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #119 | libevent_malloc: new ptr-libevent@0x7f4984017a98 size 128 | #119 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | crypto helper 18 starting work-order 119 for state #119 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 119 | RESET processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-119" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.213 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 119 time elapsed 0.000607 seconds | (#119) spent 0.612 milliseconds in crypto helper computing work-order 119: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 119 for state #119 to event queue | scheduling resume sending helper answer for #119 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 119 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #119 | **emit ISAKMP Message: | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ikev2 g^x ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | ikev2 g^x 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | ikev2 g^x 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | ikev2 g^x 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | ikev2 g^x 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | ikev2 g^x c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | ikev2 g^x cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | ikev2 g^x b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | ikev2 g^x 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | ikev2 g^x e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | ikev2 g^x b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | ikev2 g^x 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | ikev2 g^x 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | ikev2 g^x a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | ikev2 g^x d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f 9d d0 3b 79 | IKEv2 nonce 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 1d 8d 6c 66 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 65 57 f0 0e a9 23 4c 3b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 77 | natd_hash: port=500 | natd_hash: hash= 9b ba 05 44 3f d0 d9 06 31 06 ba 06 a3 77 d9 d8 | natd_hash: hash= 7d 9d 29 d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b ba 05 44 3f d0 d9 06 31 06 ba 06 a3 77 d9 d8 | Notify data 7d 9d 29 d4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 65 57 f0 0e a9 23 4c 3b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | natd_hash: hash= 8c cb 06 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | Notify data 8c cb 06 6e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #119 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #119: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #119 to 4294967295 after switching state | Message ID: IKE #119 skipping update_recv as MD is fake | Message ID: sent #119 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.119:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | state #119 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984017a98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9eddd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #119 | libevent_malloc: new ptr-libevent@0x55564da309d8 size 128 | #119 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.809417 | resume sending helper answer for #119 suppresed complete_v2_state_transition() and stole MD | #119 spent 0.352 milliseconds in resume sending helper answer | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780055c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.81057; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #89 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #89 spent 0.0903 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.811923; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #111 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x55564da25068 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #111 spent 0.0915 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.849271; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #60 | libevent_malloc: new ptr-libevent@0x55564da25068 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x7f498c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #60 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.865664; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #104 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x55564d9ef558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #104 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-120' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #120 at 0x55564da2fe08 | State DB: adding IKEv2 state #120 in UNDEFINED | pstats #120 ikev2.ike started | Message ID: init #120: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #120: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #120; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-120" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-120" IKE SA #120 "road-eastnet-nonat-120" "road-eastnet-nonat-120" #120: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-120 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-120": constructed local IKE proposals for road-eastnet-nonat-120 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 120 for state #120 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #120 | libevent_malloc: new ptr-libevent@0x55564d9ef558 size 128 | #120 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-120" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.232 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 120 for state #120 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 120 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 120 time elapsed 0.00098 seconds | (#120) spent 0.986 milliseconds in crypto helper computing work-order 120: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 120 for state #120 to event queue | scheduling resume sending helper answer for #120 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 120 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #120 | **emit ISAKMP Message: | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | ikev2 g^x fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | ikev2 g^x 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | ikev2 g^x 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | ikev2 g^x 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | ikev2 g^x a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | ikev2 g^x 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | ikev2 g^x c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | ikev2 g^x 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | ikev2 g^x f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | ikev2 g^x 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | ikev2 g^x 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | ikev2 g^x 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | ikev2 g^x 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | ikev2 g^x aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | ikev2 g^x 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 dc 42 8a f2 3b 41 75 0b db 9b 22 27 0d c0 0f | IKEv2 nonce bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 a8 b8 1e 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 86 2b ef ae 6b 04 94 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 78 | natd_hash: port=500 | natd_hash: hash= 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e 5e 86 b6 cc | natd_hash: hash= 1c b5 23 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e 5e 86 b6 cc | Notify data 1c b5 23 2f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 86 2b ef ae 6b 04 94 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | natd_hash: hash= da 97 89 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | Notify data da 97 89 7d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #120 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #120: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #120 to 4294967295 after switching state | Message ID: IKE #120 skipping update_recv as MD is fake | Message ID: sent #120 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.120:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | state #120 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ef558 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #120 | libevent_malloc: new ptr-libevent@0x55564da32158 size 128 | #120 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.870823 | resume sending helper answer for #120 suppresed complete_v2_state_transition() and stole MD | #120 spent 0.426 milliseconds in resume sending helper answer | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c022bc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.872044; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #112 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x55564da26778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #112 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.888334; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564da26778 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x55564da0f1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #90 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.910665; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.0053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #61 | libevent_malloc: new ptr-libevent@0x55564da0f1a8 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #61 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.923961; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #105 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #105 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-121' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #121 at 0x55564da31518 | State DB: adding IKEv2 state #121 in UNDEFINED | pstats #121 ikev2.ike started | Message ID: init #121: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #121: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #121; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-121" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-121" IKE SA #121 "road-eastnet-nonat-121" "road-eastnet-nonat-121" #121: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-121 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-121": constructed local IKE proposals for road-eastnet-nonat-121 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 121 for state #121 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #121 | libevent_malloc: new ptr-libevent@0x55564d9aca68 size 128 | #121 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 121 for state #121 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 121 | RESET processing: connection "road-eastnet-nonat-121" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.281 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 121 time elapsed 0.000608 seconds | (#121) spent 0.611 milliseconds in crypto helper computing work-order 121: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 121 for state #121 to event queue | scheduling resume sending helper answer for #121 | libevent_malloc: new ptr-libevent@0x7f49bc025638 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 121 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #121 | **emit ISAKMP Message: | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | ikev2 g^x 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | ikev2 g^x fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | ikev2 g^x d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | ikev2 g^x 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ikev2 g^x ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | ikev2 g^x b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | ikev2 g^x f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | ikev2 g^x e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | ikev2 g^x f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | ikev2 g^x bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | ikev2 g^x 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | ikev2 g^x d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | ikev2 g^x e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | ikev2 g^x 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | ikev2 g^x 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a 81 8d 9b 49 | IKEv2 nonce 27 70 18 bd 47 8a 11 70 ea 84 a0 17 a2 66 a6 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c7 07 8c 48 fb 09 4e e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 79 | natd_hash: port=500 | natd_hash: hash= 22 2c e0 b3 93 f1 25 a6 93 90 b8 da a2 47 88 0b | natd_hash: hash= af a3 16 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 22 2c e0 b3 93 f1 25 a6 93 90 b8 da a2 47 88 0b | Notify data af a3 16 5d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c7 07 8c 48 fb 09 4e e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | natd_hash: hash= c9 b6 65 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | Notify data c9 b6 65 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #121 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #121: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #121 to 4294967295 after switching state | Message ID: IKE #121 skipping update_recv as MD is fake | Message ID: sent #121 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.121:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | state #121 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9aca68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #121 | libevent_malloc: new ptr-libevent@0x55564da33868 size 128 | #121 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.92991 | resume sending helper answer for #121 suppresed complete_v2_state_transition() and stole MD | #121 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc025638 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.932079; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #113 | libevent_malloc: new ptr-libevent@0x7f49bc025638 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x55564da26698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #113 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10583.973329; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #91 | libevent_malloc: new ptr-libevent@0x55564da26698 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #91 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10583.98162; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #1 spent 0.0971 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10583.983884; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #106 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x55564d9ae1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #106 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-122' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #122 at 0x55564da32c98 | State DB: adding IKEv2 state #122 in UNDEFINED | pstats #122 ikev2.ike started | Message ID: init #122: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #122: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #122; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-122" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-122" IKE SA #122 "road-eastnet-nonat-122" "road-eastnet-nonat-122" #122: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-122 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-122": constructed local IKE proposals for road-eastnet-nonat-122 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 122 for state #122 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a2698 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #122 | libevent_malloc: new ptr-libevent@0x55564d9ae1e8 size 128 | #122 spent 0.16 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 122 for state #122 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 122 | RESET processing: connection "road-eastnet-nonat-122" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.247 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 122 time elapsed 0.000761 seconds | (#122) spent 0.766 milliseconds in crypto helper computing work-order 122: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 122 for state #122 to event queue | scheduling resume sending helper answer for #122 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 122 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #122 | **emit ISAKMP Message: | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | ikev2 g^x 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | ikev2 g^x 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | ikev2 g^x e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | ikev2 g^x 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | ikev2 g^x f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | ikev2 g^x 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | ikev2 g^x c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | ikev2 g^x cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ikev2 g^x ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | ikev2 g^x b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | ikev2 g^x 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | ikev2 g^x 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | ikev2 g^x 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | ikev2 g^x 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | ikev2 g^x 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e1 e7 a3 55 96 da ef 77 72 8a 37 84 e4 b2 d1 21 | IKEv2 nonce 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 8f b4 94 69 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= af 13 20 da 99 29 93 71 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7a | natd_hash: port=500 | natd_hash: hash= 88 5a cd 62 d3 ce c7 70 db b8 05 85 38 62 25 2f | natd_hash: hash= b1 c5 71 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 5a cd 62 d3 ce c7 70 db b8 05 85 38 62 25 2f | Notify data b1 c5 71 2c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= af 13 20 da 99 29 93 71 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | natd_hash: hash= e5 9e 89 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | Notify data e5 9e 89 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #122 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #122: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #122 to 4294967295 after switching state | Message ID: IKE #122 skipping update_recv as MD is fake | Message ID: sent #122 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.122:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | state #122 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ae1e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a2698 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #122 | libevent_malloc: new ptr-libevent@0x55564da34f78 size 128 | #122 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10583.991156 | resume sending helper answer for #122 suppresed complete_v2_state_transition() and stole MD | #122 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b40254e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10583.991307; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #114 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #114 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10583.999674; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #62 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x55564d9d2548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #62 spent 0.0981 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.04298; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #107 | libevent_malloc: new ptr-libevent@0x55564d9d2548 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #107 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.051309; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #115 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x55564da295b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #115 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-123' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #123 at 0x55564da343a8 | State DB: adding IKEv2 state #123 in UNDEFINED | pstats #123 ikev2.ike started | Message ID: init #123: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #123: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #123; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-123" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-123" IKE SA #123 "road-eastnet-nonat-123" "road-eastnet-nonat-123" #123: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-123 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-123": constructed local IKE proposals for road-eastnet-nonat-123 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 123 for state #123 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9af988 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #123 | libevent_malloc: new ptr-libevent@0x55564da295b8 size 128 | #123 spent 0.164 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 123 for state #123 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 123 | RESET processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-123" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 123 time elapsed 0.001253 seconds | (#123) spent 1.26 milliseconds in crypto helper computing work-order 123: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 123 for state #123 to event queue | scheduling resume sending helper answer for #123 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 | libevent_realloc: release ptr-libevent@0x7f4978014c98 | libevent_realloc: new ptr-libevent@0x7f49b8028068 size 2048 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 123 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #123 | **emit ISAKMP Message: | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | ikev2 g^x 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | ikev2 g^x 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | ikev2 g^x c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | ikev2 g^x e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | ikev2 g^x 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | ikev2 g^x d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | ikev2 g^x f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | ikev2 g^x 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ikev2 g^x ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | ikev2 g^x dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | ikev2 g^x 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | ikev2 g^x 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | ikev2 g^x f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | ikev2 g^x 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | ikev2 g^x 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 92 3d 45 fd | IKEv2 nonce f0 27 43 64 2a e7 5d ce 08 d1 73 7a a3 0c b2 55 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fa 40 2f bb ea 9f a9 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7b | natd_hash: port=500 | natd_hash: hash= db b4 64 b2 67 9a 53 d4 4e cd fa 4c 8c ec ef f7 | natd_hash: hash= ec 15 da 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db b4 64 b2 67 9a 53 d4 4e cd fa 4c 8c ec ef f7 | Notify data ec 15 da 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fa 40 2f bb ea 9f a9 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | natd_hash: hash= 60 cf 1c 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | Notify data 60 cf 1c 2d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #123 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #123: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #123 to 4294967295 after switching state | Message ID: IKE #123 skipping update_recv as MD is fake | Message ID: sent #123 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.123:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | state #123 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da295b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9af988 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #123 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 | #123 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.055277 | resume sending helper answer for #123 suppresed complete_v2_state_transition() and stole MD | #123 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8025658 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.055391; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #92 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x7f4974017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #92 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.087733; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002711 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #63 | libevent_malloc: new ptr-libevent@0x7f4974017af8 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #63 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.102094; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #2 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x7f49b8014d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #2 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.104363; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001679 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #108 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #108 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.111676; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #116 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x55564da2ac88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #116 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0801 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-124' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #124 at 0x55564da35ab8 | State DB: adding IKEv2 state #124 in UNDEFINED | pstats #124 ikev2.ike started | Message ID: init #124: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #124: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #124; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-124" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-124" IKE SA #124 "road-eastnet-nonat-124" "road-eastnet-nonat-124" #124: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-124 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-124": constructed local IKE proposals for road-eastnet-nonat-124 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 124 for state #124 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07dd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #124 | libevent_malloc: new ptr-libevent@0x55564da2ac88 size 128 | #124 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | RESET processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-124" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 5 starting work-order 124 for state #124 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 124 | spent 0.262 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 124 time elapsed 0.00098 seconds | (#124) spent 0.978 milliseconds in crypto helper computing work-order 124: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 124 for state #124 to event queue | scheduling resume sending helper answer for #124 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 124 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #124 | **emit ISAKMP Message: | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | ikev2 g^x 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | ikev2 g^x a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | ikev2 g^x a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | ikev2 g^x 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | ikev2 g^x f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | ikev2 g^x 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | ikev2 g^x d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | ikev2 g^x 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | ikev2 g^x 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | ikev2 g^x 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | ikev2 g^x 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | ikev2 g^x 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | ikev2 g^x 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | ikev2 g^x 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | ikev2 g^x f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e4 d7 a9 43 55 71 87 81 d6 00 59 90 70 58 a3 45 | IKEv2 nonce 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc 5c cd ed 72 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 67 23 a2 c9 f1 2b d1 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7c | natd_hash: port=500 | natd_hash: hash= 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 73 26 b6 36 | natd_hash: hash= 6b 45 e1 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 73 26 b6 36 | Notify data 6b 45 e1 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 67 23 a2 c9 f1 2b d1 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | natd_hash: hash= 43 d7 58 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | Notify data 43 d7 58 d3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #124 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #124: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #124 to 4294967295 after switching state | Message ID: IKE #124 skipping update_recv as MD is fake | Message ID: sent #124 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.124:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | state #124 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da2ac88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07dd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #124 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 | #124 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.117054 | resume sending helper answer for #124 suppresed complete_v2_state_transition() and stole MD | #124 spent 0.342 milliseconds in resume sending helper answer | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac028338 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.147244; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001571 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #93 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x55564da14ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #93 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.154622; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #64 | libevent_malloc: new ptr-libevent@0x55564da14ec8 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #64 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.163916; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #109 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #109 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.164056; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #3 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x7f49ac017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #3 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.169319; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500458 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #117 | libevent_malloc: new ptr-libevent@0x7f49ac017a48 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x55564da2c428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #117 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-125' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #125 at 0x55564da371c8 | State DB: adding IKEv2 state #125 in UNDEFINED | pstats #125 ikev2.ike started | Message ID: init #125: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #125: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #125; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-125" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-125" IKE SA #125 "road-eastnet-nonat-125" "road-eastnet-nonat-125" #125: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-125 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-125": constructed local IKE proposals for road-eastnet-nonat-125 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 125 for state #125 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #125 | libevent_malloc: new ptr-libevent@0x55564da2c428 size 128 | crypto helper 6 resuming | #125 spent 0.126 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-125" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.205 milliseconds in whack | crypto helper 6 starting work-order 125 for state #125 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 125 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 125 time elapsed 0.000574 seconds | (#125) spent 0.579 milliseconds in crypto helper computing work-order 125: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 125 for state #125 to event queue | scheduling resume sending helper answer for #125 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 125 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #125 | **emit ISAKMP Message: | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | ikev2 g^x fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | ikev2 g^x 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | ikev2 g^x 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | ikev2 g^x 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | ikev2 g^x db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | ikev2 g^x b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | ikev2 g^x 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | ikev2 g^x a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | ikev2 g^x 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | ikev2 g^x 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | ikev2 g^x df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | ikev2 g^x 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | ikev2 g^x e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | ikev2 g^x 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | ikev2 g^x df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d7 aa bf ca c0 89 e8 b0 60 66 02 ce 7e 1e 62 ea | IKEv2 nonce 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e e6 73 fe 94 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a 06 77 83 6a 55 d5 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7d | natd_hash: port=500 | natd_hash: hash= 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd 4b 07 a4 ff | natd_hash: hash= 46 1d d2 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd 4b 07 a4 ff | Notify data 46 1d d2 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a 06 77 83 6a 55 d5 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | natd_hash: hash= 28 0a 5f 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | Notify data 28 0a 5f 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #125 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #125: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #125 to 4294967295 after switching state | Message ID: IKE #125 skipping update_recv as MD is fake | Message ID: sent #125 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.125:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | state #125 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da2c428 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #125 | libevent_malloc: new ptr-libevent@0x55564da37cb8 size 128 | #125 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.175725 | resume sending helper answer for #125 suppresed complete_v2_state_transition() and stole MD | #125 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b00282c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.212951; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002852 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #65 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #65 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.223298; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x7f49b0017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #4 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0898 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-126' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #126 at 0x55564da388d8 | State DB: adding IKEv2 state #126 in UNDEFINED | pstats #126 ikev2.ike started | Message ID: init #126: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #126: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #126; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-126" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-126" IKE SA #126 "road-eastnet-nonat-126" "road-eastnet-nonat-126" #126: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-126 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-126": constructed local IKE proposals for road-eastnet-nonat-126 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 126 for state #126 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9df728 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #126 | libevent_malloc: new ptr-libevent@0x7f49b0017af8 size 128 | #126 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 126 for state #126 | RESET processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 126 | RESET processing: connection "road-eastnet-nonat-126" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.219 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 126 time elapsed 0.001059 seconds | (#126) spent 1.06 milliseconds in crypto helper computing work-order 126: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 126 for state #126 to event queue | scheduling resume sending helper answer for #126 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 126 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #126 | **emit ISAKMP Message: | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | ikev2 g^x f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | ikev2 g^x e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | ikev2 g^x a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | ikev2 g^x 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | ikev2 g^x a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | ikev2 g^x 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | ikev2 g^x 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | ikev2 g^x e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | ikev2 g^x 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | ikev2 g^x aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | ikev2 g^x 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | ikev2 g^x 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | ikev2 g^x b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ikev2 g^x ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | ikev2 g^x 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 5b f7 6d de 71 f1 ab 7e 1f db 19 53 76 f7 18 | IKEv2 nonce 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e 1d 2d 20 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 44 bf 8b 50 2a d2 c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7e | natd_hash: port=500 | natd_hash: hash= d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab 29 c2 0b 37 | natd_hash: hash= 93 59 83 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab 29 c2 0b 37 | Notify data 93 59 83 0c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 44 bf 8b 50 2a d2 c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | natd_hash: hash= e9 aa 46 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | Notify data e9 aa 46 6e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #126 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #126: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #126 to 4294967295 after switching state | Message ID: IKE #126 skipping update_recv as MD is fake | Message ID: sent #126 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.126:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | state #126 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0017af8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9df728 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #126 | libevent_malloc: new ptr-libevent@0x55564da39438 size 128 | #126 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.237012 | resume sending helper answer for #126 suppresed complete_v2_state_transition() and stole MD | #126 spent 0.351 milliseconds in resume sending helper answer | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40282d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.237098; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #110 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #110 spent 0.0713 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.238309; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #94 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #94 spent 0.0771 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.24955; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #118 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x55564da2daf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #118 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.276807; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #66 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #66 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.287153; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x55564d9d99e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #5 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-127' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #127 at 0x55564da3a0e8 | State DB: adding IKEv2 state #127 in UNDEFINED | pstats #127 ikev2.ike started | Message ID: init #127: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #127: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #127; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-127" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-127" IKE SA #127 "road-eastnet-nonat-127" "road-eastnet-nonat-127" #127: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-127 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-127": constructed local IKE proposals for road-eastnet-nonat-127 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 127 for state #127 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c2608 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564d9d99e8 size 128 | #127 spent 0.163 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | crypto helper 8 starting work-order 127 for state #127 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 127 | RESET processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-127" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.266 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 127 time elapsed 0.000678 seconds | (#127) spent 0.674 milliseconds in crypto helper computing work-order 127: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 127 for state #127 to event queue | scheduling resume sending helper answer for #127 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 127 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #127 | **emit ISAKMP Message: | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | ikev2 g^x 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | ikev2 g^x e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | ikev2 g^x 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | ikev2 g^x 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | ikev2 g^x a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | ikev2 g^x 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | ikev2 g^x bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | ikev2 g^x 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | ikev2 g^x 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | ikev2 g^x 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | ikev2 g^x 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | ikev2 g^x f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | ikev2 g^x 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | ikev2 g^x 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ikev2 g^x ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 46 68 28 ab | IKEv2 nonce 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b 84 05 ec 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 14 d3 1a ec 60 6d 7d 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7f | natd_hash: port=500 | natd_hash: hash= 3d 64 8c 3c 76 61 54 71 0f cf 19 eb 56 62 18 23 | natd_hash: hash= 1f 8b e8 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 64 8c 3c 76 61 54 71 0f cf 19 eb 56 62 18 23 | Notify data 1f 8b e8 4e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 14 d3 1a ec 60 6d 7d 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | natd_hash: hash= 94 5a 9f 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | Notify data 94 5a 9f 13 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #127 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #127: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #127 to 4294967295 after switching state | Message ID: IKE #127 skipping update_recv as MD is fake | Message ID: sent #127 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.127:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | state #127 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9d99e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c2608 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564da39558 size 128 | #127 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.295466 | resume sending helper answer for #127 suppresed complete_v2_state_transition() and stole MD | #127 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8028468 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.310672; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #119 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x55564da309d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #119 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.314011; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #111 | libevent_malloc: new ptr-libevent@0x55564da309d8 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #111 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.316296; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #95 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #95 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.334608; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003456 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #67 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #67 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.347895; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #6 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x7f49a8017b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #6 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-128' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #128 at 0x55564da3b748 | State DB: adding IKEv2 state #128 in UNDEFINED | pstats #128 ikev2.ike started | Message ID: init #128: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #128: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #128; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-128" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-128" IKE SA #128 "road-eastnet-nonat-128" "road-eastnet-nonat-128" #128: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-128 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-128": constructed local IKE proposals for road-eastnet-nonat-128 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 128 for state #128 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9e3b38 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #128 | libevent_malloc: new ptr-libevent@0x7f49a8017b18 size 128 | #128 spent 0.149 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | RESET processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-128" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 9 starting work-order 128 for state #128 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 128 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 128 time elapsed 0.000556 seconds | (#128) spent 0.554 milliseconds in crypto helper computing work-order 128: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 128 for state #128 to event queue | scheduling resume sending helper answer for #128 | libevent_malloc: new ptr-libevent@0x7f499c0282d8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 128 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #128 | **emit ISAKMP Message: | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | ikev2 g^x 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | ikev2 g^x d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | ikev2 g^x 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | ikev2 g^x 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | ikev2 g^x bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | ikev2 g^x e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | ikev2 g^x cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | ikev2 g^x f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | ikev2 g^x 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | ikev2 g^x 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | ikev2 g^x e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | ikev2 g^x 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | ikev2 g^x 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | ikev2 g^x 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | ikev2 g^x 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a 9d ac ca af 5d 8c 94 33 89 45 16 27 bd b5 b8 | IKEv2 nonce 81 72 3d 90 32 e5 48 1c d1 0b 87 9c e1 02 b2 fa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fc 37 b6 51 0d 33 e3 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 80 | natd_hash: port=500 | natd_hash: hash= 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 42 a7 6f c9 | natd_hash: hash= 11 76 5b d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 42 a7 6f c9 | Notify data 11 76 5b d3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fc 37 b6 51 0d 33 e3 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | natd_hash: hash= eb b8 f6 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | Notify data eb b8 f6 64 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #128 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #128: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #128 to 4294967295 after switching state | Message ID: IKE #128 skipping update_recv as MD is fake | Message ID: sent #128 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.128:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | state #128 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8017b18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9e3b38 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #128 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 | #128 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.355743 | resume sending helper answer for #128 suppresed complete_v2_state_transition() and stole MD | #128 spent 0.373 milliseconds in resume sending helper answer | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0282d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.37096; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #120 | libevent_malloc: new ptr-libevent@0x7f499c0282d8 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x55564da32158 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #120 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.372338; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #112 | libevent_malloc: new ptr-libevent@0x55564da32158 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #112 spent 0.0865 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.375672; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #96 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #96 spent 0.0849 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.397948; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #68 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x55564da067a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #68 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.407349; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #7 | libevent_malloc: new ptr-libevent@0x55564da067a8 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x55564d9dc878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #7 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-129' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #129 at 0x55564da3cda8 | State DB: adding IKEv2 state #129 in UNDEFINED | pstats #129 ikev2.ike started | Message ID: init #129: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #129: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #129; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-129" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-129" IKE SA #129 "road-eastnet-nonat-129" "road-eastnet-nonat-129" #129: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-129 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-129": constructed local IKE proposals for road-eastnet-nonat-129 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 129 for state #129 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49840058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #129 | libevent_malloc: new ptr-libevent@0x55564d9dc878 size 128 | crypto helper 10 resuming | #129 spent 0.163 milliseconds in ikev2_parent_outI1() | crypto helper 10 starting work-order 129 for state #129 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 129 | RESET processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-129" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.256 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 129 time elapsed 0.000723 seconds | (#129) spent 0.729 milliseconds in crypto helper computing work-order 129: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 129 for state #129 to event queue | scheduling resume sending helper answer for #129 | libevent_malloc: new ptr-libevent@0x7f49a0028218 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 129 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #129 | **emit ISAKMP Message: | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | ikev2 g^x 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | ikev2 g^x 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | ikev2 g^x 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | ikev2 g^x 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | ikev2 g^x bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | ikev2 g^x 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | ikev2 g^x 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ikev2 g^x ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | ikev2 g^x 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | ikev2 g^x 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | ikev2 g^x 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | ikev2 g^x 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | ikev2 g^x 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | ikev2 g^x 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | ikev2 g^x 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 fc c9 85 9e | IKEv2 nonce ae 22 29 84 d5 a6 d7 69 88 0f 3a eb e0 fa 73 f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d9 e0 f7 ef b9 f7 59 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 81 | natd_hash: port=500 | natd_hash: hash= db 46 57 27 71 07 3c ba 24 4b 56 b3 bd e0 0f 4c | natd_hash: hash= 18 7c 5e 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 46 57 27 71 07 3c ba 24 4b 56 b3 bd e0 0f 4c | Notify data 18 7c 5e 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d9 e0 f7 ef b9 f7 59 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | natd_hash: hash= 9f e9 8a ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | Notify data 9f e9 8a ff | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #129 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #129: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #129 to 4294967295 after switching state | Message ID: IKE #129 skipping update_recv as MD is fake | Message ID: sent #129 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.129:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | state #129 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9dc878 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49840058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #129 | libevent_malloc: new ptr-libevent@0x55564da3f0f8 size 128 | #129 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.417141 | resume sending helper answer for #129 suppresed complete_v2_state_transition() and stole MD | #129 spent 0.416 milliseconds in resume sending helper answer | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0028218 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0779 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.430374; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #121 | libevent_malloc: new ptr-libevent@0x7f49a0028218 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x55564da33868 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #121 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.43382; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #113 | libevent_malloc: new ptr-libevent@0x55564da33868 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x7f49bc025638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #113 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.438202; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f49bc025638 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #97 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.454641; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #69 spent 0.237 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0936 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.474227; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #8 spent 0.378 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.136 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.491968; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #122 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x55564da34f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #122 spent 0.543 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.492622; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001517 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #114 | libevent_malloc: new ptr-libevent@0x55564da34f78 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #114 spent 0.46 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.29 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.251 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.499936; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #98 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #98 spent 0.466 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-130' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #130 at 0x55564da3e4b8 | State DB: adding IKEv2 state #130 in UNDEFINED | pstats #130 ikev2.ike started | Message ID: init #130: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #130: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #130; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-130" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-130" IKE SA #130 "road-eastnet-nonat-130" "road-eastnet-nonat-130" #130: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-130 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-130": constructed local IKE proposals for road-eastnet-nonat-130 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 130 for state #130 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da27da8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 | #130 spent 0.546 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-130" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.779 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.262 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 11 resuming | crypto helper 11 starting work-order 130 for state #130 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 130 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 130 time elapsed 0.003561 seconds | (#130) spent 3.56 milliseconds in crypto helper computing work-order 130: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 130 for state #130 to event queue | scheduling resume sending helper answer for #130 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 130 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #130 | **emit ISAKMP Message: | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | ikev2 g^x 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | ikev2 g^x 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | ikev2 g^x 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | ikev2 g^x 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | ikev2 g^x bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | ikev2 g^x 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | ikev2 g^x a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | ikev2 g^x 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | ikev2 g^x eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | ikev2 g^x 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | ikev2 g^x 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | ikev2 g^x 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | ikev2 g^x 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | ikev2 g^x f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | ikev2 g^x e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 76 df e9 fc | IKEv2 nonce 11 9a a9 12 06 65 60 5a d8 47 d2 ea 4e 2f ed 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a1 7f 38 ad bb 20 81 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 82 | natd_hash: port=500 | natd_hash: hash= 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c ba ad 94 75 | natd_hash: hash= de cb ac d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c ba ad 94 75 | Notify data de cb ac d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a1 7f 38 ad bb 20 81 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | natd_hash: hash= 15 c4 d5 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | Notify data 15 c4 d5 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #130 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #130: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #130 to 4294967295 after switching state | Message ID: IKE #130 skipping update_recv as MD is fake | Message ID: sent #130 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.130:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | state #130 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da27da8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #130 | libevent_malloc: new ptr-libevent@0x55564da40808 size 128 | #130 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.508297 | resume sending helper answer for #130 suppresed complete_v2_state_transition() and stole MD | #130 spent 2.51 milliseconds in resume sending helper answer | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994028448 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.292 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.516042; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #70 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #70 spent 0.621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.32 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.536258; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #9 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x7f4994017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #9 spent 0.618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.55247; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #115 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #115 spent 0.617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.306 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.555651; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #123 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #123 spent 0.566 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.287 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.559729; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003146 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #99 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x7f4988022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #99 spent 0.518 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.309 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.574935; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #71 | libevent_malloc: new ptr-libevent@0x7f4988022a68 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #71 spent 0.376 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.597697; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #10 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x55564d9ddf98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #10 spent 0.319 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.12 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-131' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #131 at 0x55564da3fc38 | State DB: adding IKEv2 state #131 in UNDEFINED | pstats #131 ikev2.ike started | Message ID: init #131: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #131: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #131; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-131" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-131" IKE SA #131 "road-eastnet-nonat-131" "road-eastnet-nonat-131" #131: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-131 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-131": constructed local IKE proposals for road-eastnet-nonat-131 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 131 for state #131 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8328 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #131 | libevent_malloc: new ptr-libevent@0x55564d9ddf98 size 128 | #131 spent 0.195 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 131 for state #131 | RESET processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-131" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 131 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.328 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 131 time elapsed 0.001249 seconds | (#131) spent 1.25 milliseconds in crypto helper computing work-order 131: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 131 for state #131 to event queue | scheduling resume sending helper answer for #131 | libevent_malloc: new ptr-libevent@0x7f4998028338 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 131 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #131 | **emit ISAKMP Message: | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | ikev2 g^x f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | ikev2 g^x 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ikev2 g^x ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | ikev2 g^x dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | ikev2 g^x 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | ikev2 g^x 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | ikev2 g^x 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | ikev2 g^x 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ikev2 g^x ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | ikev2 g^x f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | ikev2 g^x bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | ikev2 g^x be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | ikev2 g^x 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | ikev2 g^x 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | ikev2 g^x 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 95 05 21 aa d0 59 0b 00 be d1 87 1f f8 36 6e cc | IKEv2 nonce 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 b0 55 c5 5c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ae b0 18 7b 78 d7 18 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 83 | natd_hash: port=500 | natd_hash: hash= 19 41 39 35 f5 8a dc 56 31 9c 97 97 8b f2 70 eb | natd_hash: hash= 80 6c 06 a1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 41 39 35 f5 8a dc 56 31 9c 97 97 8b f2 70 eb | Notify data 80 6c 06 a1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ae b0 18 7b 78 d7 18 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | natd_hash: hash= 9d 5f 9b f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | Notify data 9d 5f 9b f7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #131 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #131: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #131 to 4294967295 after switching state | Message ID: IKE #131 skipping update_recv as MD is fake | Message ID: sent #131 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.131:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | state #131 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ddf98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8328 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #131 | libevent_malloc: new ptr-libevent@0x55564da41f18 size 128 | #131 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.601075 | resume sending helper answer for #131 suppresed complete_v2_state_transition() and stole MD | #131 spent 0.761 milliseconds in resume sending helper answer | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998028338 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0753 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.612329; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #116 | libevent_malloc: new ptr-libevent@0x7f4998028338 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #116 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0985 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.617805; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #124 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #124 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.618082; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #100 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #100 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.633464; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #72 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.658813; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #11 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x55564d9e0df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #11 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-132' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #132 at 0x55564da41348 | State DB: adding IKEv2 state #132 in UNDEFINED | pstats #132 ikev2.ike started | Message ID: init #132: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #132: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #132; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-132" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-132" IKE SA #132 "road-eastnet-nonat-132" "road-eastnet-nonat-132" #132: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-132 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-132": constructed local IKE proposals for road-eastnet-nonat-132 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 132 for state #132 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8398 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #132 | libevent_malloc: new ptr-libevent@0x55564d9e0df8 size 128 | #132 spent 0.174 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-132" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | crypto helper 13 starting work-order 132 for state #132 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 132 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 132 time elapsed 0.00091 seconds | (#132) spent 0.907 milliseconds in crypto helper computing work-order 132: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 132 for state #132 to event queue | scheduling resume sending helper answer for #132 | libevent_malloc: new ptr-libevent@0x7f498c0282d8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 132 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #132 | **emit ISAKMP Message: | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | ikev2 g^x 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | ikev2 g^x c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | ikev2 g^x 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | ikev2 g^x 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | ikev2 g^x 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | ikev2 g^x c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | ikev2 g^x b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | ikev2 g^x c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | ikev2 g^x 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | ikev2 g^x 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | ikev2 g^x 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | ikev2 g^x fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ikev2 g^x ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | ikev2 g^x c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | ikev2 g^x d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 06 8d 37 14 13 3e 89 9b 87 7a 46 aa 54 34 a4 5c | IKEv2 nonce 23 03 5c 46 55 dd 9f ed d2 05 29 8b 9a f5 5f 2b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 2d 09 28 84 0e f2 e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 84 | natd_hash: port=500 | natd_hash: hash= 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 5f d2 73 fd | natd_hash: hash= 2e 89 bc ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 5f d2 73 fd | Notify data 2e 89 bc ef | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 2d 09 28 84 0e f2 e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | natd_hash: hash= 99 b6 79 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | Notify data 99 b6 79 34 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #132 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #132: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #132 to 4294967295 after switching state | Message ID: IKE #132 skipping update_recv as MD is fake | Message ID: sent #132 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.132:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | state #132 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9e0df8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8398 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #132 | libevent_malloc: new ptr-libevent@0x55564da43628 size 128 | #132 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.662829 | resume sending helper answer for #132 suppresed complete_v2_state_transition() and stole MD | #132 spent 0.52 milliseconds in resume sending helper answer | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c0282d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0801 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.670055; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #117 | libevent_malloc: new ptr-libevent@0x7f498c0282d8 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x7f49ac017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #117 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.676396; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500671 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #125 | libevent_malloc: new ptr-libevent@0x7f49ac017a48 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x55564da37cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #125 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0792 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.678813; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #101 | libevent_malloc: new ptr-libevent@0x55564da37cb8 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x7f4980022a58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #101 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.693146; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #73 | libevent_malloc: new ptr-libevent@0x7f4980022a58 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #73 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0815 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.716545; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #12 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x55564d9e2508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #12 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0921 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-133' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #133 at 0x55564da42a58 | State DB: adding IKEv2 state #133 in UNDEFINED | pstats #133 ikev2.ike started | Message ID: init #133: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #133: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #133; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-133" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-133" IKE SA #133 "road-eastnet-nonat-133" "road-eastnet-nonat-133" #133: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-133 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-133": constructed local IKE proposals for road-eastnet-nonat-133 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 133 for state #133 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9bf708 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #133 | libevent_malloc: new ptr-libevent@0x55564d9e2508 size 128 | #133 spent 0.195 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | RESET processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 starting work-order 133 for state #133 | RESET processing: connection "road-eastnet-nonat-133" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 133 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.315 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 133 time elapsed 0.000889 seconds | (#133) spent 0.895 milliseconds in crypto helper computing work-order 133: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 133 for state #133 to event queue | scheduling resume sending helper answer for #133 | libevent_malloc: new ptr-libevent@0x7f4990028278 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 133 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #133 | **emit ISAKMP Message: | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | ikev2 g^x 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | ikev2 g^x 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | ikev2 g^x 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | ikev2 g^x 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | ikev2 g^x 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | ikev2 g^x 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | ikev2 g^x b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ikev2 g^x ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | ikev2 g^x e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | ikev2 g^x a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | ikev2 g^x fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | ikev2 g^x 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | ikev2 g^x a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ikev2 g^x ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | ikev2 g^x d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 12 d9 32 56 80 16 97 13 19 34 2c ea 44 9b f2 d0 | IKEv2 nonce 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 75 ac 56 e0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d4 b3 c7 eb 34 d0 45 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 85 | natd_hash: port=500 | natd_hash: hash= 92 17 e9 2a ba d6 aa 38 6e ce c1 3f 31 50 d4 32 | natd_hash: hash= 34 55 9c 79 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 17 e9 2a ba d6 aa 38 6e ce c1 3f 31 50 d4 32 | Notify data 34 55 9c 79 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d4 b3 c7 eb 34 d0 45 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | natd_hash: hash= 8d df 82 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | Notify data 8d df 82 12 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #133 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #133: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #133 to 4294967295 after switching state | Message ID: IKE #133 skipping update_recv as MD is fake | Message ID: sent #133 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.133:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | state #133 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9e2508 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9bf708 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #133 | libevent_malloc: new ptr-libevent@0x55564da44d38 size 128 | #133 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.72534 | resume sending helper answer for #133 suppresed complete_v2_state_transition() and stole MD | #133 spent 0.445 milliseconds in resume sending helper answer | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990028278 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.737558; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #126 | libevent_malloc: new ptr-libevent@0x7f4990028278 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x55564da39438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #126 spent 0.2 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.737804; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #102 | libevent_malloc: new ptr-libevent@0x55564da39438 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #102 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0903 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0839 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.750273; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #118 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #118 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.768603; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #74 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #74 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.775963; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004278 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x55564d9e3c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #13 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-134' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #134 at 0x55564da44168 | State DB: adding IKEv2 state #134 in UNDEFINED | pstats #134 ikev2.ike started | Message ID: init #134: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #134: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #134; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-134" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-134" IKE SA #134 "road-eastnet-nonat-134" "road-eastnet-nonat-134" #134: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-134 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-134": constructed local IKE proposals for road-eastnet-nonat-134 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 134 for state #134 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #134 | libevent_malloc: new ptr-libevent@0x55564d9e3c18 size 128 | #134 spent 0.195 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 134 for state #134 | RESET processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-134" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.315 milliseconds in whack | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 134 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 134 time elapsed 0.000927 seconds | (#134) spent 0.921 milliseconds in crypto helper computing work-order 134: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 134 for state #134 to event queue | scheduling resume sending helper answer for #134 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 134 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #134 | **emit ISAKMP Message: | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | ikev2 g^x d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | ikev2 g^x 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | ikev2 g^x 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | ikev2 g^x 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | ikev2 g^x e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | ikev2 g^x a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | ikev2 g^x 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | ikev2 g^x 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | ikev2 g^x de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | ikev2 g^x 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | ikev2 g^x d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | ikev2 g^x 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | ikev2 g^x d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | ikev2 g^x 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | ikev2 g^x 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a 5f 4c a2 18 | IKEv2 nonce b7 c6 87 f8 33 01 19 2f df 37 29 ff 6c f0 ed 77 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf 01 b6 be 4a 8d 80 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 86 | natd_hash: port=500 | natd_hash: hash= f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b 6f b2 a6 bf | natd_hash: hash= 1e 7a 0f 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b 6f b2 a6 bf | Notify data 1e 7a 0f 57 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf 01 b6 be 4a 8d 80 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | natd_hash: hash= 13 d3 b9 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | Notify data 13 d3 b9 00 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #134 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #134: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #134 to 4294967295 after switching state | Message ID: IKE #134 skipping update_recv as MD is fake | Message ID: sent #134 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.134:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | state #134 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9e3c18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #134 | libevent_malloc: new ptr-libevent@0x55564da46448 size 128 | #134 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.787754 | resume sending helper answer for #134 suppresed complete_v2_state_transition() and stole MD | #134 spent 0.625 milliseconds in resume sending helper answer | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984022a68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.08 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.796006; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #127 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x55564da39558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #127 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0813 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.800408; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002201 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #103 | libevent_malloc: new ptr-libevent@0x55564da39558 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x7f49bc01a5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #103 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.811731; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #119 | libevent_malloc: new ptr-libevent@0x7f49bc01a5b8 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x7f49a8028468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #119 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0501 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.825058; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #75 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x55564da0c408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #75 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.836417; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #14 | libevent_malloc: new ptr-libevent@0x55564da0c408 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x55564d9e5328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #14 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-135' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #135 at 0x55564da45878 | State DB: adding IKEv2 state #135 in UNDEFINED | pstats #135 ikev2.ike started | Message ID: init #135: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #135: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #135; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-135" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-135" IKE SA #135 "road-eastnet-nonat-135" "road-eastnet-nonat-135" #135: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-135 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-135": constructed local IKE proposals for road-eastnet-nonat-135 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 135 for state #135 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #135 | libevent_malloc: new ptr-libevent@0x55564d9e5328 size 128 | #135 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 135 for state #135 | RESET processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-135" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 135 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.201 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 135 time elapsed 0.000627 seconds | (#135) spent 0.61 milliseconds in crypto helper computing work-order 135: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 135 for state #135 to event queue | scheduling resume sending helper answer for #135 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 135 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #135 | **emit ISAKMP Message: | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | ikev2 g^x 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | ikev2 g^x af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | ikev2 g^x a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | ikev2 g^x 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | ikev2 g^x b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | ikev2 g^x 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | ikev2 g^x 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | ikev2 g^x 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ikev2 g^x ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | ikev2 g^x 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | ikev2 g^x 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | ikev2 g^x f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | ikev2 g^x 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | ikev2 g^x 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | ikev2 g^x 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 9f fc 6a 7d | IKEv2 nonce 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 97 95 10 c8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 28 92 9a 5b a0 29 ec a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 87 | natd_hash: port=500 | natd_hash: hash= df ca d6 43 86 db ca 9d a2 3e 9e 55 4e d1 ba 07 | natd_hash: hash= 33 61 23 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df ca d6 43 86 db ca 9d a2 3e 9e 55 4e d1 ba 07 | Notify data 33 61 23 9e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 28 92 9a 5b a0 29 ec a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | natd_hash: hash= 5b 4d e0 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | Notify data 5b 4d e0 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #135 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #135: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #135 to 4294967295 after switching state | Message ID: IKE #135 skipping update_recv as MD is fake | Message ID: sent #135 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.135:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | state #135 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9e5328 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #135 | libevent_malloc: new ptr-libevent@0x55564da47b58 size 128 | #135 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.846616 | resume sending helper answer for #135 suppresed complete_v2_state_transition() and stole MD | #135 spent 0.357 milliseconds in resume sending helper answer | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49880282d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.856841; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #128 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #128 spent 0.0974 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.866119; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #104 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x7f498c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #104 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.873404; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002581 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #120 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x7f499c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #120 spent 0.0861 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.896666; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #15 | libevent_malloc: new ptr-libevent@0x7f499c0282d8 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x55564d9e5248 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #15 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-136' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #136 at 0x55564da46f88 | State DB: adding IKEv2 state #136 in UNDEFINED | pstats #136 ikev2.ike started | Message ID: init #136: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #136: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #136; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-136" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-136" IKE SA #136 "road-eastnet-nonat-136" "road-eastnet-nonat-136" #136: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-136 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-136": constructed local IKE proposals for road-eastnet-nonat-136 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 136 for state #136 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #136 | libevent_malloc: new ptr-libevent@0x55564d9e5248 size 128 | #136 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-136" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 136 for state #136 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 136 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.327 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 136 time elapsed 0.000845 seconds | (#136) spent 0.848 milliseconds in crypto helper computing work-order 136: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 136 for state #136 to event queue | scheduling resume sending helper answer for #136 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 136 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #136 | **emit ISAKMP Message: | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | ikev2 g^x 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | ikev2 g^x b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | ikev2 g^x bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | ikev2 g^x 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | ikev2 g^x bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | ikev2 g^x af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | ikev2 g^x be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | ikev2 g^x d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | ikev2 g^x 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | ikev2 g^x 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | ikev2 g^x 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | ikev2 g^x f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | ikev2 g^x 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | ikev2 g^x d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | ikev2 g^x 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d8 40 b3 ce 11 65 7c c2 22 af b8 58 cd 06 fa 5e | IKEv2 nonce 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 3e 54 12 dc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 22 fb 8f c9 eb d0 6c 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 88 | natd_hash: port=500 | natd_hash: hash= e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b c3 25 78 95 | natd_hash: hash= bd 26 4b 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b c3 25 78 95 | Notify data bd 26 4b 43 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 22 fb 8f c9 eb d0 6c 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | natd_hash: hash= 50 6c e5 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | Notify data 50 6c e5 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #136 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #136: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #136 to 4294967295 after switching state | Message ID: IKE #136 skipping update_recv as MD is fake | Message ID: sent #136 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.136:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | state #136 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9e5248 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #136 | libevent_malloc: new ptr-libevent@0x55564da49268 size 128 | #136 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.906202 | resume sending helper answer for #136 suppresed complete_v2_state_transition() and stole MD | #136 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c028398 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.908502; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #76 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #76 spent 0.0845 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10584.916872; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #129 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x55564da3f0f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #129 spent 0.0977 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.925079; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #105 | libevent_malloc: new ptr-libevent@0x55564da3f0f8 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #105 spent 0.0871 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.930422; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #121 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x7f49a0028218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #121 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10584.956669; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #16 | libevent_malloc: new ptr-libevent@0x7f49a0028218 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x55564d9e69c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #16 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-137' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #137 at 0x55564da48698 | State DB: adding IKEv2 state #137 in UNDEFINED | pstats #137 ikev2.ike started | Message ID: init #137: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #137: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #137; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-137" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-137" IKE SA #137 "road-eastnet-nonat-137" "road-eastnet-nonat-137" #137: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-137 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-137": constructed local IKE proposals for road-eastnet-nonat-137 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 137 for state #137 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #137 | libevent_malloc: new ptr-libevent@0x55564d9e69c8 size 128 | #137 spent 0.139 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 137 for state #137 | RESET processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 137 | RESET processing: connection "road-eastnet-nonat-137" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 137 time elapsed 0.000663 seconds | (#137) spent 0.668 milliseconds in crypto helper computing work-order 137: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 137 for state #137 to event queue | scheduling resume sending helper answer for #137 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 137 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #137 | **emit ISAKMP Message: | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | ikev2 g^x c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ikev2 g^x ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | ikev2 g^x f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | ikev2 g^x 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | ikev2 g^x 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | ikev2 g^x af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | ikev2 g^x 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | ikev2 g^x c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ikev2 g^x ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | ikev2 g^x 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | ikev2 g^x 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | ikev2 g^x 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | ikev2 g^x 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | ikev2 g^x 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | ikev2 g^x 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b 09 01 4f ec | IKEv2 nonce bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 6a 98 26 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c7 ed 75 29 21 54 63 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 89 | natd_hash: port=500 | natd_hash: hash= 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 db 0c 80 d6 | natd_hash: hash= 50 c9 51 b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 db 0c 80 d6 | Notify data 50 c9 51 b8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c7 ed 75 29 21 54 63 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | natd_hash: hash= 03 b3 9a 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | Notify data 03 b3 9a 10 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #137 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #137: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #137 to 4294967295 after switching state | Message ID: IKE #137 skipping update_recv as MD is fake | Message ID: sent #137 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.137:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | state #137 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9e69c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #137 | libevent_malloc: new ptr-libevent@0x55564da49188 size 128 | #137 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10584.96585 | resume sending helper answer for #137 suppresed complete_v2_state_transition() and stole MD | #137 spent 0.407 milliseconds in resume sending helper answer | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49800282c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10584.970032; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #77 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x55564da10928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #77 spent 0.099 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10584.9854; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #106 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #106 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10584.99377; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #122 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #122 spent 0.229 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0981 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.006348; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x55564da40808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #130 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.121 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.020986; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564da40808 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #17 spent 0.589 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.294 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.030126; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #78 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x55564da120a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #78 spent 0.53 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.281 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.045191; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #107 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x55564d9d2548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #107 spent 0.407 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.232 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-138' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #138 at 0x55564da49da8 | State DB: adding IKEv2 state #138 in UNDEFINED | pstats #138 ikev2.ike started | Message ID: init #138: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #138: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #138; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-138" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-138" IKE SA #138 "road-eastnet-nonat-138" "road-eastnet-nonat-138" #138: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-138 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-138": constructed local IKE proposals for road-eastnet-nonat-138 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 138 for state #138 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c6c88 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #138 | libevent_malloc: new ptr-libevent@0x55564d9d2548 size 128 | #138 spent 0.62 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | crypto helper 17 starting work-order 138 for state #138 | RESET processing: connection "road-eastnet-nonat-138" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 138 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.966 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 138 time elapsed 0.003 seconds | (#138) spent 2.99 milliseconds in crypto helper computing work-order 138: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 138 for state #138 to event queue | scheduling resume sending helper answer for #138 | libevent_malloc: new ptr-libevent@0x7f4974028448 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 138 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #138 | **emit ISAKMP Message: | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | ikev2 g^x 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | ikev2 g^x 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | ikev2 g^x 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | ikev2 g^x 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | ikev2 g^x c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | ikev2 g^x 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | ikev2 g^x 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | ikev2 g^x c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | ikev2 g^x b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | ikev2 g^x 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | ikev2 g^x bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | ikev2 g^x b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | ikev2 g^x 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | ikev2 g^x 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | ikev2 g^x 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 6b ec 9c 7d | IKEv2 nonce 88 04 35 da 39 be fb 03 a5 7f 69 7d 33 91 bf ec | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7d 71 34 4f 96 19 19 46 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8a | natd_hash: port=500 | natd_hash: hash= e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c 7e 2a 5f a9 | natd_hash: hash= ea 24 5e d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c 7e 2a 5f a9 | Notify data ea 24 5e d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7d 71 34 4f 96 19 19 46 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | natd_hash: hash= e2 f4 54 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | Notify data e2 f4 54 49 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #138 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #138: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #138 to 4294967295 after switching state | Message ID: IKE #138 skipping update_recv as MD is fake | Message ID: sent #138 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.138:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | state #138 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9d2548 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c6c88 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #138 | libevent_malloc: new ptr-libevent@0x55564da4a908 size 128 | #138 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.05767 | resume sending helper answer for #138 suppresed complete_v2_state_transition() and stole MD | #138 spent 2.14 milliseconds in resume sending helper answer | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974028448 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.058238; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #123 | libevent_malloc: new ptr-libevent@0x7f4974028448 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #123 spent 0.472 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.279 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.090174; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006429 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x55564da137b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #79 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0876 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.095626; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564da137b8 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x7f4998017bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #18 spent 0.217 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.101082; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #131 | libevent_malloc: new ptr-libevent@0x7f4998017bc8 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x55564da41f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #131 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.105413; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #108 | libevent_malloc: new ptr-libevent@0x55564da41f18 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x7f49b8014d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #108 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.118724; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00167 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #124 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #124 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-139' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #139 at 0x55564da4b5b8 | State DB: adding IKEv2 state #139 in UNDEFINED | pstats #139 ikev2.ike started | Message ID: init #139: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #139: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #139; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-139" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-139" IKE SA #139 "road-eastnet-nonat-139" "road-eastnet-nonat-139" #139: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-139 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-139": constructed local IKE proposals for road-eastnet-nonat-139 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 139 for state #139 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6cb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #139 | libevent_malloc: new ptr-libevent@0x55564d9b2848 size 128 | crypto helper 18 resuming | crypto helper 18 starting work-order 139 for state #139 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 139 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 139 time elapsed 0.000926 seconds | (#139) spent 0.937 milliseconds in crypto helper computing work-order 139: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 139 for state #139 to event queue | scheduling resume sending helper answer for #139 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 | crypto helper 18 waiting (nothing to do) | #139 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-139" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.613 milliseconds in whack | processing resume sending helper answer for #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 139 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #139 | **emit ISAKMP Message: | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | ikev2 g^x 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | ikev2 g^x 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | ikev2 g^x 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | ikev2 g^x e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | ikev2 g^x f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | ikev2 g^x a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | ikev2 g^x d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | ikev2 g^x f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | ikev2 g^x d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | ikev2 g^x b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | ikev2 g^x 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | ikev2 g^x 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | ikev2 g^x f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | ikev2 g^x d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | ikev2 g^x 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 57 6e a4 af 30 2c c5 42 ec f8 6e a2 51 50 9a 7d | IKEv2 nonce 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f e7 56 d5 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 44 0d 59 90 ea 2b 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8b | natd_hash: port=500 | natd_hash: hash= 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 0c ca 71 36 | natd_hash: hash= 7a aa 00 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 0c ca 71 36 | Notify data 7a aa 00 b7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 44 0d 59 90 ea 2b 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | natd_hash: hash= dd cb 54 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | Notify data dd cb 54 23 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #139 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #139: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #139 to 4294967295 after switching state | Message ID: IKE #139 skipping update_recv as MD is fake | Message ID: sent #139 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.139:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | state #139 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9b2848 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6cb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #139 | libevent_malloc: new ptr-libevent@0x55564da4c0a8 size 128 | #139 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.122215 | resume sending helper answer for #139 suppresed complete_v2_state_transition() and stole MD | #139 spent 0.5 milliseconds in resume sending helper answer | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978028358 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.151532; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #80 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #80 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.159921; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #19 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.163296; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #132 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x55564da43628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #132 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.165649; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #109 | libevent_malloc: new ptr-libevent@0x55564da43628 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #109 spent 0.201 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0247 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.177015; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #125 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x7f49ac017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #125 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-140' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #140 at 0x55564da4cc18 | State DB: adding IKEv2 state #140 in UNDEFINED | pstats #140 ikev2.ike started | Message ID: init #140: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #140: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #140; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-140" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-140" IKE SA #140 "road-eastnet-nonat-140" "road-eastnet-nonat-140" #140: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-140 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-140": constructed local IKE proposals for road-eastnet-nonat-140 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 140 for state #140 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9df6b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #140 | libevent_malloc: new ptr-libevent@0x7f49ac017a48 size 128 | crypto helper 19 resuming | crypto helper 19 starting work-order 140 for state #140 | #140 spent 0.147 milliseconds in ikev2_parent_outI1() | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 140 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 140 time elapsed 0.000724 seconds | (#140) spent 0.729 milliseconds in crypto helper computing work-order 140: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 140 for state #140 to event queue | scheduling resume sending helper answer for #140 | libevent_malloc: new ptr-libevent@0x7f496c028438 size 128 | crypto helper 19 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-140" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | processing resume sending helper answer for #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 140 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #140 | **emit ISAKMP Message: | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | ikev2 g^x 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | ikev2 g^x 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | ikev2 g^x 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | ikev2 g^x 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | ikev2 g^x 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | ikev2 g^x 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | ikev2 g^x c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | ikev2 g^x 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | ikev2 g^x d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | ikev2 g^x 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | ikev2 g^x 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | ikev2 g^x 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | ikev2 g^x 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | ikev2 g^x 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | ikev2 g^x 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 03 fe 50 32 | IKEv2 nonce eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 82 fe 91 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1f 00 98 c0 9a 55 6a fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8c | natd_hash: port=500 | natd_hash: hash= 92 19 a5 1d 28 89 66 b9 9f e1 28 76 2e c8 7e a1 | natd_hash: hash= f9 35 11 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 19 a5 1d 28 89 66 b9 9f e1 28 76 2e c8 7e a1 | Notify data f9 35 11 55 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1f 00 98 c0 9a 55 6a fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | natd_hash: hash= 16 b8 4b b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | Notify data 16 b8 4b b0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #140 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #140: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #140 to 4294967295 after switching state | Message ID: IKE #140 skipping update_recv as MD is fake | Message ID: sent #140 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.140:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | state #140 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac017a48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9df6b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #140 | libevent_malloc: new ptr-libevent@0x55564da4d778 size 128 | #140 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.184625 | resume sending helper answer for #140 suppresed complete_v2_state_transition() and stole MD | #140 spent 0.414 milliseconds in resume sending helper answer | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c028438 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.22681; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #133 | libevent_malloc: new ptr-libevent@0x7f496c028438 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x55564da44d38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #133 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.229099; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #20 | libevent_malloc: new ptr-libevent@0x55564da44d38 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #20 spent 0.092 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.238362; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #126 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x7f4990028278 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #126 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.238558; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #110 | libevent_malloc: new ptr-libevent@0x7f4990028278 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #110 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.241927; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #81 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x7f49b401fc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #81 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-141' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #141 at 0x55564da4e428 | State DB: adding IKEv2 state #141 in UNDEFINED | pstats #141 ikev2.ike started | Message ID: init #141: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #141: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #141; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-141" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-141" IKE SA #141 "road-eastnet-nonat-141" "road-eastnet-nonat-141" #141: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-141 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-141": constructed local IKE proposals for road-eastnet-nonat-141 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 141 for state #141 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da17ce8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #141 | libevent_malloc: new ptr-libevent@0x7f49b401fc78 size 128 | crypto helper 0 resuming | crypto helper 0 starting work-order 141 for state #141 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 141 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 141 time elapsed 0.00097 seconds | (#141) spent 0.983 milliseconds in crypto helper computing work-order 141: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 141 for state #141 to event queue | scheduling resume sending helper answer for #141 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 | crypto helper 0 waiting (nothing to do) | #141 spent 0.19 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-141" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.296 milliseconds in whack | processing resume sending helper answer for #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 141 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #141 | **emit ISAKMP Message: | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | ikev2 g^x 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | ikev2 g^x 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | ikev2 g^x b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | ikev2 g^x 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | ikev2 g^x 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | ikev2 g^x 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | ikev2 g^x c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | ikev2 g^x b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | ikev2 g^x 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | ikev2 g^x fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | ikev2 g^x 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | ikev2 g^x 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | ikev2 g^x 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | ikev2 g^x f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | ikev2 g^x 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bb b1 4c 92 fd cc 53 91 dd 82 8d 3f d1 6f 39 2b | IKEv2 nonce 6f 42 d6 d7 68 45 63 93 4b aa 0e ec 7e 17 b9 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 52 3c 19 1e 27 db 87 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8d | natd_hash: port=500 | natd_hash: hash= 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a f4 ff 8a 7e | natd_hash: hash= 58 9d ba 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a f4 ff 8a 7e | Notify data 58 9d ba 17 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 52 3c 19 1e 27 db 87 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | natd_hash: hash= 5e be 43 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | Notify data 5e be 43 af | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #141 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #141: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #141 to 4294967295 after switching state | Message ID: IKE #141 skipping update_recv as MD is fake | Message ID: sent #141 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.141:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | state #141 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b401fc78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da17ce8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #141 | libevent_malloc: new ptr-libevent@0x55564da50658 size 128 | #141 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.252288 | resume sending helper answer for #141 suppresed complete_v2_state_transition() and stole MD | #141 spent 0.54 milliseconds in resume sending helper answer | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc02ae48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.288503; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #134 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x55564da46448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #134 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.297824; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564da46448 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #127 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.300189; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #82 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #82 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.315536; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #111 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x55564da309d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #111 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-142' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #142 at 0x55564da4fa88 | State DB: adding IKEv2 state #142 in UNDEFINED | pstats #142 ikev2.ike started | Message ID: init #142: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #142: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #142; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-142" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-142" IKE SA #142 "road-eastnet-nonat-142" "road-eastnet-nonat-142" #142: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-142 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-142": constructed local IKE proposals for road-eastnet-nonat-142 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 142 for state #142 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9eddd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #142 | libevent_malloc: new ptr-libevent@0x55564da309d8 size 128 | #142 spent 0.145 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 142 for state #142 | RESET processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-142" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 142 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 142 time elapsed 0.001025 seconds | (#142) spent 1.03 milliseconds in crypto helper computing work-order 142: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 142 for state #142 to event queue | scheduling resume sending helper answer for #142 | libevent_malloc: new ptr-libevent@0x7f49b402acf8 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 142 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #142 | **emit ISAKMP Message: | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | ikev2 g^x 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | ikev2 g^x 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | ikev2 g^x f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | ikev2 g^x 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | ikev2 g^x 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | ikev2 g^x 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | ikev2 g^x f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ikev2 g^x ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | ikev2 g^x f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | ikev2 g^x 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | ikev2 g^x 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | ikev2 g^x 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | ikev2 g^x 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | ikev2 g^x d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | ikev2 g^x 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 05 c0 36 76 | IKEv2 nonce cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 87 16 7f 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 68 d7 b4 41 ed 22 77 ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8e | natd_hash: port=500 | natd_hash: hash= 77 55 25 db 91 bd a3 40 11 44 ce e0 67 d4 f4 0e | natd_hash: hash= 43 ab 8f fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 55 25 db 91 bd a3 40 11 44 ce e0 67 d4 f4 0e | Notify data 43 ab 8f fa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 68 d7 b4 41 ed 22 77 ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | natd_hash: hash= 5c 5f 8e ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | Notify data 5c 5f 8e ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #142 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #142: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #142 to 4294967295 after switching state | Message ID: IKE #142 skipping update_recv as MD is fake | Message ID: sent #142 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.142:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | state #142 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da309d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9eddd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #142 | libevent_malloc: new ptr-libevent@0x55564da51dd8 size 128 | #142 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.319395 | resume sending helper answer for #142 suppresed complete_v2_state_transition() and stole MD | #142 spent 0.409 milliseconds in resume sending helper answer | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b402acf8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.321576; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f49b402acf8 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #21 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.34698; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #135 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x55564da47b58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #135 spent 0.56 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.358792; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #128 | libevent_malloc: new ptr-libevent@0x55564da47b58 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x7f49880282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #128 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0812 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.362125; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #83 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #83 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.374487; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #112 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x55564da32158 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #112 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-143' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #143 at 0x55564da51198 | State DB: adding IKEv2 state #143 in UNDEFINED | pstats #143 ikev2.ike started | Message ID: init #143: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #143: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #143; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-143" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-143" IKE SA #143 "road-eastnet-nonat-143" "road-eastnet-nonat-143" #143: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-143 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-143": constructed local IKE proposals for road-eastnet-nonat-143 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 143 for state #143 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #143 | libevent_malloc: new ptr-libevent@0x55564da32158 size 128 | #143 spent 0.145 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 143 for state #143 | RESET processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 143 | RESET processing: connection "road-eastnet-nonat-143" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.49 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 143 time elapsed 0.001026 seconds | (#143) spent 1.01 milliseconds in crypto helper computing work-order 143: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 143 for state #143 to event queue | scheduling resume sending helper answer for #143 | libevent_malloc: new ptr-libevent@0x7f49b802b6f8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 143 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #143 | **emit ISAKMP Message: | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | ikev2 g^x bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | ikev2 g^x f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | ikev2 g^x 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | ikev2 g^x bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | ikev2 g^x f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | ikev2 g^x 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | ikev2 g^x 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | ikev2 g^x c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | ikev2 g^x 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | ikev2 g^x b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | ikev2 g^x 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ikev2 g^x ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | ikev2 g^x 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | ikev2 g^x 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | ikev2 g^x 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff 22 bc 83 73 2b 06 c5 51 f7 57 45 49 92 04 ed | IKEv2 nonce e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 8d fb ae a5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 c4 87 1e aa 93 78 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8f | natd_hash: port=500 | natd_hash: hash= 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 b3 4f 7e 34 | natd_hash: hash= 97 69 ef 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 b3 4f 7e 34 | Notify data 97 69 ef 75 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 c4 87 1e aa 93 78 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | natd_hash: hash= 3d 1e f6 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | Notify data 3d 1e f6 5d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #143 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #143: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #143 to 4294967295 after switching state | Message ID: IKE #143 skipping update_recv as MD is fake | Message ID: sent #143 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.143:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | state #143 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da32158 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #143 | libevent_malloc: new ptr-libevent@0x55564da534e8 size 128 | #143 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.379326 | resume sending helper answer for #143 suppresed complete_v2_state_transition() and stole MD | #143 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b802b6f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.380504; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f49b802b6f8 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #22 spent 0.0911 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.407767; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #136 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x55564da49268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #136 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.418059; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000918 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #129 | libevent_malloc: new ptr-libevent@0x55564da49268 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #129 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.43536; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #113 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x55564da33868 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #113 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-144' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #144 at 0x55564da52918 | State DB: adding IKEv2 state #144 in UNDEFINED | pstats #144 ikev2.ike started | Message ID: init #144: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #144: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #144; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-144" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-144" IKE SA #144 "road-eastnet-nonat-144" "road-eastnet-nonat-144" #144: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-144 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-144": constructed local IKE proposals for road-eastnet-nonat-144 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 144 for state #144 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #144 | libevent_malloc: new ptr-libevent@0x55564da33868 size 128 | #144 spent 0.197 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | RESET processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-144" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 5 starting work-order 144 for state #144 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 144 | spent 0.299 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 144 time elapsed 0.001018 seconds | (#144) spent 1.03 milliseconds in crypto helper computing work-order 144: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 144 for state #144 to event queue | scheduling resume sending helper answer for #144 | libevent_malloc: new ptr-libevent@0x7f49ac02da98 size 128 | crypto helper 5 waiting (nothing to do) | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.440414; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #23 | libevent_malloc: new ptr-libevent@0x55564da17d58 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #23 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 144 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #144 | **emit ISAKMP Message: | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | ikev2 g^x 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | ikev2 g^x 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | ikev2 g^x c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | ikev2 g^x c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | ikev2 g^x 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | ikev2 g^x fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | ikev2 g^x f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | ikev2 g^x f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ikev2 g^x ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | ikev2 g^x f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | ikev2 g^x d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | ikev2 g^x 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | ikev2 g^x 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | ikev2 g^x 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | ikev2 g^x c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d7 19 b0 2d 20 ce fd e7 be f6 db 33 46 5b e6 29 | IKEv2 nonce 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 b7 34 3b ef | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 0c ae 94 de 98 d8 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 90 | natd_hash: port=500 | natd_hash: hash= 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 f2 66 5d 18 | natd_hash: hash= d3 c6 ca 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 f2 66 5d 18 | Notify data d3 c6 ca 87 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 0c ae 94 de 98 d8 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | natd_hash: hash= 3c 75 7a 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | Notify data 3c 75 7a 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #144 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #144: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #144 to 4294967295 after switching state | Message ID: IKE #144 skipping update_recv as MD is fake | Message ID: sent #144 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.144:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | state #144 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da33868 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #144 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 | #144 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.441125 | resume sending helper answer for #144 suppresed complete_v2_state_transition() and stole MD | #144 spent 0.511 milliseconds in resume sending helper answer | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac02da98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.451478; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #84 | libevent_malloc: new ptr-libevent@0x7f49ac02da98 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #84 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.466796; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #137 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x55564da49188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #137 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.493111; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #114 | libevent_malloc: new ptr-libevent@0x55564da49188 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x55564da34f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #114 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.498392; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #24 | libevent_malloc: new ptr-libevent@0x55564da34f78 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x55564d9f2478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #24 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-145' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #145 at 0x55564da54028 | State DB: adding IKEv2 state #145 in UNDEFINED | pstats #145 ikev2.ike started | Message ID: init #145: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #145: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #145; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-145" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-145" IKE SA #145 "road-eastnet-nonat-145" "road-eastnet-nonat-145" #145: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-145 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-145": constructed local IKE proposals for road-eastnet-nonat-145 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 145 for state #145 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #145 | libevent_malloc: new ptr-libevent@0x55564d9f2478 size 128 | crypto helper 6 resuming | #145 spent 0.148 milliseconds in ikev2_parent_outI1() | crypto helper 6 starting work-order 145 for state #145 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 145 | RESET processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-145" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.262 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 145 time elapsed 0.000737 seconds | (#145) spent 0.739 milliseconds in crypto helper computing work-order 145: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 145 for state #145 to event queue | scheduling resume sending helper answer for #145 | libevent_malloc: new ptr-libevent@0x7f49b002dad8 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 145 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #145 | **emit ISAKMP Message: | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | ikev2 g^x d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | ikev2 g^x 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | ikev2 g^x df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | ikev2 g^x 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ikev2 g^x ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | ikev2 g^x d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | ikev2 g^x f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | ikev2 g^x e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | ikev2 g^x 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | ikev2 g^x e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | ikev2 g^x 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | ikev2 g^x e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | ikev2 g^x 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | ikev2 g^x 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | ikev2 g^x 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a b6 a1 b2 7c | IKEv2 nonce bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 28 98 eb 5b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 64 ca 6b 71 3b 85 18 95 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 91 | natd_hash: port=500 | natd_hash: hash= 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 3a d0 73 a2 | natd_hash: hash= 5e 3d 47 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 3a d0 73 a2 | Notify data 5e 3d 47 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 64 ca 6b 71 3b 85 18 95 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | natd_hash: hash= 9d 8a 1c 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | Notify data 9d 8a 1c 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #145 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #145: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #145 to 4294967295 after switching state | Message ID: IKE #145 skipping update_recv as MD is fake | Message ID: sent #145 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.145:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | state #145 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9f2478 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #145 | libevent_malloc: new ptr-libevent@0x55564da54b18 size 128 | #145 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.501906 | resume sending helper answer for #145 suppresed complete_v2_state_transition() and stole MD | #145 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b002dad8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.508084; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f49b002dad8 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #130 spent 0.0917 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.534341; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #85 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #85 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.55371; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00277 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #115 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x7f4994017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #115 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.553934; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #25 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #25 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0365 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.555148; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497478 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x55564da4a908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #138 spent 0.0835 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-146' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #146 at 0x55564da55738 | State DB: adding IKEv2 state #146 in UNDEFINED | pstats #146 ikev2.ike started | Message ID: init #146: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #146: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #146; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-146" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-146" IKE SA #146 "road-eastnet-nonat-146" "road-eastnet-nonat-146" #146: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-146 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-146": constructed local IKE proposals for road-eastnet-nonat-146 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 146 for state #146 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c6c88 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #146 | libevent_malloc: new ptr-libevent@0x55564da4a908 size 128 | #146 spent 0.124 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 146 for state #146 | RESET processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-146" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 146 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.226 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 146 time elapsed 0.000675 seconds | (#146) spent 0.657 milliseconds in crypto helper computing work-order 146: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 146 for state #146 to event queue | scheduling resume sending helper answer for #146 | libevent_malloc: new ptr-libevent@0x7f49a402db48 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 146 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #146 | **emit ISAKMP Message: | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | ikev2 g^x 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | ikev2 g^x b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | ikev2 g^x 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | ikev2 g^x 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | ikev2 g^x 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | ikev2 g^x b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | ikev2 g^x 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | ikev2 g^x cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | ikev2 g^x 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | ikev2 g^x 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | ikev2 g^x 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | ikev2 g^x f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | ikev2 g^x 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | ikev2 g^x b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | ikev2 g^x e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 cc f1 ab 2a | IKEv2 nonce a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f 36 dd e0 f6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 64 66 50 2d 5e 5e 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 92 | natd_hash: port=500 | natd_hash: hash= 77 3c ea aa b1 45 ce c0 aa e5 46 78 e0 a6 76 81 | natd_hash: hash= d7 8e 9d f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 3c ea aa b1 45 ce c0 aa e5 46 78 e0 a6 76 81 | Notify data d7 8e 9d f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 64 66 50 2d 5e 5e 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | natd_hash: hash= 27 f0 de b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | Notify data 27 f0 de b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #146 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #146: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #146 to 4294967295 after switching state | Message ID: IKE #146 skipping update_recv as MD is fake | Message ID: sent #146 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.146:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | state #146 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da4a908 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c6c88 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #146 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 | #146 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.562278 | resume sending helper answer for #146 suppresed complete_v2_state_transition() and stole MD | #146 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a402db48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.594465; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004017 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #86 | libevent_malloc: new ptr-libevent@0x7f49a402db48 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #86 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.602718; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #131 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x7f4998017bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #131 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.613078; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #116 | libevent_malloc: new ptr-libevent@0x7f4998017bc8 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x7f4998028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #116 spent 0.0844 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-147' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #147 at 0x55564da56d98 | State DB: adding IKEv2 state #147 in UNDEFINED | pstats #147 ikev2.ike started | Message ID: init #147: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #147: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #147; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-147" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-147" IKE SA #147 "road-eastnet-nonat-147" "road-eastnet-nonat-147" #147: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-147 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-147": constructed local IKE proposals for road-eastnet-nonat-147 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 147 for state #147 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #147 | libevent_malloc: new ptr-libevent@0x7f4998028338 size 128 | #147 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-147" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.214 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 147 for state #147 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 147 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 147 time elapsed 0.000661 seconds | (#147) spent 0.665 milliseconds in crypto helper computing work-order 147: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 147 for state #147 to event queue | scheduling resume sending helper answer for #147 | libevent_malloc: new ptr-libevent@0x7f49a802dc78 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 147 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #147 | **emit ISAKMP Message: | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | ikev2 g^x 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | ikev2 g^x 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | ikev2 g^x 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | ikev2 g^x 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | ikev2 g^x a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | ikev2 g^x 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | ikev2 g^x 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | ikev2 g^x 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | ikev2 g^x e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | ikev2 g^x f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | ikev2 g^x 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | ikev2 g^x c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | ikev2 g^x 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | ikev2 g^x bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | ikev2 g^x 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 ba 95 3b 27 | IKEv2 nonce 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 5d 59 1c d3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 e5 4f b2 bf 36 52 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 93 | natd_hash: port=500 | natd_hash: hash= e9 9c f2 5f 5a 01 54 40 55 8b b2 06 7d fd 9d 0d | natd_hash: hash= 53 92 0d bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 9c f2 5f 5a 01 54 40 55 8b b2 06 7d fd 9d 0d | Notify data 53 92 0d bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 e5 4f b2 bf 36 52 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | natd_hash: hash= 7c 43 39 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | Notify data 7c 43 39 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #147 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #147: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #147 to 4294967295 after switching state | Message ID: IKE #147 skipping update_recv as MD is fake | Message ID: sent #147 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.147:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | state #147 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998028338 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #147 | libevent_malloc: new ptr-libevent@0x55564da57888 size 128 | #147 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.621074 | resume sending helper answer for #147 suppresed complete_v2_state_transition() and stole MD | #147 spent 0.382 milliseconds in resume sending helper answer | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a802dc78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.622378; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #139 | libevent_malloc: new ptr-libevent@0x7f49a802dc78 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x55564da4c0a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #139 spent 0.0825 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.628706; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #26 | libevent_malloc: new ptr-libevent@0x55564da4c0a8 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #26 spent 0.0831 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.655001; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #87 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #87 spent 0.218 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0973 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.66453; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001701 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #132 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #132 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.671052; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #117 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x7f498c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #117 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.117 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.685723; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #140 | libevent_malloc: new ptr-libevent@0x7f498c0282d8 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x55564da4d778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #140 spent 0.291 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.688305; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #27 | libevent_malloc: new ptr-libevent@0x55564da4d778 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x7f49a801d388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #27 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-148' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #148 at 0x55564da584a8 | State DB: adding IKEv2 state #148 in UNDEFINED | pstats #148 ikev2.ike started | Message ID: init #148: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #148: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #148; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-148" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-148" IKE SA #148 "road-eastnet-nonat-148" "road-eastnet-nonat-148" #148: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-148 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-148": constructed local IKE proposals for road-eastnet-nonat-148 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 148 for state #148 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #148 | libevent_malloc: new ptr-libevent@0x7f49a801d388 size 128 | #148 spent 0.3 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-148" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 9 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 9 starting work-order 148 for state #148 | spent 0.482 milliseconds in whack | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 148 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 148 time elapsed 0.001677 seconds | (#148) spent 1.67 milliseconds in crypto helper computing work-order 148: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 148 for state #148 to event queue | scheduling resume sending helper answer for #148 | libevent_malloc: new ptr-libevent@0x7f499c02db48 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 148 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #148 | **emit ISAKMP Message: | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | ikev2 g^x 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | ikev2 g^x a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | ikev2 g^x 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | ikev2 g^x 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | ikev2 g^x 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | ikev2 g^x bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | ikev2 g^x 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | ikev2 g^x 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | ikev2 g^x 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | ikev2 g^x 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | ikev2 g^x 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | ikev2 g^x 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | ikev2 g^x 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | ikev2 g^x 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | ikev2 g^x bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 7e 2b 15 87 | IKEv2 nonce fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 3b b1 11 40 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 9b 02 7b 28 2a 09 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 94 | natd_hash: port=500 | natd_hash: hash= 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b c8 3a 03 3d | natd_hash: hash= cc 33 55 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b c8 3a 03 3d | Notify data cc 33 55 53 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 9b 02 7b 28 2a 09 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | natd_hash: hash= 55 d9 6a 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | Notify data 55 d9 6a 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #148 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #148: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #148 to 4294967295 after switching state | Message ID: IKE #148 skipping update_recv as MD is fake | Message ID: sent #148 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.148:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | state #148 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a801d388 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #148 | libevent_malloc: new ptr-libevent@0x55564da59088 size 128 | #148 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.694514 | resume sending helper answer for #148 suppresed complete_v2_state_transition() and stole MD | #148 spent 0.949 milliseconds in resume sending helper answer | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c02db48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.719928; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003037 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #88 | libevent_malloc: new ptr-libevent@0x7f499c02db48 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #88 spent 0.28 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.727553; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #133 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x7f496c028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #133 spent 0.253 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.131 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.751155; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #118 | libevent_malloc: new ptr-libevent@0x7f496c028438 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #118 spent 0.195 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.751398; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #28 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #28 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0867 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.752804; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #141 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x55564da50658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #141 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-149' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #149 at 0x55564da59cb8 | State DB: adding IKEv2 state #149 in UNDEFINED | pstats #149 ikev2.ike started | Message ID: init #149: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #149: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #149; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-149" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-149" IKE SA #149 "road-eastnet-nonat-149" "road-eastnet-nonat-149" #149: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-149 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-149": constructed local IKE proposals for road-eastnet-nonat-149 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 149 for state #149 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da17ce8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #149 | libevent_malloc: new ptr-libevent@0x55564da50658 size 128 | #149 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-149" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.226 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 149 for state #149 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 149 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 149 time elapsed 0.000801 seconds | (#149) spent 0.797 milliseconds in crypto helper computing work-order 149: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 149 for state #149 to event queue | scheduling resume sending helper answer for #149 | libevent_malloc: new ptr-libevent@0x7f49a002da88 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 149 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #149 | **emit ISAKMP Message: | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | ikev2 g^x 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | ikev2 g^x 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | ikev2 g^x 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | ikev2 g^x 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | ikev2 g^x 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | ikev2 g^x 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ikev2 g^x ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | ikev2 g^x c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | ikev2 g^x 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | ikev2 g^x aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | ikev2 g^x 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | ikev2 g^x 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | ikev2 g^x 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | ikev2 g^x 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | ikev2 g^x 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 6c e4 b8 f3 | IKEv2 nonce d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 17 62 a0 cf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 47 fc 58 f8 95 fb 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 95 | natd_hash: port=500 | natd_hash: hash= 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 ad 1c f3 97 | natd_hash: hash= cd 4e dc 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 ad 1c f3 97 | Notify data cd 4e dc 4b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 47 fc 58 f8 95 fb 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | natd_hash: hash= 02 92 d6 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | Notify data 02 92 d6 41 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #149 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #149: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #149 to 4294967295 after switching state | Message ID: IKE #149 skipping update_recv as MD is fake | Message ID: sent #149 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.149:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | state #149 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da50658 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da17ce8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #149 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 | #149 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.756483 | resume sending helper answer for #149 suppresed complete_v2_state_transition() and stole MD | #149 spent 0.382 milliseconds in resume sending helper answer | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a002da88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.789803; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #134 | libevent_malloc: new ptr-libevent@0x7f49a002da88 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #134 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.811144; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #89 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #89 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.812426; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #119 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x7f49bc01a5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #119 spent 0.0915 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-150' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #150 at 0x55564da5b318 | State DB: adding IKEv2 state #150 in UNDEFINED | pstats #150 ikev2.ike started | Message ID: init #150: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #150: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #150; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-150" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-150" IKE SA #150 "road-eastnet-nonat-150" "road-eastnet-nonat-150" #150: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-150 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-150": constructed local IKE proposals for road-eastnet-nonat-150 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 150 for state #150 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f7fa8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #150 | libevent_malloc: new ptr-libevent@0x7f49bc01a5b8 size 128 | #150 spent 0.129 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 150 for state #150 | RESET processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 150 | RESET processing: connection "road-eastnet-nonat-150" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.212 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 150 time elapsed 0.000604 seconds | (#150) spent 0.61 milliseconds in crypto helper computing work-order 150: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 150 for state #150 to event queue | scheduling resume sending helper answer for #150 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 150 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #150 | **emit ISAKMP Message: | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | ikev2 g^x 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | ikev2 g^x b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | ikev2 g^x 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | ikev2 g^x 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | ikev2 g^x 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | ikev2 g^x 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | ikev2 g^x 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | ikev2 g^x 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | ikev2 g^x 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | ikev2 g^x 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | ikev2 g^x 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | ikev2 g^x 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | ikev2 g^x bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | ikev2 g^x 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | ikev2 g^x c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 58 6d c5 cf d2 75 46 6a 00 db 8e f7 f0 93 1b ac | IKEv2 nonce de b0 d9 72 a7 f2 37 d8 0c 92 80 84 e6 7a 7c 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 82 81 7c 93 0b 23 e0 32 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 96 | natd_hash: port=500 | natd_hash: hash= 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 4c b5 42 7d | natd_hash: hash= fd 1f ab 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 4c b5 42 7d | Notify data fd 1f ab 9c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 82 81 7c 93 0b 23 e0 32 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | natd_hash: hash= ab 50 89 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | Notify data ab 50 89 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #150 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #150: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #150 to 4294967295 after switching state | Message ID: IKE #150 skipping update_recv as MD is fake | Message ID: sent #150 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.150:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | state #150 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc01a5b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f7fa8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #150 | libevent_malloc: new ptr-libevent@0x55564da5d668 size 128 | #150 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.816137 | resume sending helper answer for #150 suppresed complete_v2_state_transition() and stole MD | #150 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499402dcb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.820294; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #142 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x55564da51dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #142 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.825575; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #29 | libevent_malloc: new ptr-libevent@0x55564da51dd8 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #29 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.847856; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #135 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #135 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.874187; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #120 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x7f498c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #120 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0559 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-151' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #151 at 0x55564da5ca98 | State DB: adding IKEv2 state #151 in UNDEFINED | pstats #151 ikev2.ike started | Message ID: init #151: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #151: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #151; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-151" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-151" IKE SA #151 "road-eastnet-nonat-151" "road-eastnet-nonat-151" #151: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-151 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-151": constructed local IKE proposals for road-eastnet-nonat-151 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 151 for state #151 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9cdf28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #151 | libevent_malloc: new ptr-libevent@0x7f498c0121d8 size 128 | #151 spent 0.138 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 151 for state #151 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 151 | RESET processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-151" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.287 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 151 time elapsed 0.000667 seconds | (#151) spent 0.672 milliseconds in crypto helper computing work-order 151: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 151 for state #151 to event queue | scheduling resume sending helper answer for #151 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 151 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #151 | **emit ISAKMP Message: | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | ikev2 g^x 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | ikev2 g^x d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | ikev2 g^x 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | ikev2 g^x 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | ikev2 g^x 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | ikev2 g^x e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | ikev2 g^x 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | ikev2 g^x 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | ikev2 g^x 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | ikev2 g^x e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | ikev2 g^x c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | ikev2 g^x e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ikev2 g^x ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | ikev2 g^x 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | ikev2 g^x b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa e7 25 54 46 | IKEv2 nonce 47 42 7f a5 7e bf d5 f4 70 db ce 94 bb 8f ae 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db 77 b4 67 a3 6a 59 33 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 97 | natd_hash: port=500 | natd_hash: hash= 82 ab ee 60 8c 9c 3a f1 97 30 62 df 60 33 21 19 | natd_hash: hash= dc 2c 13 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 ab ee 60 8c 9c 3a f1 97 30 62 df 60 33 21 19 | Notify data dc 2c 13 98 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db 77 b4 67 a3 6a 59 33 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | natd_hash: hash= d2 3d 21 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | Notify data d2 3d 21 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #151 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #151: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #151 to 4294967295 after switching state | Message ID: IKE #151 skipping update_recv as MD is fake | Message ID: sent #151 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.151:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | state #151 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c0121d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9cdf28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #151 | libevent_malloc: new ptr-libevent@0x55564da5ed78 size 128 | #151 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.875966 | resume sending helper answer for #151 suppresed complete_v2_state_transition() and stole MD | #151 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499802db48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.880111; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #143 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x55564da534e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #143 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.888432; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564da534e8 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x55564da26778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #90 spent 0.0941 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.903707; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #30 | libevent_malloc: new ptr-libevent@0x55564da26778 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #30 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.90802; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #136 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #136 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.932362; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #121 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #121 spent 0.264 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-152' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #152 at 0x55564da5e1a8 | State DB: adding IKEv2 state #152 in UNDEFINED | pstats #152 ikev2.ike started | Message ID: init #152: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #152: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #152; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-152" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-152" IKE SA #152 "road-eastnet-nonat-152" "road-eastnet-nonat-152" #152: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-152 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-152": constructed local IKE proposals for road-eastnet-nonat-152 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 152 for state #152 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #152 | libevent_malloc: new ptr-libevent@0x55564d9ce0b8 size 128 | #152 spent 0.204 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 152 for state #152 | RESET processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 152 | RESET processing: connection "road-eastnet-nonat-152" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.34 milliseconds in whack | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10585.940862; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #144 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 152 time elapsed 0.001198 seconds | (#152) spent 1.25 milliseconds in crypto helper computing work-order 152: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 152 for state #152 to event queue | scheduling resume sending helper answer for #152 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 | crypto helper 13 waiting (nothing to do) | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #144 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.078 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 152 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #152 | **emit ISAKMP Message: | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | ikev2 g^x 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | ikev2 g^x b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | ikev2 g^x 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | ikev2 g^x bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | ikev2 g^x 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | ikev2 g^x d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | ikev2 g^x 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | ikev2 g^x 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | ikev2 g^x 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | ikev2 g^x 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | ikev2 g^x 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | ikev2 g^x 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | ikev2 g^x a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | ikev2 g^x e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | ikev2 g^x b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a5 6a 23 25 d8 d3 57 62 ea ba fc e2 8d bc 10 3e | IKEv2 nonce 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 fb 19 97 44 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 73 f7 ef 73 63 51 05 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 98 | natd_hash: port=500 | natd_hash: hash= 1d de de 4e 92 07 fc fe 67 38 c1 4e 06 28 02 0e | natd_hash: hash= 70 27 2a 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d de de 4e 92 07 fc fe 67 38 c1 4e 06 28 02 0e | Notify data 70 27 2a 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 73 f7 ef 73 63 51 05 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | natd_hash: hash= e7 e2 b6 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | Notify data e7 e2 b6 a0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #152 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #152: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #152 to 4294967295 after switching state | Message ID: IKE #152 skipping update_recv as MD is fake | Message ID: sent #152 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.152:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | state #152 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ce0b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #152 | libevent_malloc: new ptr-libevent@0x55564da604f8 size 128 | #152 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10585.941729 | resume sending helper answer for #152 suppresed complete_v2_state_transition() and stole MD | #152 spent 0.539 milliseconds in resume sending helper answer | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c02dae8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10585.966988; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #137 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #137 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0755 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10585.974408; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #91 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x55564da26698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #91 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10585.977771; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #31 | libevent_malloc: new ptr-libevent@0x55564da26698 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #31 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10585.994135; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #122 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #122 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-153' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #153 at 0x55564da5f8b8 | State DB: adding IKEv2 state #153 in UNDEFINED | pstats #153 ikev2.ike started | Message ID: init #153: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #153: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #153; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-153" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-153" IKE SA #153 "road-eastnet-nonat-153" "road-eastnet-nonat-153" #153: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-153 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-153": constructed local IKE proposals for road-eastnet-nonat-153 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 153 for state #153 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49880058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #153 | libevent_malloc: new ptr-libevent@0x55564d9a55a8 size 128 | #153 spent 0.134 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 153 for state #153 | RESET processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-153" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 153 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.224 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 153 time elapsed 0.000935 seconds | (#153) spent 0.939 milliseconds in crypto helper computing work-order 153: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 153 for state #153 to event queue | scheduling resume sending helper answer for #153 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 153 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #153 | **emit ISAKMP Message: | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | ikev2 g^x cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | ikev2 g^x 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | ikev2 g^x 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | ikev2 g^x da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | ikev2 g^x c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | ikev2 g^x e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | ikev2 g^x 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | ikev2 g^x d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | ikev2 g^x b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | ikev2 g^x 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | ikev2 g^x 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | ikev2 g^x 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | ikev2 g^x 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ikev2 g^x ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | ikev2 g^x a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a7 e6 c2 8d 62 48 22 e6 5c a5 cb df 58 d2 63 b7 | IKEv2 nonce e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 8f 7e e4 4d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9f 84 e9 4f 67 b1 d4 95 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 99 | natd_hash: port=500 | natd_hash: hash= 57 72 45 6e b2 13 57 6b 04 b6 17 d2 fe 9a ff a3 | natd_hash: hash= 87 a5 52 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 72 45 6e b2 13 57 6b 04 b6 17 d2 fe 9a ff a3 | Notify data 87 a5 52 53 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9f 84 e9 4f 67 b1 d4 95 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | natd_hash: hash= 2f 61 da e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | Notify data 2f 61 da e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #153 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #153: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #153 to 4294967295 after switching state | Message ID: IKE #153 skipping update_recv as MD is fake | Message ID: sent #153 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.153:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | state #153 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9a55a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49880058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #153 | libevent_malloc: new ptr-libevent@0x55564da61c08 size 128 | #153 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.001923 | resume sending helper answer for #153 suppresed complete_v2_state_transition() and stole MD | #153 spent 0.344 milliseconds in resume sending helper answer | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499002da88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.00201; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500104 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #145 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x55564da54b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #145 spent 0.0717 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.048257; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00346 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564da54b18 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x55564d9ff498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #32 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.056554; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #92 | libevent_malloc: new ptr-libevent@0x55564d9ff498 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #92 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0517 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.057872; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #138 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.059234; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #123 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x7f4974028448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #123 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-154' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #154 at 0x55564da61038 | State DB: adding IKEv2 state #154 in UNDEFINED | pstats #154 ikev2.ike started | Message ID: init #154: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #154: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #154; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-154" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-154" IKE SA #154 "road-eastnet-nonat-154" "road-eastnet-nonat-154" #154: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-154 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-154": constructed local IKE proposals for road-eastnet-nonat-154 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 154 for state #154 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da4a898 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #154 | libevent_malloc: new ptr-libevent@0x7f4974028448 size 128 | #154 spent 0.145 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-154" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.219 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 154 for state #154 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 154 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 154 time elapsed 0.000634 seconds | (#154) spent 0.639 milliseconds in crypto helper computing work-order 154: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 154 for state #154 to event queue | scheduling resume sending helper answer for #154 | libevent_malloc: new ptr-libevent@0x7f498402d9c8 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 154 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #154 | **emit ISAKMP Message: | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | ikev2 g^x 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | ikev2 g^x a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | ikev2 g^x df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | ikev2 g^x e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | ikev2 g^x 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | ikev2 g^x 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | ikev2 g^x 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | ikev2 g^x 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | ikev2 g^x b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | ikev2 g^x 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | ikev2 g^x 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | ikev2 g^x 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | ikev2 g^x 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | ikev2 g^x 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | ikev2 g^x 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 2d be 6e 9a 66 38 6a fd fe 07 a2 0d ff c9 e0 | IKEv2 nonce 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad 6d ae 6e bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 98 d5 a3 eb 4e d1 0a 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9a | natd_hash: port=500 | natd_hash: hash= c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c b0 79 4b 07 | natd_hash: hash= f3 9e fb 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c b0 79 4b 07 | Notify data f3 9e fb 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 98 d5 a3 eb 4e d1 0a 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | natd_hash: hash= 4f 1c 98 93 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | Notify data 4f 1c 98 93 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #154 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #154: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #154 to 4294967295 after switching state | Message ID: IKE #154 skipping update_recv as MD is fake | Message ID: sent #154 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.154:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | state #154 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974028448 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da4a898 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #154 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 | #154 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.062184 | resume sending helper answer for #154 suppresed complete_v2_state_transition() and stole MD | #154 spent 0.378 milliseconds in resume sending helper answer | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498402d9c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.063359; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #146 | libevent_malloc: new ptr-libevent@0x7f498402d9c8 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x55564da57968 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #146 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.118672; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #124 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x7f49b8014d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #124 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.120007; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #33 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #33 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.121318; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #147 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x55564da57888 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #147 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-155' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #155 at 0x55564da62748 | State DB: adding IKEv2 state #155 in UNDEFINED | pstats #155 ikev2.ike started | Message ID: init #155: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #155: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #155; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-155" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-155" IKE SA #155 "road-eastnet-nonat-155" "road-eastnet-nonat-155" #155: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-155 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-155": constructed local IKE proposals for road-eastnet-nonat-155 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 155 for state #155 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #155 | libevent_malloc: new ptr-libevent@0x55564da57888 size 128 | #155 spent 0.155 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 155 for state #155 | RESET processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 155 | RESET processing: connection "road-eastnet-nonat-155" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.265 milliseconds in whack | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.123127; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000912 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #139 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x7f49a802dc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #139 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0814 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 155 time elapsed 0.000915 seconds | (#155) spent 0.921 milliseconds in crypto helper computing work-order 155: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 155 for state #155 to event queue | scheduling resume sending helper answer for #155 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 155 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #155 | **emit ISAKMP Message: | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | ikev2 g^x cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | ikev2 g^x d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | ikev2 g^x 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | ikev2 g^x 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | ikev2 g^x 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | ikev2 g^x 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | ikev2 g^x 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | ikev2 g^x c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | ikev2 g^x 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | ikev2 g^x a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | ikev2 g^x 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | ikev2 g^x 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | ikev2 g^x f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | ikev2 g^x 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | ikev2 g^x 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 14 d5 0c 2f | IKEv2 nonce a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 e6 ba f9 65 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 a2 42 61 a1 36 38 a4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9b | natd_hash: port=500 | natd_hash: hash= e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f 4c 30 2a 42 | natd_hash: hash= a5 de bf 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f 4c 30 2a 42 | Notify data a5 de bf 95 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 a2 42 61 a1 36 38 a4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | natd_hash: hash= 27 54 dc b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | Notify data 27 54 dc b4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #155 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #155: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #155 to 4294967295 after switching state | Message ID: IKE #155 skipping update_recv as MD is fake | Message ID: sent #155 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.155:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | state #155 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da57888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #155 | libevent_malloc: new ptr-libevent@0x55564da64a98 size 128 | #155 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.124493 | resume sending helper answer for #155 suppresed complete_v2_state_transition() and stole MD | #155 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498802db48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.147727; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #93 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #93 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0777 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.178149; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #125 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #125 spent 0.251 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.186706; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #140 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x7f498c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #140 spent 0.243 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.13 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-156' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #156 at 0x55564da63e58 | State DB: adding IKEv2 state #156 in UNDEFINED | pstats #156 ikev2.ike started | Message ID: init #156: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #156: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #156; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-156" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-156" IKE SA #156 "road-eastnet-nonat-156" "road-eastnet-nonat-156" #156: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-156 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-156": constructed local IKE proposals for road-eastnet-nonat-156 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 156 for state #156 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da41e38 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #156 | libevent_malloc: new ptr-libevent@0x7f498c0282d8 size 128 | #156 spent 0.192 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 156 for state #156 | RESET processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 156 | RESET processing: connection "road-eastnet-nonat-156" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.31 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 156 time elapsed 0.001532 seconds | (#156) spent 1.54 milliseconds in crypto helper computing work-order 156: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 156 for state #156 to event queue | scheduling resume sending helper answer for #156 | libevent_malloc: new ptr-libevent@0x7f497c02dc08 size 128 | crypto helper 1 waiting (nothing to do) | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.192518; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004545 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #34 | libevent_malloc: new ptr-libevent@0x7f49a802dc78 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #34 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 156 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #156 | **emit ISAKMP Message: | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | ikev2 g^x 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | ikev2 g^x db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | ikev2 g^x fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | ikev2 g^x 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | ikev2 g^x 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | ikev2 g^x c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | ikev2 g^x 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | ikev2 g^x bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | ikev2 g^x b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | ikev2 g^x 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | ikev2 g^x 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | ikev2 g^x 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | ikev2 g^x b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | ikev2 g^x 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | ikev2 g^x eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 56 0b 23 bd | IKEv2 nonce 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 a4 eb 0d b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8c 2e a4 a3 cc 5e d9 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9c | natd_hash: port=500 | natd_hash: hash= fd a7 f9 6c 39 44 6d 03 54 8a 03 cf d2 f3 34 b0 | natd_hash: hash= 6d f5 5e 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd a7 f9 6c 39 44 6d 03 54 8a 03 cf d2 f3 34 b0 | Notify data 6d f5 5e 2f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8c 2e a4 a3 cc 5e d9 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | natd_hash: hash= 45 7e 5e d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | Notify data 45 7e 5e d5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #156 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #156: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #156 to 4294967295 after switching state | Message ID: IKE #156 skipping update_recv as MD is fake | Message ID: sent #156 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.156:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | state #156 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c0282d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da41e38 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #156 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 | #156 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.193233 | resume sending helper answer for #156 suppresed complete_v2_state_transition() and stole MD | #156 spent 0.515 milliseconds in resume sending helper answer | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c02dc08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.194485; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #148 | libevent_malloc: new ptr-libevent@0x7f497c02dc08 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x55564da59088 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #148 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0528 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.239755; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002743 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #126 | libevent_malloc: new ptr-libevent@0x55564da59088 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #126 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.239973; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #94 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #94 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-157' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #157 at 0x55564da655d8 | State DB: adding IKEv2 state #157 in UNDEFINED | pstats #157 ikev2.ike started | Message ID: init #157: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #157: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #157; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-157" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-157" IKE SA #157 "road-eastnet-nonat-157" "road-eastnet-nonat-157" #157: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-157 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-157": constructed local IKE proposals for road-eastnet-nonat-157 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 157 for state #157 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #157 | libevent_malloc: new ptr-libevent@0x7f4994012288 size 128 | #157 spent 0.178 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 157 for state #157 | RESET processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 157 | RESET processing: connection "road-eastnet-nonat-157" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.31 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 157 time elapsed 0.000996 seconds | (#157) spent 1 milliseconds in crypto helper computing work-order 157: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 157 for state #157 to event queue | scheduling resume sending helper answer for #157 | libevent_malloc: new ptr-libevent@0x7f498002db38 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 157 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #157 | **emit ISAKMP Message: | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | ikev2 g^x 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | ikev2 g^x 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | ikev2 g^x 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | ikev2 g^x 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | ikev2 g^x e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | ikev2 g^x d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | ikev2 g^x d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | ikev2 g^x 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | ikev2 g^x cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | ikev2 g^x 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | ikev2 g^x 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | ikev2 g^x 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | ikev2 g^x be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | ikev2 g^x eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | ikev2 g^x d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 96 03 71 a6 38 06 11 34 9c cb a1 e9 e7 c7 d6 e8 | IKEv2 nonce 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e f8 66 f0 b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 09 0b 57 c5 13 80 dd cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9d | natd_hash: port=500 | natd_hash: hash= f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb c9 e9 e7 02 | natd_hash: hash= 1a c4 28 ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb c9 e9 e7 02 | Notify data 1a c4 28 ef | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 09 0b 57 c5 13 80 dd cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | natd_hash: hash= 4f 37 b9 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | Notify data 4f 37 b9 0b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #157 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #157: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #157 to 4294967295 after switching state | Message ID: IKE #157 skipping update_recv as MD is fake | Message ID: sent #157 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.157:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | state #157 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994012288 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #157 | libevent_malloc: new ptr-libevent@0x55564da678b8 size 128 | #157 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.253309 | resume sending helper answer for #157 suppresed complete_v2_state_transition() and stole MD | #157 spent 0.53 milliseconds in resume sending helper answer | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498002db38 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0886 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.254523; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002235 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #141 | libevent_malloc: new ptr-libevent@0x7f498002db38 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #141 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.254687; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #35 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x7f499c01d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #35 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.257018; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #149 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #149 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.298322; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x55564da46448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #127 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-158' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #158 at 0x55564da66ce8 | State DB: adding IKEv2 state #158 in UNDEFINED | pstats #158 ikev2.ike started | Message ID: init #158: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #158: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #158; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-158" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-158" IKE SA #158 "road-eastnet-nonat-158" "road-eastnet-nonat-158" #158: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-158 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-158": constructed local IKE proposals for road-eastnet-nonat-158 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 158 for state #158 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #158 | libevent_malloc: new ptr-libevent@0x55564da46448 size 128 | #158 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | RESET processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-158" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 17 starting work-order 158 for state #158 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 158 | spent 0.232 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 158 time elapsed 0.000716 seconds | (#158) spent 0.719 milliseconds in crypto helper computing work-order 158: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 158 for state #158 to event queue | scheduling resume sending helper answer for #158 | libevent_malloc: new ptr-libevent@0x7f497402dc58 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 158 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #158 | **emit ISAKMP Message: | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | ikev2 g^x b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | ikev2 g^x 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | ikev2 g^x 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | ikev2 g^x 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ikev2 g^x ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | ikev2 g^x 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | ikev2 g^x 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | ikev2 g^x 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | ikev2 g^x 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | ikev2 g^x c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | ikev2 g^x 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | ikev2 g^x 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | ikev2 g^x 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | ikev2 g^x 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | ikev2 g^x e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b6 b1 43 3f 07 72 d4 5b cc de 1e 57 91 b2 01 dc | IKEv2 nonce 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 25 68 da d3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 58 d0 5a c1 9c ea 59 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9e | natd_hash: port=500 | natd_hash: hash= b8 80 ca 30 15 a2 65 66 f8 95 02 7a 64 a2 16 d3 | natd_hash: hash= b6 29 bd 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 80 ca 30 15 a2 65 66 f8 95 02 7a 64 a2 16 d3 | Notify data b6 29 bd 00 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 58 d0 5a c1 9c ea 59 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | natd_hash: hash= 66 51 39 a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | Notify data 66 51 39 a2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #158 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #158: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #158 to 4294967295 after switching state | Message ID: IKE #158 skipping update_recv as MD is fake | Message ID: sent #158 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.158:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | state #158 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da46448 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #158 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 | #158 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.311942 | resume sending helper answer for #158 suppresed complete_v2_state_transition() and stole MD | #158 spent 0.358 milliseconds in resume sending helper answer | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497402dc58 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.315089; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #36 | libevent_malloc: new ptr-libevent@0x7f497402dc58 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x7f498801d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #36 spent 0.0831 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.316423; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #150 | libevent_malloc: new ptr-libevent@0x7f498801d1f8 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x55564da5d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #150 spent 0.0802 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.316517; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #95 | libevent_malloc: new ptr-libevent@0x55564da5d668 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #95 spent 0.0675 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.320752; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #142 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #142 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.359118; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003375 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #128 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x55564da47b58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #128 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-159' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #159 at 0x55564da683f8 | State DB: adding IKEv2 state #159 in UNDEFINED | pstats #159 ikev2.ike started | Message ID: init #159: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #159: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #159; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-159" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-159" IKE SA #159 "road-eastnet-nonat-159" "road-eastnet-nonat-159" #159: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-159 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-159": constructed local IKE proposals for road-eastnet-nonat-159 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 159 for state #159 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #159 | libevent_malloc: new ptr-libevent@0x55564da47b58 size 128 | crypto helper 18 resuming | crypto helper 18 starting work-order 159 for state #159 | #159 spent 0.127 milliseconds in ikev2_parent_outI1() | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 159 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-159" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.216 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 159 time elapsed 0.000668 seconds | (#159) spent 0.671 milliseconds in crypto helper computing work-order 159: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 159 for state #159 to event queue | scheduling resume sending helper answer for #159 | libevent_malloc: new ptr-libevent@0x7f497802db68 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 159 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #159 | **emit ISAKMP Message: | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | ikev2 g^x 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | ikev2 g^x 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | ikev2 g^x 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | ikev2 g^x 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | ikev2 g^x 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | ikev2 g^x 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | ikev2 g^x 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | ikev2 g^x 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | ikev2 g^x 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | ikev2 g^x a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | ikev2 g^x 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | ikev2 g^x bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ikev2 g^x ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | ikev2 g^x 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | ikev2 g^x 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7b 6d 30 54 55 b9 0e a8 01 26 cc ad f8 2b e3 60 | IKEv2 nonce 62 df 38 2b 2d 97 ef a1 9d c7 db e5 d8 42 3c d7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 ba 73 89 75 d4 10 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9f | natd_hash: port=500 | natd_hash: hash= de 70 a8 f6 dd 8c a1 69 c4 e0 0a af 91 81 7f 61 | natd_hash: hash= bf 74 05 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 70 a8 f6 dd 8c a1 69 c4 e0 0a af 91 81 7f 61 | Notify data bf 74 05 14 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 ba 73 89 75 d4 10 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | natd_hash: hash= 85 b0 69 fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | Notify data 85 b0 69 fa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #159 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #159: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #159 to 4294967295 after switching state | Message ID: IKE #159 skipping update_recv as MD is fake | Message ID: sent #159 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.159:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | state #159 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da47b58 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab2e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #159 | libevent_malloc: new ptr-libevent@0x55564da6a748 size 128 | #159 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.370775 | resume sending helper answer for #159 suppresed complete_v2_state_transition() and stole MD | #159 spent 0.325 milliseconds in resume sending helper answer | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497802db68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.374938; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #37 | libevent_malloc: new ptr-libevent@0x7f497802db68 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #37 spent 0.0853 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.375038; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #151 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x55564da5ed78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #151 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.37747; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #96 | libevent_malloc: new ptr-libevent@0x55564da5ed78 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #96 spent 0.0845 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.381679; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #143 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #143 spent 0.0848 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.418934; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #129 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x55564da49268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #129 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-160' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #160 at 0x55564da69b78 | State DB: adding IKEv2 state #160 in UNDEFINED | pstats #160 ikev2.ike started | Message ID: init #160: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #160: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #160; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-160" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-160" IKE SA #160 "road-eastnet-nonat-160" "road-eastnet-nonat-160" #160: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-160 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-160": constructed local IKE proposals for road-eastnet-nonat-160 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 160 for state #160 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #160 | libevent_malloc: new ptr-libevent@0x55564da49268 size 128 | #160 spent 0.252 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-160" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.365 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 160 for state #160 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 160 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 160 time elapsed 0.001259 seconds | (#160) spent 1.25 milliseconds in crypto helper computing work-order 160: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 160 for state #160 to event queue | scheduling resume sending helper answer for #160 | libevent_malloc: new ptr-libevent@0x7f496c02dca8 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 160 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #160 | **emit ISAKMP Message: | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | ikev2 g^x 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | ikev2 g^x eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | ikev2 g^x 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | ikev2 g^x 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | ikev2 g^x 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | ikev2 g^x f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | ikev2 g^x dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ikev2 g^x ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | ikev2 g^x 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | ikev2 g^x 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | ikev2 g^x 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | ikev2 g^x 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | ikev2 g^x 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ikev2 g^x ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | ikev2 g^x 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 ce 67 12 a9 | IKEv2 nonce c1 6a 43 78 94 f2 14 6e 55 48 bc 92 1a 67 03 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 27 48 42 2c c3 84 4f de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a0 | natd_hash: port=500 | natd_hash: hash= 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 0c f1 e6 fa | natd_hash: hash= 34 58 4f b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 0c f1 e6 fa | Notify data 34 58 4f b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 27 48 42 2c c3 84 4f de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | natd_hash: hash= 8e a8 ef 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | Notify data 8e a8 ef 0c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #160 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #160: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #160 to 4294967295 after switching state | Message ID: IKE #160 skipping update_recv as MD is fake | Message ID: sent #160 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.160:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | state #160 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da49268 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab358 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #160 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 | #160 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.434921 | resume sending helper answer for #160 suppresed complete_v2_state_transition() and stole MD | #160 spent 0.565 milliseconds in resume sending helper answer | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c02dca8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.436164; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #38 | libevent_malloc: new ptr-libevent@0x7f496c02dca8 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #38 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.44054; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x7f49bc025638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #97 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.442924; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #152 | libevent_malloc: new ptr-libevent@0x7f49bc025638 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x55564da604f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #152 spent 0.214 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.443188; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #144 | libevent_malloc: new ptr-libevent@0x55564da604f8 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #144 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0896 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.497831; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #39 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #39 spent 0.47 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.500668; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #98 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #98 spent 0.285 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.501152; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #153 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x55564da61c08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #153 spent 0.225 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.502701; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #145 | libevent_malloc: new ptr-libevent@0x55564da61c08 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #145 spent 0.289 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.508345; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x7f49b002dad8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #130 spent 0.302 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.144 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-161' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #161 at 0x55564da6b288 | State DB: adding IKEv2 state #161 in UNDEFINED | pstats #161 ikev2.ike started | Message ID: init #161: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #161: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #161; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-161" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-161" IKE SA #161 "road-eastnet-nonat-161" "road-eastnet-nonat-161" #161: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-161 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-161": constructed local IKE proposals for road-eastnet-nonat-161 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 161 for state #161 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f49b002dad8 size 128 | #161 spent 0.328 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 161 for state #161 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 161 | RESET processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-161" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.557 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 161 time elapsed 0.002068 seconds | (#161) spent 2.07 milliseconds in crypto helper computing work-order 161: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 161 for state #161 to event queue | scheduling resume sending helper answer for #161 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 161 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #161 | **emit ISAKMP Message: | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ikev2 g^x ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | ikev2 g^x 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | ikev2 g^x 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ikev2 g^x ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | ikev2 g^x bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | ikev2 g^x 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | ikev2 g^x 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ikev2 g^x ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | ikev2 g^x 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | ikev2 g^x a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | ikev2 g^x 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | ikev2 g^x df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | ikev2 g^x 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | ikev2 g^x b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | ikev2 g^x c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 ca f3 63 38 | IKEv2 nonce 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 8a 7b 90 c6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0a 3d 55 f5 68 83 f8 0b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a1 | natd_hash: port=500 | natd_hash: hash= 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 82 f7 ea 18 | natd_hash: hash= cd f6 d7 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 82 f7 ea 18 | Notify data cd f6 d7 71 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0a 3d 55 f5 68 83 f8 0b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | natd_hash: hash= b5 5b 43 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | Notify data b5 5b 43 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #161 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #161: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #161 to 4294967295 after switching state | Message ID: IKE #161 skipping update_recv as MD is fake | Message ID: sent #161 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.161:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | state #161 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b002dad8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #161 | libevent_malloc: new ptr-libevent@0x55564da6bde8 size 128 | #161 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.51316 | resume sending helper answer for #161 suppresed complete_v2_state_transition() and stole MD | #161 spent 1.55 milliseconds in resume sending helper answer | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc030658 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.55961; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #99 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #99 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.55986; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #40 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x7f497801d798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #40 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.56123; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #154 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #154 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0914 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.564641; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002363 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #146 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x7f498402d9c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #146 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-162' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #162 at 0x55564da6ca98 | State DB: adding IKEv2 state #162 in UNDEFINED | pstats #162 ikev2.ike started | Message ID: init #162: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #162: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #162; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-162" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-162" IKE SA #162 "road-eastnet-nonat-162" "road-eastnet-nonat-162" #162: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-162 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-162": constructed local IKE proposals for road-eastnet-nonat-162 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 162 for state #162 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da61b28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #162 | libevent_malloc: new ptr-libevent@0x7f498402d9c8 size 128 | #162 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-162" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 2 resuming | spent 0.239 milliseconds in whack | crypto helper 2 starting work-order 162 for state #162 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 162 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 162 time elapsed 0.000681 seconds | (#162) spent 0.679 milliseconds in crypto helper computing work-order 162: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 162 for state #162 to event queue | scheduling resume sending helper answer for #162 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 162 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #162 | **emit ISAKMP Message: | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | ikev2 g^x 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | ikev2 g^x e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | ikev2 g^x 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | ikev2 g^x 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | ikev2 g^x 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | ikev2 g^x 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | ikev2 g^x eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | ikev2 g^x c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | ikev2 g^x 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | ikev2 g^x 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | ikev2 g^x b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | ikev2 g^x 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | ikev2 g^x 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | ikev2 g^x 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | ikev2 g^x 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 60 30 e3 db | IKEv2 nonce 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 af 7b a3 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad c7 29 65 ac 00 86 b6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a2 | natd_hash: port=500 | natd_hash: hash= 2f ff 39 97 9e b7 a5 af 42 1b 12 91 77 5d 13 63 | natd_hash: hash= b4 73 2b 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f ff 39 97 9e b7 a5 af 42 1b 12 91 77 5d 13 63 | Notify data b4 73 2b 84 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad c7 29 65 ac 00 86 b6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | natd_hash: hash= bf 48 22 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | Notify data bf 48 22 13 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #162 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #162: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #162 to 4294967295 after switching state | Message ID: IKE #162 skipping update_recv as MD is fake | Message ID: sent #162 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.162:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | state #162 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498402d9c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da61b28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #162 | libevent_malloc: new ptr-libevent@0x55564da6bf08 size 128 | #162 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.573945 | resume sending helper answer for #162 suppresed complete_v2_state_transition() and stole MD | #162 spent 0.415 milliseconds in resume sending helper answer | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4030508 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0507 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.603133; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #131 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #131 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.618513; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #100 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #100 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.62285; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #147 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #147 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.623231; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #41 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #41 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.625569; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #155 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x55564da64a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #155 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-163' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #163 at 0x55564da6e0f8 | State DB: adding IKEv2 state #163 in UNDEFINED | pstats #163 ikev2.ike started | Message ID: init #163: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #163: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #163; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-163" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-163" IKE SA #163 "road-eastnet-nonat-163" "road-eastnet-nonat-163" #163: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-163 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-163": constructed local IKE proposals for road-eastnet-nonat-163 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 163 for state #163 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #163 | libevent_malloc: new ptr-libevent@0x55564da64a98 size 128 | #163 spent 0.167 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-163" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.258 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 163 for state #163 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 163 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 163 time elapsed 0.000892 seconds | (#163) spent 0.9 milliseconds in crypto helper computing work-order 163: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 163 for state #163 to event queue | scheduling resume sending helper answer for #163 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 163 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #163 | **emit ISAKMP Message: | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | ikev2 g^x c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | ikev2 g^x 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | ikev2 g^x 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | ikev2 g^x 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | ikev2 g^x 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | ikev2 g^x 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | ikev2 g^x 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | ikev2 g^x 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | ikev2 g^x 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | ikev2 g^x 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | ikev2 g^x 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | ikev2 g^x 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | ikev2 g^x c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | ikev2 g^x f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ikev2 g^x ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce db e1 1e 0e cd f3 3e 50 bc e8 6f e1 d8 e8 eb 47 | IKEv2 nonce b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 74 60 9e ff | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 79 1b 3d 2a 0f c0 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a3 | natd_hash: port=500 | natd_hash: hash= 4d 5c 43 28 3a a0 62 a9 01 78 44 5c e1 6b 36 83 | natd_hash: hash= e3 f5 0d e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 5c 43 28 3a a0 62 a9 01 78 44 5c e1 6b 36 83 | Notify data e3 f5 0d e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 79 1b 3d 2a 0f c0 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | natd_hash: hash= cb 45 d8 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | Notify data cb 45 d8 57 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #163 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #163: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #163 to 4294967295 after switching state | Message ID: IKE #163 skipping update_recv as MD is fake | Message ID: sent #163 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.163:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | state #163 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da64a98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #163 | libevent_malloc: new ptr-libevent@0x55564da70398 size 128 | #163 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.636963 | resume sending helper answer for #163 suppresed complete_v2_state_transition() and stole MD | #163 spent 0.493 milliseconds in resume sending helper answer | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8030f68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.665196; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #132 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #132 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.678552; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #101 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x55564da37cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #101 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.687855; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #42 | libevent_malloc: new ptr-libevent@0x55564da37cb8 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #42 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.693135; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #156 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #156 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.694434; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #148 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x7f497c02dc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #148 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-164' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #164 at 0x55564da6f758 | State DB: adding IKEv2 state #164 in UNDEFINED | pstats #164 ikev2.ike started | Message ID: init #164: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #164: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #164; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-164" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-164" IKE SA #164 "road-eastnet-nonat-164" "road-eastnet-nonat-164" #164: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-164 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-164": constructed local IKE proposals for road-eastnet-nonat-164 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 164 for state #164 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ca8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #164 | libevent_malloc: new ptr-libevent@0x7f497c02dc08 size 128 | #164 spent 0.117 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-164" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.171 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | crypto helper 5 resuming | Message ID: 0 (0x0) | length: 452 (0x1c4) | crypto helper 5 starting work-order 164 for state #164 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 164 | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 164 time elapsed 0.00055 seconds | (#164) spent 0.554 milliseconds in crypto helper computing work-order 164: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 164 for state #164 to event queue | scheduling resume sending helper answer for #164 | libevent_malloc: new ptr-libevent@0x7f49ac033308 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 164 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #164 | **emit ISAKMP Message: | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | ikev2 g^x da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | ikev2 g^x e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | ikev2 g^x 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | ikev2 g^x b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | ikev2 g^x 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | ikev2 g^x 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | ikev2 g^x 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | ikev2 g^x b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | ikev2 g^x 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | ikev2 g^x 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | ikev2 g^x a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | ikev2 g^x f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | ikev2 g^x 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | ikev2 g^x 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | ikev2 g^x cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d a6 cd a8 5e | IKEv2 nonce c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 dd 06 2e 07 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ac ee 04 c8 10 c0 50 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a4 | natd_hash: port=500 | natd_hash: hash= a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 12 47 db 14 | natd_hash: hash= 3b 24 02 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 12 47 db 14 | Notify data 3b 24 02 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ac ee 04 c8 10 c0 50 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | natd_hash: hash= e8 7d 8d 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | Notify data e8 7d 8d 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #164 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #164: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #164 to 4294967295 after switching state | Message ID: IKE #164 skipping update_recv as MD is fake | Message ID: sent #164 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.164:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | state #164 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c02dc08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ca8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #164 | libevent_malloc: new ptr-libevent@0x55564da71aa8 size 128 | #164 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.695742 | resume sending helper answer for #164 suppresed complete_v2_state_transition() and stole MD | #164 spent 0.338 milliseconds in resume sending helper answer | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac033308 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.727951; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002611 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #133 | libevent_malloc: new ptr-libevent@0x7f49ac033308 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #133 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.737431; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #102 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x55564da39438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #102 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0517 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.749775; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #43 | libevent_malloc: new ptr-libevent@0x55564da39438 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x55564da0ac68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #43 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.752139; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #157 | libevent_malloc: new ptr-libevent@0x55564da0ac68 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x55564da678b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #157 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0944 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-165' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #165 at 0x55564da70ed8 | State DB: adding IKEv2 state #165 in UNDEFINED | pstats #165 ikev2.ike started | Message ID: init #165: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #165: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #165; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-165" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-165" IKE SA #165 "road-eastnet-nonat-165" "road-eastnet-nonat-165" #165: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-165 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-165": constructed local IKE proposals for road-eastnet-nonat-165 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 165 for state #165 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #165 | libevent_malloc: new ptr-libevent@0x55564da678b8 size 128 | crypto helper 6 resuming | #165 spent 0.195 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 165 for state #165 | RESET processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-165" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 165 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.31 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 165 time elapsed 0.000778 seconds | (#165) spent 0.781 milliseconds in crypto helper computing work-order 165: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 165 for state #165 to event queue | scheduling resume sending helper answer for #165 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 | crypto helper 6 waiting (nothing to do) | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.758691; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #149 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x7f499c01d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #149 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 165 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #165 | **emit ISAKMP Message: | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | ikev2 g^x 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | ikev2 g^x 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | ikev2 g^x 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ikev2 g^x ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | ikev2 g^x 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | ikev2 g^x 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | ikev2 g^x bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | ikev2 g^x 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | ikev2 g^x b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | ikev2 g^x 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | ikev2 g^x 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | ikev2 g^x e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | ikev2 g^x f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | ikev2 g^x a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | ikev2 g^x be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c5 51 df c9 e9 b3 35 65 e3 28 fb 2a ca 41 25 9b | IKEv2 nonce 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b d8 18 04 6d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1e de 98 27 29 67 da 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a5 | natd_hash: port=500 | natd_hash: hash= ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 08 c2 31 89 | natd_hash: hash= 27 02 72 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 08 c2 31 89 | Notify data 27 02 72 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1e de 98 27 29 67 da 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | natd_hash: hash= c4 32 0c ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | Notify data c4 32 0c ab | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #165 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #165: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #165 to 4294967295 after switching state | Message ID: IKE #165 skipping update_recv as MD is fake | Message ID: sent #165 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.165:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | state #165 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da678b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #165 | libevent_malloc: new ptr-libevent@0x55564da73228 size 128 | #165 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.759537 | resume sending helper answer for #165 suppresed complete_v2_state_transition() and stole MD | #165 spent 0.607 milliseconds in resume sending helper answer | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0033238 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0904 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0788 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.790882; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #134 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x7f49a002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #134 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.800216; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #103 | libevent_malloc: new ptr-libevent@0x7f49a002da88 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x55564da39558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #103 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.809505; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #44 | libevent_malloc: new ptr-libevent@0x55564da39558 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #44 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.811765; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #158 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #158 spent 0.0976 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.817018; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #150 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x7f498801d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #150 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-166' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #166 at 0x55564da725e8 | State DB: adding IKEv2 state #166 in UNDEFINED | pstats #166 ikev2.ike started | Message ID: init #166: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #166: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #166; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-166" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-166" IKE SA #166 "road-eastnet-nonat-166" "road-eastnet-nonat-166" #166: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-166 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-166": constructed local IKE proposals for road-eastnet-nonat-166 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 166 for state #166 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da021d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #166 | libevent_malloc: new ptr-libevent@0x7f498801d1f8 size 128 | #166 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | RESET processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 starting work-order 166 for state #166 | RESET processing: connection "road-eastnet-nonat-166" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 166 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 166 time elapsed 0.000986 seconds | (#166) spent 0.991 milliseconds in crypto helper computing work-order 166: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 166 for state #166 to event queue | scheduling resume sending helper answer for #166 | libevent_malloc: new ptr-libevent@0x7f49a40333b8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 166 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #166 | **emit ISAKMP Message: | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | ikev2 g^x 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | ikev2 g^x 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | ikev2 g^x 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | ikev2 g^x 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | ikev2 g^x d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | ikev2 g^x c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | ikev2 g^x 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | ikev2 g^x a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | ikev2 g^x c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | ikev2 g^x 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | ikev2 g^x 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | ikev2 g^x a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | ikev2 g^x c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | ikev2 g^x 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | ikev2 g^x 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f 33 cb 8d 7f | IKEv2 nonce 03 64 c6 c9 fb b7 67 65 76 5f fb 4a 8a b5 0f 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 29 84 d7 e5 06 c9 7a c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a6 | natd_hash: port=500 | natd_hash: hash= 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 e2 f6 fb 12 | natd_hash: hash= f8 32 58 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 e2 f6 fb 12 | Notify data f8 32 58 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 29 84 d7 e5 06 c9 7a c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | natd_hash: hash= 18 b6 b9 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | Notify data 18 b6 b9 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #166 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #166: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #166 to 4294967295 after switching state | Message ID: IKE #166 skipping update_recv as MD is fake | Message ID: sent #166 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.166:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | state #166 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498801d1f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da021d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #166 | libevent_malloc: new ptr-libevent@0x55564da74938 size 128 | #166 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.825986 | resume sending helper answer for #166 suppresed complete_v2_state_transition() and stole MD | #166 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40333b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.848201; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #135 | libevent_malloc: new ptr-libevent@0x7f49a40333b8 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #135 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0797 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.866592; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #104 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #104 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0986 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.870941; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #159 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x55564da6a748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #159 spent 0.0843 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.871043; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004193 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #45 | libevent_malloc: new ptr-libevent@0x55564da6a748 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #45 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.876297; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #151 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #151 spent 0.0885 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0531 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-167' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #167 at 0x55564da73d68 | State DB: adding IKEv2 state #167 in UNDEFINED | pstats #167 ikev2.ike started | Message ID: init #167: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #167: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #167; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-167" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-167" IKE SA #167 "road-eastnet-nonat-167" "road-eastnet-nonat-167" #167: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-167 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-167": constructed local IKE proposals for road-eastnet-nonat-167 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 167 for state #167 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da0da68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #167 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 | #167 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 167 for state #167 | RESET processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 167 | RESET processing: connection "road-eastnet-nonat-167" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.262 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 167 time elapsed 0.000728 seconds | (#167) spent 0.715 milliseconds in crypto helper computing work-order 167: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 167 for state #167 to event queue | scheduling resume sending helper answer for #167 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 167 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #167 | **emit ISAKMP Message: | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | ikev2 g^x bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | ikev2 g^x 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | ikev2 g^x 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | ikev2 g^x 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | ikev2 g^x 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | ikev2 g^x 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | ikev2 g^x 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | ikev2 g^x 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | ikev2 g^x 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | ikev2 g^x 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ikev2 g^x ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | ikev2 g^x 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ikev2 g^x ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | ikev2 g^x 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | ikev2 g^x b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 cc 5c 34 fb | IKEv2 nonce 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe e8 8a cf 16 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 41 90 23 db 81 bd 65 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a7 | natd_hash: port=500 | natd_hash: hash= ad 00 21 97 40 72 15 d4 15 aa f8 57 17 e1 0c 6a | natd_hash: hash= 19 2c 15 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ad 00 21 97 40 72 15 d4 15 aa f8 57 17 e1 0c 6a | Notify data 19 2c 15 68 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 41 90 23 db 81 bd 65 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | natd_hash: hash= d7 8a ae ba | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | Notify data d7 8a ae ba | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #167 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #167: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #167 to 4294967295 after switching state | Message ID: IKE #167 skipping update_recv as MD is fake | Message ID: sent #167 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.167:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | state #167 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da0da68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #167 | libevent_malloc: new ptr-libevent@0x55564da760b8 size 128 | #167 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.885629 | resume sending helper answer for #167 suppresed complete_v2_state_transition() and stole MD | #167 spent 0.335 milliseconds in resume sending helper answer | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a80333d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.908863; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #136 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #136 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.926256; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003308 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #105 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x55564da3f0f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #105 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.933519; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #46 | libevent_malloc: new ptr-libevent@0x55564da3f0f8 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #46 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10586.934869; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499948 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #160 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #160 spent 0.0881 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10586.943115; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #152 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x7f49bc025638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #152 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-168' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #168 at 0x55564da75478 | State DB: adding IKEv2 state #168 in UNDEFINED | pstats #168 ikev2.ike started | Message ID: init #168: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #168: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #168; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-168" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-168" IKE SA #168 "road-eastnet-nonat-168" "road-eastnet-nonat-168" #168: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-168 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-168": constructed local IKE proposals for road-eastnet-nonat-168 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 168 for state #168 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #168 | libevent_malloc: new ptr-libevent@0x7f49bc025638 size 128 | #168 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 168 for state #168 | RESET processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 168 | RESET processing: connection "road-eastnet-nonat-168" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 168 time elapsed 0.000964 seconds | (#168) spent 0.969 milliseconds in crypto helper computing work-order 168: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 168 for state #168 to event queue | scheduling resume sending helper answer for #168 | libevent_malloc: new ptr-libevent@0x7f499c0333b8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 168 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #168 | **emit ISAKMP Message: | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | ikev2 g^x 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | ikev2 g^x 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | ikev2 g^x 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | ikev2 g^x 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | ikev2 g^x 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | ikev2 g^x 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | ikev2 g^x 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | ikev2 g^x e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | ikev2 g^x 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | ikev2 g^x e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | ikev2 g^x a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | ikev2 g^x 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | ikev2 g^x 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | ikev2 g^x 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | ikev2 g^x b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 53 b9 4f 89 | IKEv2 nonce f5 56 03 af fe e6 9c 68 2e f9 46 08 2e 29 65 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4e be 23 ba ab 02 b0 d7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a8 | natd_hash: port=500 | natd_hash: hash= 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e 4a b1 d7 79 | natd_hash: hash= 98 43 b4 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e 4a b1 d7 79 | Notify data 98 43 b4 d1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4e be 23 ba ab 02 b0 d7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | natd_hash: hash= a1 5c 47 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | Notify data a1 5c 47 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #168 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #168: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #168 to 4294967295 after switching state | Message ID: IKE #168 skipping update_recv as MD is fake | Message ID: sent #168 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.168:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | state #168 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc025638 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564da77838 size 128 | #168 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10586.946334 | resume sending helper answer for #168 suppresed complete_v2_state_transition() and stole MD | #168 spent 0.543 milliseconds in resume sending helper answer | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0333b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10586.967623; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001773 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #137 | libevent_malloc: new ptr-libevent@0x7f499c0333b8 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #137 spent 0.192 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0851 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10586.985092; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #106 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x55564da10928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #106 spent 0.261 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10586.99168; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #47 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x7f49a4022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #47 spent 0.282 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.002282; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #153 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #153 spent 0.265 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.012853; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x55564da6bde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #161 spent 0.277 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-169' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #169 at 0x55564da76bf8 | State DB: adding IKEv2 state #169 in UNDEFINED | pstats #169 ikev2.ike started | Message ID: init #169: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #169: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #169; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-169" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-169" IKE SA #169 "road-eastnet-nonat-169" "road-eastnet-nonat-169" #169: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-169 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-169": constructed local IKE proposals for road-eastnet-nonat-169 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 169 for state #169 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564da6bde8 size 128 | #169 spent 0.354 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 169 for state #169 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 169 | RESET processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-169" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.596 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 169 time elapsed 0.002008 seconds | (#169) spent 1.98 milliseconds in crypto helper computing work-order 169: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 169 for state #169 to event queue | scheduling resume sending helper answer for #169 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 169 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #169 | **emit ISAKMP Message: | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | ikev2 g^x b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | ikev2 g^x 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | ikev2 g^x c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | ikev2 g^x d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | ikev2 g^x b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | ikev2 g^x c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | ikev2 g^x a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | ikev2 g^x d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | ikev2 g^x 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | ikev2 g^x e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | ikev2 g^x d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | ikev2 g^x 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | ikev2 g^x 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | ikev2 g^x da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | ikev2 g^x 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cc 12 28 83 39 c0 2c 70 d9 44 eb 7c 2f 9c 02 6f | IKEv2 nonce 22 e7 35 9f 44 05 87 85 32 1a d7 2c a3 38 ca ec | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b4 50 e2 0c 5e 85 1a 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a9 | natd_hash: port=500 | natd_hash: hash= 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 32 b6 7b a5 | natd_hash: hash= 50 f6 f5 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 32 b6 7b a5 | Notify data 50 f6 f5 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b4 50 e2 0c 5e 85 1a 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | natd_hash: hash= 8d a1 5e 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | Notify data 8d a1 5e 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #169 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #169: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #169 to 4294967295 after switching state | Message ID: IKE #169 skipping update_recv as MD is fake | Message ID: sent #169 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.169:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | state #169 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da6bde8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564da78fb8 size 128 | #169 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.024032 | resume sending helper answer for #169 suppresed complete_v2_state_transition() and stole MD | #169 spent 0.987 milliseconds in resume sending helper answer | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00332f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.13 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.045439; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #107 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x55564da120a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #107 spent 0.287 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.144 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.053053; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005888 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #48 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #48 spent 0.254 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.058669; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #138 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.062303; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #154 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x7f497801d798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #154 spent 0.249 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.128 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.074871; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #162 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x55564da6bf08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #162 spent 0.355 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-170' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #170 at 0x55564da78378 | State DB: adding IKEv2 state #170 in UNDEFINED | pstats #170 ikev2.ike started | Message ID: init #170: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #170: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #170; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-170" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-170" IKE SA #170 "road-eastnet-nonat-170" "road-eastnet-nonat-170" #170: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-170 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-170": constructed local IKE proposals for road-eastnet-nonat-170 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 170 for state #170 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da61b28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #170 | libevent_malloc: new ptr-libevent@0x55564da6bf08 size 128 | #170 spent 0.302 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-170" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 resuming | crypto helper 11 starting work-order 170 for state #170 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.505 milliseconds in whack | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 170 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 170 time elapsed 0.001622 seconds | (#170) spent 1.62 milliseconds in crypto helper computing work-order 170: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 170 for state #170 to event queue | scheduling resume sending helper answer for #170 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 170 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #170 | **emit ISAKMP Message: | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | ikev2 g^x a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | ikev2 g^x f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | ikev2 g^x 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | ikev2 g^x 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | ikev2 g^x 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | ikev2 g^x 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | ikev2 g^x a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | ikev2 g^x 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | ikev2 g^x 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | ikev2 g^x 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | ikev2 g^x 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | ikev2 g^x 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | ikev2 g^x 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | ikev2 g^x 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | ikev2 g^x 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 85 6f aa 0b 51 83 7b f3 12 3d a1 06 08 ae 5f d6 | IKEv2 nonce 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 dc c6 3d ae | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7e 24 f3 c8 38 6b 0d 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 aa | natd_hash: port=500 | natd_hash: hash= a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f 57 b7 97 ca | natd_hash: hash= dc d8 1e d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f 57 b7 97 ca | Notify data dc d8 1e d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7e 24 f3 c8 38 6b 0d 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | natd_hash: hash= 9d e8 44 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | Notify data 9d e8 44 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #170 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #170: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #170 to 4294967295 after switching state | Message ID: IKE #170 skipping update_recv as MD is fake | Message ID: sent #170 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.170:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | state #170 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da6bf08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da61b28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #170 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 | #170 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.099425 | resume sending helper answer for #170 suppresed complete_v2_state_transition() and stole MD | #170 spent 1.09 milliseconds in resume sending helper answer | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49940334c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.10578; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #108 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x55564da41f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #108 spent 0.272 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.113351; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #49 | libevent_malloc: new ptr-libevent@0x55564da41f18 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #49 spent 0.259 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.124932; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #139 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #139 spent 0.401 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.126725; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #155 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #155 spent 0.273 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.13733; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #163 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x55564da70398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #163 spent 0.384 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-171' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #171 at 0x55564da79af8 | State DB: adding IKEv2 state #171 in UNDEFINED | pstats #171 ikev2.ike started | Message ID: init #171: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #171: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #171; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-171" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-171" IKE SA #171 "road-eastnet-nonat-171" "road-eastnet-nonat-171" #171: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-171 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-171": constructed local IKE proposals for road-eastnet-nonat-171 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 171 for state #171 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #171 | libevent_malloc: new ptr-libevent@0x55564da70398 size 128 | #171 spent 0.184 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | crypto helper 12 starting work-order 171 for state #171 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 171 | RESET processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-171" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.324 milliseconds in whack | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.165407; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #109 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x55564da43628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #109 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0945 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 171 time elapsed 0.001208 seconds | (#171) spent 1.21 milliseconds in crypto helper computing work-order 171: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 171 for state #171 to event queue | scheduling resume sending helper answer for #171 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 171 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #171 | **emit ISAKMP Message: | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | ikev2 g^x c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | ikev2 g^x 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | ikev2 g^x 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | ikev2 g^x be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | ikev2 g^x 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | ikev2 g^x b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | ikev2 g^x 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | ikev2 g^x 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | ikev2 g^x 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | ikev2 g^x 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | ikev2 g^x 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | ikev2 g^x 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | ikev2 g^x f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | ikev2 g^x 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | ikev2 g^x c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b a4 da 4d a4 | IKEv2 nonce ac 6a cb 8a c6 10 28 46 1d c5 38 c6 16 2f 9b b1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 96 c6 95 a1 eb 4d 3e 17 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ab | natd_hash: port=500 | natd_hash: hash= 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 a4 91 86 43 | natd_hash: hash= 43 ca 29 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 a4 91 86 43 | Notify data 43 ca 29 8a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 96 c6 95 a1 eb 4d 3e 17 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | natd_hash: hash= 52 db 1e c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | Notify data 52 db 1e c4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #171 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #171: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #171 to 4294967295 after switching state | Message ID: IKE #171 skipping update_recv as MD is fake | Message ID: sent #171 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.171:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | state #171 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da70398 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #171 | libevent_malloc: new ptr-libevent@0x55564da7a5e8 size 128 | #171 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.167099 | resume sending helper answer for #171 suppresed complete_v2_state_transition() and stole MD | #171 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998033358 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0815 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.173353; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #50 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #50 spent 0.199 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0879 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.186801; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #140 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #140 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.19417; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #156 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #156 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.196536; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500794 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #164 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x55564da71aa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #164 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-172' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #172 at 0x55564da7b208 | State DB: adding IKEv2 state #172 in UNDEFINED | pstats #172 ikev2.ike started | Message ID: init #172: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #172: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #172; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-172" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-172" IKE SA #172 "road-eastnet-nonat-172" "road-eastnet-nonat-172" #172: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-172 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-172": constructed local IKE proposals for road-eastnet-nonat-172 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 172 for state #172 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ca8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #172 | libevent_malloc: new ptr-libevent@0x55564da71aa8 size 128 | #172 spent 0.239 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 172 for state #172 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 172 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-172" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.348 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 172 time elapsed 0.000729 seconds | (#172) spent 0.732 milliseconds in crypto helper computing work-order 172: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 172 for state #172 to event queue | scheduling resume sending helper answer for #172 | libevent_malloc: new ptr-libevent@0x7f498c033248 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 172 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #172 | **emit ISAKMP Message: | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ikev2 g^x ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | ikev2 g^x fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | ikev2 g^x dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | ikev2 g^x 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | ikev2 g^x 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | ikev2 g^x af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | ikev2 g^x 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | ikev2 g^x 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | ikev2 g^x 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | ikev2 g^x b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | ikev2 g^x 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | ikev2 g^x 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | ikev2 g^x 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | ikev2 g^x 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | ikev2 g^x 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f 2d 37 de f7 | IKEv2 nonce a6 0b d3 ea ea ad 28 82 59 bc cc 5a 04 24 e8 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 d7 f7 fa 0d 30 7f f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ac | natd_hash: port=500 | natd_hash: hash= a6 73 b5 88 41 bf 4c f3 e7 64 71 fb 7d 1e 08 33 | natd_hash: hash= 3d 0f 63 fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 73 b5 88 41 bf 4c f3 e7 64 71 fb 7d 1e 08 33 | Notify data 3d 0f 63 fc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 d7 f7 fa 0d 30 7f f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | natd_hash: hash= 51 f3 35 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | Notify data 51 f3 35 14 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #172 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #172: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #172 to 4294967295 after switching state | Message ID: IKE #172 skipping update_recv as MD is fake | Message ID: sent #172 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.172:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | state #172 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da71aa8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ca8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #172 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 | #172 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.228277 | resume sending helper answer for #172 suppresed complete_v2_state_transition() and stole MD | #172 spent 0.422 milliseconds in resume sending helper answer | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c033248 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0501 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.232552; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #51 | libevent_malloc: new ptr-libevent@0x7f498c033248 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #51 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.238931; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #110 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x7f4990028278 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #110 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.253303; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #157 | libevent_malloc: new ptr-libevent@0x7f4990028278 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x55564da0ac68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #157 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.254658; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #141 | libevent_malloc: new ptr-libevent@0x55564da0ac68 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x7f498002db38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #141 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.258988; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #165 | libevent_malloc: new ptr-libevent@0x7f498002db38 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x55564da73228 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #165 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-173' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #173 at 0x55564da7ca18 | State DB: adding IKEv2 state #173 in UNDEFINED | pstats #173 ikev2.ike started | Message ID: init #173: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #173: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #173; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-173" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-173" IKE SA #173 "road-eastnet-nonat-173" "road-eastnet-nonat-173" #173: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-173 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-173": constructed local IKE proposals for road-eastnet-nonat-173 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 173 for state #173 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #173 | libevent_malloc: new ptr-libevent@0x55564da73228 size 128 | #173 spent 0.159 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 173 for state #173 | RESET processing: connection "road-eastnet-nonat-173" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 173 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.305 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 173 time elapsed 0.000809 seconds | (#173) spent 0.812 milliseconds in crypto helper computing work-order 173: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 173 for state #173 to event queue | scheduling resume sending helper answer for #173 | libevent_malloc: new ptr-libevent@0x7f49900332f8 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 173 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #173 | **emit ISAKMP Message: | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | ikev2 g^x af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ikev2 g^x ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | ikev2 g^x 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | ikev2 g^x 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | ikev2 g^x 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | ikev2 g^x 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | ikev2 g^x c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | ikev2 g^x b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | ikev2 g^x 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | ikev2 g^x b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | ikev2 g^x 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | ikev2 g^x 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | ikev2 g^x c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | ikev2 g^x 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | ikev2 g^x 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 46 ca ef 1b | IKEv2 nonce e6 cb eb ac ff c5 bc 97 38 a0 03 27 a9 d3 f3 fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e1 a1 08 59 c3 18 fb f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ad | natd_hash: port=500 | natd_hash: hash= ba 1a db 9c b2 48 ab c3 a5 10 a0 92 4f ab 0c ca | natd_hash: hash= 65 44 1a df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 1a db 9c b2 48 ab c3 a5 10 a0 92 4f ab 0c ca | Notify data 65 44 1a df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e1 a1 08 59 c3 18 fb f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | natd_hash: hash= 1c 4b f0 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | Notify data 1c 4b f0 10 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #173 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #173: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #173 to 4294967295 after switching state | Message ID: IKE #173 skipping update_recv as MD is fake | Message ID: sent #173 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.173:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | state #173 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da73228 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #173 | libevent_malloc: new ptr-libevent@0x55564da71a48 size 128 | #173 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.288973 | resume sending helper answer for #173 suppresed complete_v2_state_transition() and stole MD | #173 spent 0.859 milliseconds in resume sending helper answer | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49900332f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.293206; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f49900332f8 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x7f498401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #52 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0893 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.312618; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #158 | libevent_malloc: new ptr-libevent@0x7f498401d1f8 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #158 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.314985; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #111 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #111 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.321267; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #142 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #142 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.326563; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #166 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x55564da74938 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #166 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.095 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-174' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #174 at 0x55564da7e078 | State DB: adding IKEv2 state #174 in UNDEFINED | pstats #174 ikev2.ike started | Message ID: init #174: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #174: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #174; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-174" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-174" IKE SA #174 "road-eastnet-nonat-174" "road-eastnet-nonat-174" #174: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-174 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-174": constructed local IKE proposals for road-eastnet-nonat-174 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 174 for state #174 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da021d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #174 | libevent_malloc: new ptr-libevent@0x55564da74938 size 128 | #174 spent 0.162 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-174" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 15 resuming | spent 0.27 milliseconds in whack | crypto helper 15 starting work-order 174 for state #174 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 174 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 174 time elapsed 0.000714 seconds | (#174) spent 0.733 milliseconds in crypto helper computing work-order 174: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 174 for state #174 to event queue | scheduling resume sending helper answer for #174 | libevent_malloc: new ptr-libevent@0x7f49840331d8 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 174 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #174 | **emit ISAKMP Message: | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | ikev2 g^x 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | ikev2 g^x 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | ikev2 g^x 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | ikev2 g^x 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | ikev2 g^x 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | ikev2 g^x b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | ikev2 g^x d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | ikev2 g^x 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | ikev2 g^x 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | ikev2 g^x 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | ikev2 g^x 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | ikev2 g^x 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | ikev2 g^x 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | ikev2 g^x 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | ikev2 g^x 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 8d 63 43 0d | IKEv2 nonce 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 03 83 7b 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 4d 73 b7 8c f1 08 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ae | natd_hash: port=500 | natd_hash: hash= b3 26 68 3a 07 63 fc cb 10 58 29 dc 72 11 d7 66 | natd_hash: hash= b9 8d a9 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 26 68 3a 07 63 fc cb 10 58 29 dc 72 11 d7 66 | Notify data b9 8d a9 06 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 4d 73 b7 8c f1 08 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | natd_hash: hash= 5f a9 71 c3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | Notify data 5f a9 71 c3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #174 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #174: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #174 to 4294967295 after switching state | Message ID: IKE #174 skipping update_recv as MD is fake | Message ID: sent #174 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.174:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | state #174 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da74938 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da021d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #174 | libevent_malloc: new ptr-libevent@0x55564da802a8 size 128 | #174 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.349982 | resume sending helper answer for #174 suppresed complete_v2_state_transition() and stole MD | #174 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49840331d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.354172; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005704 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f49840331d8 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x7f49a40179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #53 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.372496; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001721 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #159 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #159 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.374836; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #112 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #112 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.382312; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #143 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #143 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.386698; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #167 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x55564da760b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #167 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-175' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #175 at 0x55564da7f6d8 | State DB: adding IKEv2 state #175 in UNDEFINED | pstats #175 ikev2.ike started | Message ID: init #175: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #175: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #175; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-175" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-175" IKE SA #175 "road-eastnet-nonat-175" "road-eastnet-nonat-175" #175: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-175 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-175": constructed local IKE proposals for road-eastnet-nonat-175 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 175 for state #175 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da0da68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #175 | libevent_malloc: new ptr-libevent@0x55564da760b8 size 128 | crypto helper 16 resuming | #175 spent 0.191 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 175 for state #175 | RESET processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-175" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 175 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.295 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 175 time elapsed 0.000639 seconds | (#175) spent 0.642 milliseconds in crypto helper computing work-order 175: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 175 for state #175 to event queue | scheduling resume sending helper answer for #175 | libevent_malloc: new ptr-libevent@0x7f4988033358 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 175 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #175 | **emit ISAKMP Message: | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | ikev2 g^x a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | ikev2 g^x 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | ikev2 g^x 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | ikev2 g^x 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | ikev2 g^x 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | ikev2 g^x 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | ikev2 g^x 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | ikev2 g^x b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | ikev2 g^x 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | ikev2 g^x 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | ikev2 g^x 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | ikev2 g^x f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | ikev2 g^x fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ikev2 g^x ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | ikev2 g^x b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 17 5e bb f4 fe fe 60 f4 db 3a d7 7f 70 ab a5 bc | IKEv2 nonce df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 05 2c d1 f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f6 4f f2 99 fc 76 c9 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 af | natd_hash: port=500 | natd_hash: hash= 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b 6c a4 2a 57 | natd_hash: hash= cc 92 b9 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b 6c a4 2a 57 | Notify data cc 92 b9 65 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f6 4f f2 99 fc 76 c9 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | natd_hash: hash= 74 fb 56 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | Notify data 74 fb 56 36 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #175 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #175: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #175 to 4294967295 after switching state | Message ID: IKE #175 skipping update_recv as MD is fake | Message ID: sent #175 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.175:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | state #175 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da760b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da0da68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #175 | libevent_malloc: new ptr-libevent@0x55564da819b8 size 128 | #175 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.408867 | resume sending helper answer for #175 suppresed complete_v2_state_transition() and stole MD | #175 spent 0.372 milliseconds in resume sending helper answer | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988033358 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.435051; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #113 | libevent_malloc: new ptr-libevent@0x7f4988033358 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #113 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.436331; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #160 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #160 spent 0.0869 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.442578; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #54 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #54 spent 0.0906 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.443841; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #144 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | libevent_free: release ptr-libevent@0x55564da604f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #144 spent 0.0934 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.446076; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564da604f8 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x55564da77838 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #168 spent 0.081 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-176' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #176 at 0x55564da80de8 | State DB: adding IKEv2 state #176 in UNDEFINED | pstats #176 ikev2.ike started | Message ID: init #176: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #176: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #176; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-176" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-176" IKE SA #176 "road-eastnet-nonat-176" "road-eastnet-nonat-176" #176: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-176 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-176": constructed local IKE proposals for road-eastnet-nonat-176 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 176 for state #176 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #176 | libevent_malloc: new ptr-libevent@0x55564da77838 size 128 | #176 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-176" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 1 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 1 starting work-order 176 for state #176 | spent 0.591 milliseconds in whack | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 176 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 176 time elapsed 0.000632 seconds | (#176) spent 0.637 milliseconds in crypto helper computing work-order 176: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 176 for state #176 to event queue | scheduling resume sending helper answer for #176 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 176 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #176 | **emit ISAKMP Message: | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | ikev2 g^x 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | ikev2 g^x 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ikev2 g^x ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | ikev2 g^x d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | ikev2 g^x a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | ikev2 g^x 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ikev2 g^x ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | ikev2 g^x d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | ikev2 g^x e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | ikev2 g^x 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | ikev2 g^x 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | ikev2 g^x df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | ikev2 g^x 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | ikev2 g^x d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | ikev2 g^x 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 90 81 5b c4 | IKEv2 nonce db 56 6d f9 c6 29 78 69 c6 14 10 a8 df 0a d8 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 69 cd f5 1e aa e9 8e 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b0 | natd_hash: port=500 | natd_hash: hash= 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 0f be a2 34 | natd_hash: hash= 92 7b 8a 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 0f be a2 34 | Notify data 92 7b 8a 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 69 cd f5 1e aa e9 8e 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | natd_hash: hash= 7d 93 c6 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | Notify data 7d 93 c6 56 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #176 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #176: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #176 to 4294967295 after switching state | Message ID: IKE #176 skipping update_recv as MD is fake | Message ID: sent #176 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.176:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | state #176 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da77838 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #176 | libevent_malloc: new ptr-libevent@0x55564da830c8 size 128 | #176 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.468531 | resume sending helper answer for #176 suppresed complete_v2_state_transition() and stole MD | #176 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c01d2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.493814; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #114 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x55564da49188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #114 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.503092; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #145 | libevent_malloc: new ptr-libevent@0x55564da49188 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x55564da61c08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #145 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.505427; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #55 | libevent_malloc: new ptr-libevent@0x55564da61c08 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #55 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.513782; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #161 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.524095; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #169 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x55564da78fb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #169 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0861 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-177' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #177 at 0x55564da824f8 | State DB: adding IKEv2 state #177 in UNDEFINED | pstats #177 ikev2.ike started | Message ID: init #177: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #177: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #177; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-177" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-177" IKE SA #177 "road-eastnet-nonat-177" "road-eastnet-nonat-177" #177: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-177 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-177": constructed local IKE proposals for road-eastnet-nonat-177 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 177 for state #177 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #177 | libevent_malloc: new ptr-libevent@0x55564da78fb8 size 128 | #177 spent 0.176 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 177 for state #177 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 177 | RESET processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-177" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.278 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 177 time elapsed 0.000799 seconds | (#177) spent 0.805 milliseconds in crypto helper computing work-order 177: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 177 for state #177 to event queue | scheduling resume sending helper answer for #177 | libevent_malloc: new ptr-libevent@0x7f49800333a8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 177 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #177 | **emit ISAKMP Message: | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | ikev2 g^x 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | ikev2 g^x 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | ikev2 g^x 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | ikev2 g^x be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | ikev2 g^x d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | ikev2 g^x 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | ikev2 g^x 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | ikev2 g^x 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | ikev2 g^x 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | ikev2 g^x 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | ikev2 g^x 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | ikev2 g^x 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | ikev2 g^x 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | ikev2 g^x be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ikev2 g^x ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d5 aa bc f6 80 e4 eb e9 21 6f 4b ee ee fa fd eb | IKEv2 nonce f8 12 f8 62 20 01 c9 b7 84 6a b5 9f a8 1e 6e 3a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b9 e1 84 ca ff cb 19 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b1 | natd_hash: port=500 | natd_hash: hash= 23 f8 65 79 13 ac 74 bb c8 c9 73 3f 20 ab 31 cc | natd_hash: hash= 27 ae 97 e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 f8 65 79 13 ac 74 bb c8 c9 73 3f 20 ab 31 cc | Notify data 27 ae 97 e4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b9 e1 84 ca ff cb 19 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | natd_hash: hash= 89 0c f2 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | Notify data 89 0c f2 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #177 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #177: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #177 to 4294967295 after switching state | Message ID: IKE #177 skipping update_recv as MD is fake | Message ID: sent #177 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.177:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | state #177 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da78fb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #177 | libevent_malloc: new ptr-libevent@0x55564da847d8 size 128 | #177 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.530592 | resume sending helper answer for #177 suppresed complete_v2_state_transition() and stole MD | #177 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49800333a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.554059; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #115 | libevent_malloc: new ptr-libevent@0x7f49800333a8 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #115 spent 0.258 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.119 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.56268; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #56 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #56 spent 0.341 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.565505; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #146 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #146 spent 0.357 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.184 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.576323; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #162 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x7f497801d798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #162 spent 0.395 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.225 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.600218; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #170 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #170 spent 0.434 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.234 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.614131; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #116 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x7f4998017bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #116 spent 0.407 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-178' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #178 at 0x55564da83c08 | State DB: adding IKEv2 state #178 in UNDEFINED | pstats #178 ikev2.ike started | Message ID: init #178: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #178: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #178; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-178" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-178" IKE SA #178 "road-eastnet-nonat-178" "road-eastnet-nonat-178" #178: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-178 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-178": constructed local IKE proposals for road-eastnet-nonat-178 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 178 for state #178 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9eafb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #178 | libevent_malloc: new ptr-libevent@0x7f4998017bc8 size 128 | #178 spent 0.42 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-178" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 17 resuming | crypto helper 17 starting work-order 178 for state #178 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 178 | spent 0.662 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 178 time elapsed 0.003028 seconds | (#178) spent 3.01 milliseconds in crypto helper computing work-order 178: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 178 for state #178 to event queue | scheduling resume sending helper answer for #178 | libevent_malloc: new ptr-libevent@0x7f4974033468 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 178 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #178 | **emit ISAKMP Message: | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | ikev2 g^x 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | ikev2 g^x be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | ikev2 g^x c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | ikev2 g^x a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | ikev2 g^x 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | ikev2 g^x 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | ikev2 g^x 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | ikev2 g^x 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | ikev2 g^x 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | ikev2 g^x 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | ikev2 g^x 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | ikev2 g^x 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | ikev2 g^x 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | ikev2 g^x 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ikev2 g^x ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 3c 65 7d 12 | IKEv2 nonce cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 cb cd 76 bb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 b7 b2 e6 20 36 41 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b2 | natd_hash: port=500 | natd_hash: hash= 36 05 b1 83 38 3b fa 85 bf 5b 0c ec 72 a4 76 57 | natd_hash: hash= a2 cf b8 d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 05 b1 83 38 3b fa 85 bf 5b 0c ec 72 a4 76 57 | Notify data a2 cf b8 d0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 b7 b2 e6 20 36 41 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | natd_hash: hash= b4 81 96 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | Notify data b4 81 96 2d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #178 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #178: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #178 to 4294967295 after switching state | Message ID: IKE #178 skipping update_recv as MD is fake | Message ID: sent #178 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.178:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | state #178 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998017bc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9eafb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #178 | libevent_malloc: new ptr-libevent@0x55564da85ee8 size 128 | #178 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.620305 | resume sending helper answer for #178 suppresed complete_v2_state_transition() and stole MD | #178 spent 1.55 milliseconds in resume sending helper answer | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974033468 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.623895; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #147 | libevent_malloc: new ptr-libevent@0x7f4974033468 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #147 spent 0.393 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.624346; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #57 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #57 spent 0.319 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.639334; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #163 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #163 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.668291; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #171 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x55564da7a5e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #171 spent 0.459 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.673212; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #117 | libevent_malloc: new ptr-libevent@0x55564da7a5e8 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #117 spent 0.41 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.216 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.696104; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #148 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #148 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.25 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.698088; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002346 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #164 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #164 spent 0.565 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.298 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-179' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #179 at 0x55564da85318 | State DB: adding IKEv2 state #179 in UNDEFINED | pstats #179 ikev2.ike started | Message ID: init #179: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #179: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #179; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-179" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-179" IKE SA #179 "road-eastnet-nonat-179" "road-eastnet-nonat-179" #179: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-179 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-179": constructed local IKE proposals for road-eastnet-nonat-179 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 179 for state #179 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da13748 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #179 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 | #179 spent 0.489 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-179" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 18 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 18 starting work-order 179 for state #179 | spent 0.75 milliseconds in whack | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 179 | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.708957; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564da43628 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 179 time elapsed 0.00338 seconds | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | (#179) spent 3.37 milliseconds in crypto helper computing work-order 179: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 179 for state #179 to event queue | scheduling resume sending helper answer for #179 | libevent_malloc: new ptr-libevent@0x7f49780333d8 size 128 | crypto helper 18 waiting (nothing to do) | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #58 spent 0.547 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.219 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 179 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #179 | **emit ISAKMP Message: | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | ikev2 g^x 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | ikev2 g^x b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | ikev2 g^x 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | ikev2 g^x 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | ikev2 g^x 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | ikev2 g^x 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | ikev2 g^x 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | ikev2 g^x 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ikev2 g^x ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | ikev2 g^x be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | ikev2 g^x c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | ikev2 g^x cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | ikev2 g^x 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | ikev2 g^x 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | ikev2 g^x f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f3 24 24 e7 cd 69 6d 76 77 47 15 89 8b e5 70 05 | IKEv2 nonce f2 75 5a 7a 78 96 8c 94 39 9b 59 dc 8c de dc e9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 74 50 64 6b 9b 10 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b3 | natd_hash: port=500 | natd_hash: hash= b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 4a 4a 34 b1 | natd_hash: hash= e9 e0 9b 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 4a 4a 34 b1 | Notify data e9 e0 9b 07 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 74 50 64 6b 9b 10 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | natd_hash: hash= 0e 48 b5 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | Notify data 0e 48 b5 a4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #179 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #179: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #179 to 4294967295 after switching state | Message ID: IKE #179 skipping update_recv as MD is fake | Message ID: sent #179 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.179:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | state #179 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da13748 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #179 | libevent_malloc: new ptr-libevent@0x55564da87668 size 128 | #179 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.711415 | resume sending helper answer for #179 suppresed complete_v2_state_transition() and stole MD | #179 spent 1.48 milliseconds in resume sending helper answer | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780333d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.730021; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #172 | libevent_malloc: new ptr-libevent@0x7f49780333d8 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #172 spent 0.459 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.751994; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #118 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x7f496c028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #118 spent 0.625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.313 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.760234; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #149 | libevent_malloc: new ptr-libevent@0x7f496c028438 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #149 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.760727; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #165 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x7f498002db38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #165 spent 0.432 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.238 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.789844; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #173 | libevent_malloc: new ptr-libevent@0x7f498002db38 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x55564da71a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #173 spent 0.231 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-180' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #180 at 0x55564da86a28 | State DB: adding IKEv2 state #180 in UNDEFINED | pstats #180 ikev2.ike started | Message ID: init #180: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #180: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #180; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-180" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-180" IKE SA #180 "road-eastnet-nonat-180" "road-eastnet-nonat-180" #180: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-180 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-180": constructed local IKE proposals for road-eastnet-nonat-180 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 180 for state #180 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #180 | libevent_malloc: new ptr-libevent@0x55564da71a48 size 128 | #180 spent 0.259 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 180 for state #180 | RESET processing: connection "road-eastnet-nonat-180" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 180 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.418 milliseconds in whack | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.79184; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #59 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x7f4974022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #59 spent 0.269 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 180 time elapsed 0.001551 seconds "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | (#180) spent 1.55 milliseconds in crypto helper computing work-order 180: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 180 for state #180 to event queue | scheduling resume sending helper answer for #180 | spent 0.138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | libevent_malloc: new ptr-libevent@0x7f496c033518 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 180 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #180 | **emit ISAKMP Message: | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | ikev2 g^x 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | ikev2 g^x 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | ikev2 g^x 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | ikev2 g^x 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | ikev2 g^x 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | ikev2 g^x 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | ikev2 g^x bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | ikev2 g^x 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | ikev2 g^x fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | ikev2 g^x 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | ikev2 g^x 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | ikev2 g^x d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | ikev2 g^x b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | ikev2 g^x 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | ikev2 g^x 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fa 0a eb d8 10 ac 8c 52 7e 79 33 1a 65 2d 04 93 | IKEv2 nonce cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 8f 41 32 7f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e1 0e d7 8c c6 58 48 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b4 | natd_hash: port=500 | natd_hash: hash= 1c db 7b 15 7f bb fb 41 25 fc 5a 8d 14 b8 24 fb | natd_hash: hash= a5 c2 3d ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c db 7b 15 7f bb fb 41 25 fc 5a 8d 14 b8 24 fb | Notify data a5 c2 3d ea | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e1 0e d7 8c c6 58 48 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | natd_hash: hash= 14 24 33 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | Notify data 14 24 33 57 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #180 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #180: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #180 to 4294967295 after switching state | Message ID: IKE #180 skipping update_recv as MD is fake | Message ID: sent #180 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.180:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | state #180 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da71a48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #180 | libevent_malloc: new ptr-libevent@0x55564da88de8 size 128 | #180 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.79297 | resume sending helper answer for #180 suppresed complete_v2_state_transition() and stole MD | #180 spent 0.609 milliseconds in resume sending helper answer | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c033518 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0799 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.812231; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002814 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #119 | libevent_malloc: new ptr-libevent@0x7f496c033518 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #119 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.818526; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #150 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #150 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.827931; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #166 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #166 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.85021; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #174 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x55564da802a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #174 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.850395; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #60 | libevent_malloc: new ptr-libevent@0x55564da802a8 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x55564da25068 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #60 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-181' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #181 at 0x55564da881a8 | State DB: adding IKEv2 state #181 in UNDEFINED | pstats #181 ikev2.ike started | Message ID: init #181: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #181: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #181; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-181" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-181" IKE SA #181 "road-eastnet-nonat-181" "road-eastnet-nonat-181" #181: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-181 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-181": constructed local IKE proposals for road-eastnet-nonat-181 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 181 for state #181 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #181 | libevent_malloc: new ptr-libevent@0x55564da25068 size 128 | #181 spent 0.133 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-181" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 0 resuming | crypto helper 0 starting work-order 181 for state #181 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 181 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 181 time elapsed 0.000617 seconds | (#181) spent 0.602 milliseconds in crypto helper computing work-order 181: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 181 for state #181 to event queue | scheduling resume sending helper answer for #181 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 181 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #181 | **emit ISAKMP Message: | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | ikev2 g^x 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | ikev2 g^x 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | ikev2 g^x 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | ikev2 g^x 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | ikev2 g^x 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | ikev2 g^x 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | ikev2 g^x e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | ikev2 g^x 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | ikev2 g^x 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | ikev2 g^x 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ikev2 g^x ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | ikev2 g^x 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | ikev2 g^x f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | ikev2 g^x 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | ikev2 g^x 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d 45 37 ec 23 | IKEv2 nonce 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 18 d4 62 d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 bf c5 ed 2a b1 4e a4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b5 | natd_hash: port=500 | natd_hash: hash= 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 e1 72 a4 a2 | natd_hash: hash= da ef 43 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 e1 72 a4 a2 | Notify data da ef 43 8e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 bf c5 ed 2a b1 4e a4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | natd_hash: hash= af 9f 8b 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | Notify data af 9f 8b 2b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #181 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #181: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #181 to 4294967295 after switching state | Message ID: IKE #181 skipping update_recv as MD is fake | Message ID: sent #181 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.181:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | state #181 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da25068 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b4002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #181 | libevent_malloc: new ptr-libevent@0x55564da8a4f8 size 128 | #181 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.853489 | resume sending helper answer for #181 suppresed complete_v2_state_transition() and stole MD | #181 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc01fe28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.874651; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #120 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #120 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.877936; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #151 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #151 spent 0.0859 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.887279; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #167 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #167 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.909527; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50066 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #175 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x55564da819b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #175 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10587.910811; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #61 | libevent_malloc: new ptr-libevent@0x55564da819b8 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x55564da0f1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #61 spent 0.0876 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-182' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #182 at 0x55564da89928 | State DB: adding IKEv2 state #182 in UNDEFINED | pstats #182 ikev2.ike started | Message ID: init #182: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #182: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #182; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-182" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-182" IKE SA #182 "road-eastnet-nonat-182" "road-eastnet-nonat-182" #182: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-182 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-182": constructed local IKE proposals for road-eastnet-nonat-182 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 182 for state #182 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f496c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #182 | libevent_malloc: new ptr-libevent@0x55564da0f1a8 size 128 | #182 spent 0.136 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 182 for state #182 | RESET processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-182" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 182 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.22 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 182 time elapsed 0.001043 seconds | (#182) spent 1.04 milliseconds in crypto helper computing work-order 182: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 182 for state #182 to event queue | scheduling resume sending helper answer for #182 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 182 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #182 | **emit ISAKMP Message: | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | ikev2 g^x 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | ikev2 g^x a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | ikev2 g^x d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | ikev2 g^x 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | ikev2 g^x f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | ikev2 g^x 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | ikev2 g^x 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | ikev2 g^x d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | ikev2 g^x f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | ikev2 g^x 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ikev2 g^x ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | ikev2 g^x 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | ikev2 g^x 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | ikev2 g^x 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | ikev2 g^x 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 0b 7f be 8b | IKEv2 nonce 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 df 35 1e a8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2d 9c 08 86 15 91 ad a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b6 | natd_hash: port=500 | natd_hash: hash= 32 28 cf 11 91 76 d3 49 e6 a7 ad fd b4 16 0c 7f | natd_hash: hash= 1a dd 6f 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 32 28 cf 11 91 76 d3 49 e6 a7 ad fd b4 16 0c 7f | Notify data 1a dd 6f 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2d 9c 08 86 15 91 ad a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | natd_hash: hash= 10 67 f6 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | Notify data 10 67 f6 63 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #182 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #182: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #182 to 4294967295 after switching state | Message ID: IKE #182 skipping update_recv as MD is fake | Message ID: sent #182 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.182:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | state #182 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da0f1a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f496c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #182 | libevent_malloc: new ptr-libevent@0x55564da8bc08 size 128 | #182 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.915361 | resume sending helper answer for #182 suppresed complete_v2_state_transition() and stole MD | #182 spent 0.399 milliseconds in resume sending helper answer | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4035d78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.932542; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002632 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #121 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #121 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10587.944889; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #152 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #152 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10587.947219; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x55564da604f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #168 spent 0.0858 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10587.969472; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #176 | libevent_malloc: new ptr-libevent@0x55564da604f8 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x55564da830c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #176 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-183' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #183 at 0x55564da8b038 | State DB: adding IKEv2 state #183 in UNDEFINED | pstats #183 ikev2.ike started | Message ID: init #183: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #183: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #183; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-183" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-183" IKE SA #183 "road-eastnet-nonat-183" "road-eastnet-nonat-183" #183: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-183 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-183": constructed local IKE proposals for road-eastnet-nonat-183 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 183 for state #183 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564da830c8 size 128 | #183 spent 0.175 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-183" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 183 for state #183 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 183 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.273 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 183 time elapsed 0.000624 seconds | (#183) spent 0.626 milliseconds in crypto helper computing work-order 183: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 183 for state #183 to event queue | scheduling resume sending helper answer for #183 | libevent_malloc: new ptr-libevent@0x7f49b80367d8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 183 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #183 | **emit ISAKMP Message: | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | ikev2 g^x 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | ikev2 g^x 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | ikev2 g^x a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | ikev2 g^x af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | ikev2 g^x 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | ikev2 g^x 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | ikev2 g^x 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | ikev2 g^x 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | ikev2 g^x 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | ikev2 g^x e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | ikev2 g^x eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | ikev2 g^x 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | ikev2 g^x 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | ikev2 g^x 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | ikev2 g^x 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 0d 9e d9 d9 | IKEv2 nonce a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae b6 7a 6b 1c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 55 90 a3 5d 25 cb 5d 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b7 | natd_hash: port=500 | natd_hash: hash= 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 dc d9 c2 0d | natd_hash: hash= 76 1d 2a 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 dc d9 c2 0d | Notify data 76 1d 2a 53 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 55 90 a3 5d 25 cb 5d 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | natd_hash: hash= 17 6b 27 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | Notify data 17 6b 27 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #183 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #183: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #183 to 4294967295 after switching state | Message ID: IKE #183 skipping update_recv as MD is fake | Message ID: sent #183 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.183:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | state #183 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da830c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564da8bb28 size 128 | #183 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10587.973888 | resume sending helper answer for #183 suppresed complete_v2_state_transition() and stole MD | #183 spent 0.369 milliseconds in resume sending helper answer | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b80367d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10587.994067; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #122 | libevent_malloc: new ptr-libevent@0x7f49b80367d8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #122 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.000451; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #62 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #62 spent 0.0998 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.003728; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #153 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x7f49a4022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #153 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.024988; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #169 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #169 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.031244; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #177 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x55564da847d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #177 spent 0.0928 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-184' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #184 at 0x55564da8c748 | State DB: adding IKEv2 state #184 in UNDEFINED | pstats #184 ikev2.ike started | Message ID: init #184: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #184: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #184; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-184" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-184" IKE SA #184 "road-eastnet-nonat-184" "road-eastnet-nonat-184" #184: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-184 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-184": constructed local IKE proposals for road-eastnet-nonat-184 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 184 for state #184 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #184 | libevent_malloc: new ptr-libevent@0x55564da847d8 size 128 | #184 spent 0.122 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-184" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 5 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 5 starting work-order 184 for state #184 | spent 0.2 milliseconds in whack | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 184 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 184 time elapsed 0.00063 seconds | (#184) spent 0.63 milliseconds in crypto helper computing work-order 184: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 184 for state #184 to event queue | scheduling resume sending helper answer for #184 | libevent_malloc: new ptr-libevent@0x7f49ac038b78 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 184 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #184 | **emit ISAKMP Message: | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | ikev2 g^x 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | ikev2 g^x 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | ikev2 g^x 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | ikev2 g^x 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | ikev2 g^x 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | ikev2 g^x be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | ikev2 g^x db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | ikev2 g^x 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | ikev2 g^x fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | ikev2 g^x 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | ikev2 g^x 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | ikev2 g^x 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | ikev2 g^x a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | ikev2 g^x 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | ikev2 g^x 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f 88 e9 43 6f | IKEv2 nonce 94 c4 77 72 84 f2 7b 74 13 6b 41 62 e9 02 d7 a6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dd ad be 7e 63 6a 2d fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b8 | natd_hash: port=500 | natd_hash: hash= ea 2f df c9 ae ab 38 f7 6f d1 30 ab ee 5b 39 46 | natd_hash: hash= c3 7e 02 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 2f df c9 ae ab 38 f7 6f d1 30 ab ee 5b 39 46 | Notify data c3 7e 02 55 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dd ad be 7e 63 6a 2d fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | natd_hash: hash= 51 45 87 cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | Notify data 51 45 87 cd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #184 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #184: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #184 to 4294967295 after switching state | Message ID: IKE #184 skipping update_recv as MD is fake | Message ID: sent #184 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.184:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | state #184 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da847d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #184 | libevent_malloc: new ptr-libevent@0x55564da8d2a8 size 128 | #184 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.033101 | resume sending helper answer for #184 suppresed complete_v2_state_transition() and stole MD | #184 spent 0.391 milliseconds in resume sending helper answer | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac038b78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0501 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.060309; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #123 | libevent_malloc: new ptr-libevent@0x7f49ac038b78 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #123 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.063689; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #154 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #154 spent 0.0838 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.087952; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #63 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x7f4974017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #63 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-185' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #185 at 0x55564da8df58 | State DB: adding IKEv2 state #185 in UNDEFINED | pstats #185 ikev2.ike started | Message ID: init #185: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #185: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #185; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-185" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-185" IKE SA #185 "road-eastnet-nonat-185" "road-eastnet-nonat-185" #185: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-185 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-185": constructed local IKE proposals for road-eastnet-nonat-185 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 185 for state #185 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ad8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #185 | libevent_malloc: new ptr-libevent@0x7f4974017af8 size 128 | #185 spent 0.138 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-185" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.208 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 185 for state #185 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 185 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 185 time elapsed 0.000574 seconds | (#185) spent 0.578 milliseconds in crypto helper computing work-order 185: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 185 for state #185 to event queue | scheduling resume sending helper answer for #185 | libevent_malloc: new ptr-libevent@0x7f49b0038aa8 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 185 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #185 | **emit ISAKMP Message: | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | ikev2 g^x 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | ikev2 g^x fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | ikev2 g^x 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | ikev2 g^x 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | ikev2 g^x e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | ikev2 g^x b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | ikev2 g^x 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | ikev2 g^x 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | ikev2 g^x 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | ikev2 g^x 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | ikev2 g^x 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | ikev2 g^x 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | ikev2 g^x 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | ikev2 g^x 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | ikev2 g^x 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 f5 03 44 38 | IKEv2 nonce 90 15 fe 9e 54 6b be 2d cf e3 84 da a0 d0 29 ca | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 8a 26 75 2a fb b8 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b9 | natd_hash: port=500 | natd_hash: hash= 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 13 fc df 0f | natd_hash: hash= 1c a0 23 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 13 fc df 0f | Notify data 1c a0 23 65 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 8a 26 75 2a fb b8 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | natd_hash: hash= ad 63 ca 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | Notify data ad 63 ca 64 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #185 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #185: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #185 to 4294967295 after switching state | Message ID: IKE #185 skipping update_recv as MD is fake | Message ID: sent #185 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.185:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | state #185 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974017af8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ad8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #185 | libevent_malloc: new ptr-libevent@0x55564da8d358 size 128 | #185 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.092071 | resume sending helper answer for #185 suppresed complete_v2_state_transition() and stole MD | #185 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0038aa8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.101364; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001939 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #170 | libevent_malloc: new ptr-libevent@0x7f49b0038aa8 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x7f497801d798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #170 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.119633; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #178 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x55564da85ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #178 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.11983; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #124 | libevent_malloc: new ptr-libevent@0x55564da85ee8 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x55564da57968 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #124 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.12719; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #155 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #155 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0822 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.154651; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #64 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x55564da14ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #64 spent 0.297 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-186' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #186 at 0x55564da8f5b8 | State DB: adding IKEv2 state #186 in UNDEFINED | pstats #186 ikev2.ike started | Message ID: init #186: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #186: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #186; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-186" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-186" IKE SA #186 "road-eastnet-nonat-186" "road-eastnet-nonat-186" #186: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-186 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-186": constructed local IKE proposals for road-eastnet-nonat-186 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 186 for state #186 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f52e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #186 | libevent_malloc: new ptr-libevent@0x55564da14ec8 size 128 | #186 spent 0.303 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-186" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 7 resuming | crypto helper 7 starting work-order 186 for state #186 | spent 0.457 milliseconds in whack | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 186 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 186 time elapsed 0.001637 seconds | (#186) spent 1.64 milliseconds in crypto helper computing work-order 186: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 186 for state #186 to event queue | scheduling resume sending helper answer for #186 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 186 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #186 | **emit ISAKMP Message: | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | ikev2 g^x 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | ikev2 g^x c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | ikev2 g^x b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | ikev2 g^x 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | ikev2 g^x 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | ikev2 g^x e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | ikev2 g^x 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | ikev2 g^x 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ikev2 g^x ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | ikev2 g^x 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | ikev2 g^x 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | ikev2 g^x c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | ikev2 g^x eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | ikev2 g^x 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | ikev2 g^x 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 48 e6 04 55 a3 20 09 7d 82 a5 1a 7a 2b 08 b5 | IKEv2 nonce 15 96 8a 14 cb b5 10 d3 6d 86 63 54 a9 6f 41 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 62 93 8a ad 73 65 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ba | natd_hash: port=500 | natd_hash: hash= f5 89 be e4 aa 7c c5 62 b1 8a 82 8a 23 7f b2 99 | natd_hash: hash= ba 42 36 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 89 be e4 aa 7c c5 62 b1 8a 82 8a 23 7f b2 99 | Notify data ba 42 36 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 62 93 8a ad 73 65 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | natd_hash: hash= 9b 52 0f 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | Notify data 9b 52 0f 77 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #186 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #186: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #186 to 4294967295 after switching state | Message ID: IKE #186 skipping update_recv as MD is fake | Message ID: sent #186 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.186:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | state #186 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da14ec8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f52e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #186 | libevent_malloc: new ptr-libevent@0x55564da917e8 size 128 | #186 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.167067 | resume sending helper answer for #186 suppresed complete_v2_state_transition() and stole MD | #186 spent 0.953 milliseconds in resume sending helper answer | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4038c28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.121 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.169479; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #171 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #171 spent 0.255 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.179042; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #125 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #125 spent 0.269 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.195644; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002411 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #156 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #156 spent 0.288 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.210323; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #179 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x55564da87668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #179 spent 0.252 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.128 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.213968; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #65 | libevent_malloc: new ptr-libevent@0x55564da87668 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x7f49b00282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #65 spent 0.32 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.171 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.231743; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #172 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x7f49780333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #172 spent 0.646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.322 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.239978; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #126 | libevent_malloc: new ptr-libevent@0x7f49780333d8 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x55564da59088 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #126 spent 0.537 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.254942; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #157 | libevent_malloc: new ptr-libevent@0x55564da59088 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x7f4990028278 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #157 spent 0.425 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-187' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #187 at 0x55564da90c18 | State DB: adding IKEv2 state #187 in UNDEFINED | pstats #187 ikev2.ike started | Message ID: init #187: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #187: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #187; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-187" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-187" IKE SA #187 "road-eastnet-nonat-187" "road-eastnet-nonat-187" #187: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-187 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-187": constructed local IKE proposals for road-eastnet-nonat-187 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 187 for state #187 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da43548 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #187 | libevent_malloc: new ptr-libevent@0x7f4990028278 size 128 | #187 spent 0.407 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-187" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.59 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 8 resuming | crypto helper 8 starting work-order 187 for state #187 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 187 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 187 time elapsed 0.00162 seconds | (#187) spent 1.61 milliseconds in crypto helper computing work-order 187: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 187 for state #187 to event queue | scheduling resume sending helper answer for #187 | libevent_malloc: new ptr-libevent@0x7f49a8038c48 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 187 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #187 | **emit ISAKMP Message: | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | ikev2 g^x 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | ikev2 g^x cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | ikev2 g^x 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | ikev2 g^x c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | ikev2 g^x e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | ikev2 g^x 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | ikev2 g^x 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | ikev2 g^x 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | ikev2 g^x c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | ikev2 g^x 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | ikev2 g^x f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | ikev2 g^x 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | ikev2 g^x 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | ikev2 g^x 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | ikev2 g^x 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 f7 79 a8 01 | IKEv2 nonce be 7b 4d fd dc 05 bf 0e 40 a1 db 48 28 e4 f7 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a8 4f 25 e9 7b 68 72 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bb | natd_hash: port=500 | natd_hash: hash= 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 91 f3 74 86 | natd_hash: hash= 65 e9 17 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 91 f3 74 86 | Notify data 65 e9 17 d3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a8 4f 25 e9 7b 68 72 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | natd_hash: hash= 03 88 96 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | Notify data 03 88 96 6a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #187 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #187: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #187 to 4294967295 after switching state | Message ID: IKE #187 skipping update_recv as MD is fake | Message ID: sent #187 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.187:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | state #187 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4990028278 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da43548 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #187 | libevent_malloc: new ptr-libevent@0x55564da91708 size 128 | #187 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.259169 | resume sending helper answer for #187 suppresed complete_v2_state_transition() and stole MD | #187 spent 1.07 milliseconds in resume sending helper answer | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8038c48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.277534; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #66 | libevent_malloc: new ptr-libevent@0x7f49a8038c48 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x55564da2daf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #66 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.290852; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #173 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x7f498002db38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #173 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.293154; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #180 | libevent_malloc: new ptr-libevent@0x7f498002db38 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x55564da88de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #180 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.299502; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564da88de8 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #127 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.313851; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #158 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x7f498401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #158 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-188' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #188 at 0x55564da92328 | State DB: adding IKEv2 state #188 in UNDEFINED | pstats #188 ikev2.ike started | Message ID: init #188: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #188: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #188; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-188" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-188" IKE SA #188 "road-eastnet-nonat-188" "road-eastnet-nonat-188" #188: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-188 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-188": constructed local IKE proposals for road-eastnet-nonat-188 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 188 for state #188 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da0abf8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #188 | libevent_malloc: new ptr-libevent@0x7f498401d1f8 size 128 | #188 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-188" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 9 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 9 starting work-order 188 for state #188 | spent 0.216 milliseconds in whack | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 188 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 188 time elapsed 0.000744 seconds | (#188) spent 0.751 milliseconds in crypto helper computing work-order 188: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 188 for state #188 to event queue | scheduling resume sending helper answer for #188 | libevent_malloc: new ptr-libevent@0x7f499c038c28 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 188 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #188 | **emit ISAKMP Message: | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ikev2 g^x ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | ikev2 g^x 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | ikev2 g^x 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | ikev2 g^x 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | ikev2 g^x 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | ikev2 g^x 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | ikev2 g^x 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | ikev2 g^x e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | ikev2 g^x 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | ikev2 g^x 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | ikev2 g^x 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ikev2 g^x ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | ikev2 g^x 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | ikev2 g^x 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | ikev2 g^x 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 1c 1b 10 72 5f 67 2c ce df 6a b8 2b 8e c4 b8 | IKEv2 nonce e2 38 26 c4 c8 32 da 6a 9b 72 4d de 0b ae db 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cb 87 a7 77 73 72 0b 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bc | natd_hash: port=500 | natd_hash: hash= f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c 97 88 c8 ec | natd_hash: hash= 29 77 97 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c 97 88 c8 ec | Notify data 29 77 97 f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cb 87 a7 77 73 72 0b 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | natd_hash: hash= 40 b1 8b b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | Notify data 40 b1 8b b7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #188 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #188: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #188 to 4294967295 after switching state | Message ID: IKE #188 skipping update_recv as MD is fake | Message ID: sent #188 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.188:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | state #188 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498401d1f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da0abf8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #188 | libevent_malloc: new ptr-libevent@0x55564da92f08 size 128 | #188 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.318434 | resume sending helper answer for #188 suppresed complete_v2_state_transition() and stole MD | #188 spent 0.376 milliseconds in resume sending helper answer | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c038c28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.334627; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003475 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #67 | libevent_malloc: new ptr-libevent@0x7f499c038c28 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #67 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0804 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.351931; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #174 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #174 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.354216; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #181 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x55564da8a4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #181 spent 0.0907 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.360497; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #128 | libevent_malloc: new ptr-libevent@0x55564da8a4f8 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #128 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.373822; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #159 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x7f49a40179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #159 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-189' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #189 at 0x55564da93b38 | State DB: adding IKEv2 state #189 in UNDEFINED | pstats #189 ikev2.ike started | Message ID: init #189: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #189: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #189; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-189" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-189" IKE SA #189 "road-eastnet-nonat-189" "road-eastnet-nonat-189" #189: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-189 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-189": constructed local IKE proposals for road-eastnet-nonat-189 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 189 for state #189 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d8278 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #189 | libevent_malloc: new ptr-libevent@0x7f49a40179e8 size 128 | #189 spent 0.13 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-189" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 10 resuming | crypto helper 10 starting work-order 189 for state #189 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 189 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 189 time elapsed 0.000687 seconds | (#189) spent 0.688 milliseconds in crypto helper computing work-order 189: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 189 for state #189 to event queue | scheduling resume sending helper answer for #189 | libevent_malloc: new ptr-libevent@0x7f49a0038b68 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 189 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #189 | **emit ISAKMP Message: | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | ikev2 g^x f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ikev2 g^x ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | ikev2 g^x 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ikev2 g^x ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | ikev2 g^x 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | ikev2 g^x 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | ikev2 g^x 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | ikev2 g^x f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | ikev2 g^x 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | ikev2 g^x a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | ikev2 g^x f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | ikev2 g^x 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | ikev2 g^x 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | ikev2 g^x 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | ikev2 g^x b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c 16 3d f3 6a | IKEv2 nonce 99 49 84 2a 3d c8 b6 98 97 de cc ec d1 3a 19 91 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 03 9b d7 a0 bd c6 05 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bd | natd_hash: port=500 | natd_hash: hash= 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 67 12 43 91 | natd_hash: hash= d9 b2 43 df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 67 12 43 91 | Notify data d9 b2 43 df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 03 9b d7 a0 bd c6 05 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | natd_hash: hash= 85 0d c4 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | Notify data 85 0d c4 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #189 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #189: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #189 to 4294967295 after switching state | Message ID: IKE #189 skipping update_recv as MD is fake | Message ID: sent #189 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.189:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | state #189 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40179e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d8278 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #189 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 | #189 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.378543 | resume sending helper answer for #189 suppresed complete_v2_state_transition() and stole MD | #189 spent 0.417 milliseconds in resume sending helper answer | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0038b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.399768; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da95d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #68 | libevent_malloc: new ptr-libevent@0x7f49a0038b68 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #68 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.410075; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #175 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #175 spent 0.0892 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.416333; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #182 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x55564da8bc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #182 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.420614; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #129 | libevent_malloc: new ptr-libevent@0x55564da8bc08 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #129 spent 0.0909 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-190' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #190 at 0x55564da95198 | State DB: adding IKEv2 state #190 in UNDEFINED | pstats #190 ikev2.ike started | Message ID: init #190: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #190: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #190; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-190" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-190" IKE SA #190 "road-eastnet-nonat-190" "road-eastnet-nonat-190" #190: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-190 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-190": constructed local IKE proposals for road-eastnet-nonat-190 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 190 for state #190 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da5d588 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 | #190 spent 0.13 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-190" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 11 starting work-order 190 for state #190 | spent 0.22 milliseconds in whack | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 190 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 190 time elapsed 0.000789 seconds | (#190) spent 0.795 milliseconds in crypto helper computing work-order 190: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 190 for state #190 to event queue | scheduling resume sending helper answer for #190 | libevent_malloc: new ptr-libevent@0x7f4994038cd8 size 128 | crypto helper 11 waiting (nothing to do) | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.437358; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #160 | libevent_malloc: new ptr-libevent@0x7f4974022bd8 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #160 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 190 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #190 | **emit ISAKMP Message: | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | ikev2 g^x e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | ikev2 g^x 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | ikev2 g^x d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | ikev2 g^x c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | ikev2 g^x 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | ikev2 g^x 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | ikev2 g^x 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | ikev2 g^x 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | ikev2 g^x 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | ikev2 g^x cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | ikev2 g^x 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | ikev2 g^x 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | ikev2 g^x 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | ikev2 g^x a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | ikev2 g^x c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 30 73 92 10 0a 58 17 12 ed 7d ef b0 ae a7 ff 00 | IKEv2 nonce 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc 34 41 e4 bc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 7a e0 c1 90 9b 3a df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 be | natd_hash: port=500 | natd_hash: hash= 24 32 2e 31 27 51 44 ba ce a4 f7 9f d5 5c 7a 58 | natd_hash: hash= d2 e5 8a 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 32 2e 31 27 51 44 ba ce a4 f7 9f d5 5c 7a 58 | Notify data d2 e5 8a 4b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 7a e0 c1 90 9b 3a df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | natd_hash: hash= 9a 96 0e ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | Notify data 9a 96 0e ff | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #190 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #190: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #190 to 4294967295 after switching state | Message ID: IKE #190 skipping update_recv as MD is fake | Message ID: sent #190 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.190:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | state #190 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da5d588 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #190 | libevent_malloc: new ptr-libevent@0x55564da97558 size 128 | #190 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.437939 | resume sending helper answer for #190 suppresed complete_v2_state_transition() and stole MD | #190 spent 0.418 milliseconds in resume sending helper answer | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994038cd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.455168; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003113 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f4994038cd8 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #69 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.470557; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #176 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x55564da604f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #176 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.474979; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564da604f8 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x55564da8bb28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #183 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-191' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #191 at 0x55564da96918 | State DB: adding IKEv2 state #191 in UNDEFINED | pstats #191 ikev2.ike started | Message ID: init #191: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #191: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #191; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-191" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-191" IKE SA #191 "road-eastnet-nonat-191" "road-eastnet-nonat-191" #191: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-191 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-191": constructed local IKE proposals for road-eastnet-nonat-191 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 191 for state #191 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #191 | libevent_malloc: new ptr-libevent@0x55564da8bb28 size 128 | #191 spent 0.168 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-191" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.248 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 191 for state #191 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 191 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 191 time elapsed 0.000758 seconds | (#191) spent 0.758 milliseconds in crypto helper computing work-order 191: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 191 for state #191 to event queue | scheduling resume sending helper answer for #191 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 191 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #191 | **emit ISAKMP Message: | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | ikev2 g^x 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | ikev2 g^x a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | ikev2 g^x 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | ikev2 g^x e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | ikev2 g^x c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | ikev2 g^x 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | ikev2 g^x e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ikev2 g^x ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | ikev2 g^x 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | ikev2 g^x f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | ikev2 g^x 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | ikev2 g^x 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | ikev2 g^x 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | ikev2 g^x 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | ikev2 g^x 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 78 1b c4 dd | IKEv2 nonce f2 35 6f 26 7e 14 6c de 38 ce fb 3a f6 04 ee ca | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 b9 d5 67 2a f6 40 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bf | natd_hash: port=500 | natd_hash: hash= cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 a1 9b 42 a6 | natd_hash: hash= 98 30 d7 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 a1 9b 42 a6 | Notify data 98 30 d7 b0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 b9 d5 67 2a f6 40 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | natd_hash: hash= 06 06 34 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | Notify data 06 06 34 bd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #191 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #191: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #191 to 4294967295 after switching state | Message ID: IKE #191 skipping update_recv as MD is fake | Message ID: sent #191 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.191:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | state #191 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da8bb28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da32008 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #191 | libevent_malloc: new ptr-libevent@0x55564da98cd8 size 128 | #191 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.498056 | resume sending helper answer for #191 suppresed complete_v2_state_transition() and stole MD | #191 spent 0.452 milliseconds in resume sending helper answer | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499802db48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.509334; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001037 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #130 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.514693; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #161 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0759 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.51606; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #70 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x7f4994028448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #70 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.532492; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #177 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #177 spent 0.287 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.156 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.533057; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #184 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x55564da8d2a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #184 spent 0.272 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.155 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-192' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #192 at 0x55564da98098 | State DB: adding IKEv2 state #192 in UNDEFINED | pstats #192 ikev2.ike started | Message ID: init #192: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #192: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #192; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-192" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-192" IKE SA #192 "road-eastnet-nonat-192" "road-eastnet-nonat-192" #192: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-192 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-192": constructed local IKE proposals for road-eastnet-nonat-192 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 192 for state #192 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #192 | libevent_malloc: new ptr-libevent@0x55564da8d2a8 size 128 | #192 spent 0.349 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-192" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 resuming | crypto helper 13 starting work-order 192 for state #192 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 192 | spent 0.54 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 192 time elapsed 0.001635 seconds | (#192) spent 1.62 milliseconds in crypto helper computing work-order 192: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 192 for state #192 to event queue | scheduling resume sending helper answer for #192 | libevent_malloc: new ptr-libevent@0x7f498c038ab8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 192 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #192 | **emit ISAKMP Message: | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | ikev2 g^x fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | ikev2 g^x 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | ikev2 g^x 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | ikev2 g^x af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | ikev2 g^x c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | ikev2 g^x 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ikev2 g^x ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | ikev2 g^x 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | ikev2 g^x f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | ikev2 g^x cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | ikev2 g^x 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | ikev2 g^x 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | ikev2 g^x 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | ikev2 g^x fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | ikev2 g^x c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f1 79 83 47 d7 2a 60 30 8c a3 cc c3 1c cf 8e b5 | IKEv2 nonce a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc f3 8d dd 01 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ab 23 46 b6 9d 6a cc 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c0 | natd_hash: port=500 | natd_hash: hash= be fd e7 d3 2b 6f 58 ed 38 ea ca 69 6d 86 16 ac | natd_hash: hash= 43 07 48 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be fd e7 d3 2b 6f 58 ed 38 ea ca 69 6d 86 16 ac | Notify data 43 07 48 99 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ab 23 46 b6 9d 6a cc 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | natd_hash: hash= ee 3e d4 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | Notify data ee 3e d4 45 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #192 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #192: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #192 to 4294967295 after switching state | Message ID: IKE #192 skipping update_recv as MD is fake | Message ID: sent #192 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.192:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | state #192 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da8d2a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #192 | libevent_malloc: new ptr-libevent@0x55564da9a3e8 size 128 | #192 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.569696 | resume sending helper answer for #192 suppresed complete_v2_state_transition() and stole MD | #192 spent 0.629 milliseconds in resume sending helper answer | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c038ab8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0884 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.575947; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #71 | libevent_malloc: new ptr-libevent@0x7f498c038ab8 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x7f4988022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #71 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.577294; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #162 | libevent_malloc: new ptr-libevent@0x7f4988022a68 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #162 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.592624; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #185 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x55564da8d358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #185 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.604896; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #131 | libevent_malloc: new ptr-libevent@0x55564da8d358 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #131 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.620158; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #178 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x7f497801d798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #178 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-193' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #193 at 0x55564da99818 | State DB: adding IKEv2 state #193 in UNDEFINED | pstats #193 ikev2.ike started | Message ID: init #193: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #193: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #193; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-193" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-193" IKE SA #193 "road-eastnet-nonat-193" "road-eastnet-nonat-193" #193: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-193 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-193": constructed local IKE proposals for road-eastnet-nonat-193 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 193 for state #193 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da11f58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #193 | libevent_malloc: new ptr-libevent@0x7f497801d798 size 128 | #193 spent 0.127 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-193" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 14 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 14 starting work-order 193 for state #193 | spent 0.234 milliseconds in whack | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 193 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 193 time elapsed 0.000652 seconds | (#193) spent 0.639 milliseconds in crypto helper computing work-order 193: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 193 for state #193 to event queue | scheduling resume sending helper answer for #193 | libevent_malloc: new ptr-libevent@0x7f4990038b08 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 193 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #193 | **emit ISAKMP Message: | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | ikev2 g^x 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | ikev2 g^x a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ikev2 g^x ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | ikev2 g^x 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | ikev2 g^x df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | ikev2 g^x eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | ikev2 g^x a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | ikev2 g^x 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | ikev2 g^x 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | ikev2 g^x 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | ikev2 g^x 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | ikev2 g^x d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | ikev2 g^x 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | ikev2 g^x f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | ikev2 g^x 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 d2 6e 82 2d | IKEv2 nonce 36 33 5f 41 87 e0 4c dd 61 35 16 6d 3d 7d 0d 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 40 a9 c0 88 98 05 08 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c1 | natd_hash: port=500 | natd_hash: hash= 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 de e2 d3 ba | natd_hash: hash= 0f 18 bd a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 de e2 d3 ba | Notify data 0f 18 bd a5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 40 a9 c0 88 98 05 08 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | natd_hash: hash= 64 ea e8 78 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | Notify data 64 ea e8 78 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #193 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #193: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #193 to 4294967295 after switching state | Message ID: IKE #193 skipping update_recv as MD is fake | Message ID: sent #193 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.193:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | state #193 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497801d798 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da11f58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #193 | libevent_malloc: new ptr-libevent@0x55564da9a308 size 128 | #193 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.629614 | resume sending helper answer for #193 suppresed complete_v2_state_transition() and stole MD | #193 spent 0.342 milliseconds in resume sending helper answer | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990038b08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.63382; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f4990038b08 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #72 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.640113; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00315 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #163 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #163 spent 0.0856 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.66647; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #132 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #132 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.667735; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #186 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x55564da917e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #186 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-194' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #194 at 0x55564da9af28 | State DB: adding IKEv2 state #194 in UNDEFINED | pstats #194 ikev2.ike started | Message ID: init #194: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #194: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #194; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-194" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-194" IKE SA #194 "road-eastnet-nonat-194" "road-eastnet-nonat-194" #194: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-194 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-194": constructed local IKE proposals for road-eastnet-nonat-194 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 194 for state #194 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f52e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #194 | libevent_malloc: new ptr-libevent@0x55564da917e8 size 128 | #194 spent 0.156 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 194 for state #194 | RESET processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-194" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 194 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.238 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 194 time elapsed 0.000613 seconds | (#194) spent 0.615 milliseconds in crypto helper computing work-order 194: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 194 for state #194 to event queue | scheduling resume sending helper answer for #194 | libevent_malloc: new ptr-libevent@0x7f4984038938 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 194 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #194 | **emit ISAKMP Message: | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | ikev2 g^x f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | ikev2 g^x 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | ikev2 g^x 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | ikev2 g^x 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | ikev2 g^x 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | ikev2 g^x 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | ikev2 g^x 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | ikev2 g^x 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | ikev2 g^x a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | ikev2 g^x d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | ikev2 g^x 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | ikev2 g^x 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | ikev2 g^x 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | ikev2 g^x 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | ikev2 g^x dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 45 3b 1e 54 | IKEv2 nonce d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a c3 6a 61 ad | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 56 43 df 35 04 ae c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c2 | natd_hash: port=500 | natd_hash: hash= 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 e2 42 6c ba | natd_hash: hash= 87 3b 66 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 e2 42 6c ba | Notify data 87 3b 66 49 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 56 43 df 35 04 ae c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | natd_hash: hash= e2 ab f4 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | Notify data e2 ab f4 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #194 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #194: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #194 to 4294967295 after switching state | Message ID: IKE #194 skipping update_recv as MD is fake | Message ID: sent #194 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.194:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | state #194 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da917e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f52e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #194 | libevent_malloc: new ptr-libevent@0x55564da9d1c8 size 128 | #194 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.688768 | resume sending helper answer for #194 suppresed complete_v2_state_transition() and stole MD | #194 spent 0.37 milliseconds in resume sending helper answer | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984038938 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.692941; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #73 | libevent_malloc: new ptr-libevent@0x7f4984038938 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x7f4980022a58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #73 spent 0.0967 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.699178; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #164 | libevent_malloc: new ptr-libevent@0x7f4980022a58 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #164 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.711616; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000201 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #179 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #179 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.729959; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004619 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #133 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x7f49ac033308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #133 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-195' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #195 at 0x55564da9c588 | State DB: adding IKEv2 state #195 in UNDEFINED | pstats #195 ikev2.ike started | Message ID: init #195: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #195: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #195; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-195" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-195" IKE SA #195 "road-eastnet-nonat-195" "road-eastnet-nonat-195" #195: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-195 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-195": constructed local IKE proposals for road-eastnet-nonat-195 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 195 for state #195 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da70248 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #195 | libevent_malloc: new ptr-libevent@0x7f49ac033308 size 128 | #195 spent 0.129 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 195 for state #195 | RESET processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 195 | RESET processing: connection "road-eastnet-nonat-195" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 195 time elapsed 0.000922 seconds | (#195) spent 0.903 milliseconds in crypto helper computing work-order 195: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 195 for state #195 to event queue | scheduling resume sending helper answer for #195 | libevent_malloc: new ptr-libevent@0x7f4988038b68 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 195 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #195 | **emit ISAKMP Message: | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | ikev2 g^x 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | ikev2 g^x 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | ikev2 g^x eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | ikev2 g^x a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | ikev2 g^x 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | ikev2 g^x 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | ikev2 g^x c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | ikev2 g^x cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | ikev2 g^x be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | ikev2 g^x a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | ikev2 g^x d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | ikev2 g^x 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | ikev2 g^x 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | ikev2 g^x de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | ikev2 g^x 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 c8 bc 9d c7 | IKEv2 nonce 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e a4 46 e2 11 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 23 5f 02 a9 78 6f ff 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c3 | natd_hash: port=500 | natd_hash: hash= cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 f8 db 30 13 | natd_hash: hash= 46 61 11 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 f8 db 30 13 | Notify data 46 61 11 57 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 23 5f 02 a9 78 6f ff 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | natd_hash: hash= 87 8c 25 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | Notify data 87 8c 25 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #195 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #195: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #195 to 4294967295 after switching state | Message ID: IKE #195 skipping update_recv as MD is fake | Message ID: sent #195 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.195:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | state #195 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac033308 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da70248 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #195 | libevent_malloc: new ptr-libevent@0x55564da9e8d8 size 128 | #195 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.748426 | resume sending helper answer for #195 suppresed complete_v2_state_transition() and stole MD | #195 spent 0.418 milliseconds in resume sending helper answer | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988038b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.75963; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #187 | libevent_malloc: new ptr-libevent@0x7f4988038b68 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x55564da91708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #187 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0892 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.760982; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001445 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #165 | libevent_malloc: new ptr-libevent@0x55564da91708 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #165 spent 0.0941 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.768277; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #74 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #74 spent 0.097 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.792582; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #134 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x7f49b0033238 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #134 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0746 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.794886; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #180 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x7f498002db38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #180 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0523 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-196' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #196 at 0x55564da9dd08 | State DB: adding IKEv2 state #196 in UNDEFINED | pstats #196 ikev2.ike started | Message ID: init #196: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #196: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #196; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-196" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-196" IKE SA #196 "road-eastnet-nonat-196" "road-eastnet-nonat-196" #196: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-196 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-196": constructed local IKE proposals for road-eastnet-nonat-196 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 196 for state #196 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f498002db38 size 128 | #196 spent 0.188 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 starting work-order 196 for state #196 | RESET processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-196" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 196 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.306 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 196 time elapsed 0.000735 seconds | (#196) spent 0.736 milliseconds in crypto helper computing work-order 196: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 196 for state #196 to event queue | scheduling resume sending helper answer for #196 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 196 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #196 | **emit ISAKMP Message: | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | ikev2 g^x 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | ikev2 g^x f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | ikev2 g^x 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ikev2 g^x ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | ikev2 g^x 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | ikev2 g^x a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | ikev2 g^x 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | ikev2 g^x cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | ikev2 g^x 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | ikev2 g^x 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | ikev2 g^x 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | ikev2 g^x c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ikev2 g^x ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | ikev2 g^x 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | ikev2 g^x fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 69 af a4 f6 | IKEv2 nonce fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 56 1a 02 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fd 5b 31 7d 90 8a ec 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c4 | natd_hash: port=500 | natd_hash: hash= 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb 34 b1 be f9 | natd_hash: hash= 05 5a b3 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb 34 b1 be f9 | Notify data 05 5a b3 be | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fd 5b 31 7d 90 8a ec 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | natd_hash: hash= 76 65 f2 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | Notify data 76 65 f2 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #196 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #196: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #196 to 4294967295 after switching state | Message ID: IKE #196 skipping update_recv as MD is fake | Message ID: sent #196 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.196:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | state #196 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498002db38 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #196 | libevent_malloc: new ptr-libevent@0x55564da9ffe8 size 128 | #196 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.811028 | resume sending helper answer for #196 suppresed complete_v2_state_transition() and stole MD | #196 spent 0.464 milliseconds in resume sending helper answer | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c038b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.819226; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #188 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x55564da92f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #188 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.825536; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004918 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #75 | libevent_malloc: new ptr-libevent@0x55564da92f08 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x7f49a8028468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #75 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.829818; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003832 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #166 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #166 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.84914; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #135 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x7f49a40333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #135 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.855408; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #181 | libevent_malloc: new ptr-libevent@0x7f49a40333b8 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #181 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-197' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #197 at 0x55564da9f418 | State DB: adding IKEv2 state #197 in UNDEFINED | pstats #197 ikev2.ike started | Message ID: init #197: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #197: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #197; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-197" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-197" IKE SA #197 "road-eastnet-nonat-197" "road-eastnet-nonat-197" #197: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-197 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-197": constructed local IKE proposals for road-eastnet-nonat-197 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 197 for state #197 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da17c08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #197 | libevent_malloc: new ptr-libevent@0x7f49b801fde8 size 128 | #197 spent 0.171 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 197 for state #197 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 197 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-197" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.501 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 197 time elapsed 0.000797 seconds | (#197) spent 0.804 milliseconds in crypto helper computing work-order 197: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 197 for state #197 to event queue | scheduling resume sending helper answer for #197 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 197 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #197 | **emit ISAKMP Message: | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | ikev2 g^x b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | ikev2 g^x 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | ikev2 g^x 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | ikev2 g^x da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | ikev2 g^x 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | ikev2 g^x 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | ikev2 g^x 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | ikev2 g^x 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | ikev2 g^x 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | ikev2 g^x f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ikev2 g^x ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | ikev2 g^x 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | ikev2 g^x 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | ikev2 g^x 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ikev2 g^x ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 c8 63 d5 96 49 bc c3 18 71 ae 92 93 3a 35 4d | IKEv2 nonce 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c c0 bb a2 db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6b 99 21 a2 3a 75 9f a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c5 | natd_hash: port=500 | natd_hash: hash= 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e a0 2d 5d d4 | natd_hash: hash= 4e ad 0d c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e a0 2d 5d d4 | Notify data 4e ad 0d c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6b 99 21 a2 3a 75 9f a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | natd_hash: hash= 3b 69 28 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | Notify data 3b 69 28 f3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #197 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #197: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #197 to 4294967295 after switching state | Message ID: IKE #197 skipping update_recv as MD is fake | Message ID: sent #197 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.197:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | state #197 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b801fde8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da17c08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #197 | libevent_malloc: new ptr-libevent@0x55564daa1768 size 128 | #197 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.872198 | resume sending helper answer for #197 suppresed complete_v2_state_transition() and stole MD | #197 spent 0.354 milliseconds in resume sending helper answer | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980038bb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.879396; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #189 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #189 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.888712; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #167 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #167 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.909107; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #76 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x7f497c028398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #76 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.910428; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #136 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #136 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.917711; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00235 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #182 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #182 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-198' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #198 at 0x55564daa0b28 | State DB: adding IKEv2 state #198 in UNDEFINED | pstats #198 ikev2.ike started | Message ID: init #198: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #198: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #198; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-198" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-198" IKE SA #198 "road-eastnet-nonat-198" "road-eastnet-nonat-198" #198: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-198 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-198": constructed local IKE proposals for road-eastnet-nonat-198 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 198 for state #198 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da320e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #198 | libevent_malloc: new ptr-libevent@0x7f496c022bc8 size 128 | #198 spent 0.19 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | crypto helper 17 starting work-order 198 for state #198 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 198 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-198" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.302 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 198 time elapsed 0.000973 seconds | (#198) spent 0.961 milliseconds in crypto helper computing work-order 198: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 198 for state #198 to event queue | scheduling resume sending helper answer for #198 | libevent_malloc: new ptr-libevent@0x7f4974038c78 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 198 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #198 | **emit ISAKMP Message: | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | ikev2 g^x d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | ikev2 g^x 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | ikev2 g^x 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | ikev2 g^x 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ikev2 g^x ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | ikev2 g^x 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | ikev2 g^x 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | ikev2 g^x c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | ikev2 g^x d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | ikev2 g^x 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | ikev2 g^x c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | ikev2 g^x 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | ikev2 g^x 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | ikev2 g^x 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | ikev2 g^x 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e 70 06 da 04 | IKEv2 nonce 43 32 39 eb c7 59 b5 85 fa 8a e9 37 90 93 9a 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3e c8 4e 17 4e 55 bc dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c6 | natd_hash: port=500 | natd_hash: hash= 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa 2d c6 7b 6b | natd_hash: hash= e9 d7 70 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa 2d c6 7b 6b | Notify data e9 d7 70 4d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3e c8 4e 17 4e 55 bc dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | natd_hash: hash= f9 de 29 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | Notify data f9 de 29 00 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #198 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #198: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #198 to 4294967295 after switching state | Message ID: IKE #198 skipping update_recv as MD is fake | Message ID: sent #198 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.198:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | state #198 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c022bc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da320e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #198 | libevent_malloc: new ptr-libevent@0x55564daa2ee8 size 128 | #198 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.933255 | resume sending helper answer for #198 suppresed complete_v2_state_transition() and stole MD | #198 spent 0.48 milliseconds in resume sending helper answer | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974038c78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.938461; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f4974038c78 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x55564da97558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #190 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10588.948766; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564da97558 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #168 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10588.968035; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #137 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x7f499c0333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #137 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10588.971339; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #77 | libevent_malloc: new ptr-libevent@0x7f499c0333b8 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #77 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0511 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10588.976608; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #183 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x55564da604f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #183 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0791 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-199' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #199 at 0x55564daa22a8 | State DB: adding IKEv2 state #199 in UNDEFINED | pstats #199 ikev2.ike started | Message ID: init #199: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #199: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #199; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-199" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-199" IKE SA #199 "road-eastnet-nonat-199" "road-eastnet-nonat-199" #199: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-199 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-199": constructed local IKE proposals for road-eastnet-nonat-199 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 199 for state #199 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #199 | libevent_malloc: new ptr-libevent@0x55564da604f8 size 128 | #199 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | crypto helper 18 starting work-order 199 for state #199 | RESET processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 199 | RESET processing: connection "road-eastnet-nonat-199" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.268 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 199 time elapsed 0.000844 seconds | (#199) spent 0.847 milliseconds in crypto helper computing work-order 199: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 199 for state #199 to event queue | scheduling resume sending helper answer for #199 | libevent_malloc: new ptr-libevent@0x7f4978038be8 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 199 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #199 | **emit ISAKMP Message: | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | ikev2 g^x d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | ikev2 g^x 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ikev2 g^x ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | ikev2 g^x 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | ikev2 g^x 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | ikev2 g^x 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | ikev2 g^x 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | ikev2 g^x b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | ikev2 g^x e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | ikev2 g^x 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | ikev2 g^x 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | ikev2 g^x e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | ikev2 g^x d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | ikev2 g^x 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | ikev2 g^x bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a1 d0 15 82 03 b1 3e 89 93 be 33 83 fe d9 a3 0e | IKEv2 nonce 08 ff fe 17 e8 be 60 5e 84 bd b6 18 3a a6 ca a6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b4 70 42 e3 d1 6a 13 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c7 | natd_hash: port=500 | natd_hash: hash= e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 b8 68 6f 4a | natd_hash: hash= 69 c3 d0 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 b8 68 6f 4a | Notify data 69 c3 d0 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b4 70 42 e3 d1 6a 13 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | natd_hash: hash= ac be f2 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | Notify data ac be f2 1c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #199 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #199: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #199 to 4294967295 after switching state | Message ID: IKE #199 skipping update_recv as MD is fake | Message ID: sent #199 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.199:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | state #199 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da604f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #199 | libevent_malloc: new ptr-libevent@0x55564daa4668 size 128 | #199 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10588.99439 | resume sending helper answer for #199 suppresed complete_v2_state_transition() and stole MD | #199 spent 0.45 milliseconds in resume sending helper answer | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978038be8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10588.998588; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500532 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #191 | libevent_malloc: new ptr-libevent@0x7f4978038be8 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x55564da98cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #191 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0913 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.025974; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564da98cd8 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x7f49a4022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #169 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.030278; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #78 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #78 spent 0.0967 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.034533; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #184 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #184 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-200' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #200 at 0x55564daa3a28 | State DB: adding IKEv2 state #200 in UNDEFINED | pstats #200 ikev2.ike started | Message ID: init #200: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #200: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #200; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-200" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-200" IKE SA #200 "road-eastnet-nonat-200" "road-eastnet-nonat-200" #200: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-200 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-200": constructed local IKE proposals for road-eastnet-nonat-200 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 200 for state #200 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da33788 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #200 | libevent_malloc: new ptr-libevent@0x7f49b40254e8 size 128 | #200 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-200" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.238 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 200 for state #200 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 200 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 200 time elapsed 0.000668 seconds | (#200) spent 0.666 milliseconds in crypto helper computing work-order 200: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 200 for state #200 to event queue | scheduling resume sending helper answer for #200 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 200 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #200 | **emit ISAKMP Message: | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | ikev2 g^x 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | ikev2 g^x 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | ikev2 g^x 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ikev2 g^x ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | ikev2 g^x 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | ikev2 g^x 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | ikev2 g^x 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | ikev2 g^x b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | ikev2 g^x a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | ikev2 g^x 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | ikev2 g^x 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | ikev2 g^x 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | ikev2 g^x e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | ikev2 g^x 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | ikev2 g^x 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4c 50 84 25 3b 94 49 e6 03 99 3e 31 35 c8 f6 88 | IKEv2 nonce 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd 0a 05 ba 3f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5f 01 09 8f 8c 74 cb 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c8 | natd_hash: port=500 | natd_hash: hash= f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f 51 ee 08 31 | natd_hash: hash= c7 ed fb 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f 51 ee 08 31 | Notify data c7 ed fb 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5f 01 09 8f 8c 74 cb 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | natd_hash: hash= 20 0d 50 df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | Notify data 20 0d 50 df | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #200 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #200: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #200 to 4294967295 after switching state | Message ID: IKE #200 skipping update_recv as MD is fake | Message ID: sent #200 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.200:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | state #200 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b40254e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da33788 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #200 | libevent_malloc: new ptr-libevent@0x55564daa5d78 size 128 | #200 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.053615 | resume sending helper answer for #200 suppresed complete_v2_state_transition() and stole MD | #200 spent 0.603 milliseconds in resume sending helper answer | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c038d28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.059838; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #138 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.07013; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #192 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x55564da9a3e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #192 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.090449; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006704 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564da9a3e8 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #79 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.093729; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #185 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #185 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.101985; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #170 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x7f49b0038aa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #170 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-201' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #201 at 0x55564daa51a8 | State DB: adding IKEv2 state #201 in UNDEFINED | pstats #201 ikev2.ike started | Message ID: init #201: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #201: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #201; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-201" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-201" IKE SA #201 "road-eastnet-nonat-201" "road-eastnet-nonat-201" #201: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-201 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-201": constructed local IKE proposals for road-eastnet-nonat-201 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 201 for state #201 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8ea48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #201 | libevent_malloc: new ptr-libevent@0x7f49b0038aa8 size 128 | #201 spent 0.127 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 201 for state #201 | RESET processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 201 | RESET processing: connection "road-eastnet-nonat-201" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.261 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 201 time elapsed 0.000643 seconds | (#201) spent 0.647 milliseconds in crypto helper computing work-order 201: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 201 for state #201 to event queue | scheduling resume sending helper answer for #201 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 201 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #201 | **emit ISAKMP Message: | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | ikev2 g^x 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | ikev2 g^x 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | ikev2 g^x df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | ikev2 g^x 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | ikev2 g^x 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | ikev2 g^x e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | ikev2 g^x eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | ikev2 g^x 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | ikev2 g^x 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | ikev2 g^x 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | ikev2 g^x 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | ikev2 g^x 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | ikev2 g^x 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | ikev2 g^x cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | ikev2 g^x 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 43 55 48 40 bf 10 ac 5a 44 bd 02 7a 57 54 c5 76 | IKEv2 nonce fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e dc 8b f9 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1e 8d fd 96 99 b6 a7 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c9 | natd_hash: port=500 | natd_hash: hash= ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 ff cb 9c 53 | natd_hash: hash= be 1a 97 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 ff cb 9c 53 | Notify data be 1a 97 dc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1e 8d fd 96 99 b6 a7 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | natd_hash: hash= 29 1d ec 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | Notify data 29 1d ec 22 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #201 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #201: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #201 to 4294967295 after switching state | Message ID: IKE #201 skipping update_recv as MD is fake | Message ID: sent #201 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.201:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | state #201 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0038aa8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8ea48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #201 | libevent_malloc: new ptr-libevent@0x55564daa74f8 size 128 | #201 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.113121 | resume sending helper answer for #201 suppresed complete_v2_state_transition() and stole MD | #201 spent 0.373 milliseconds in resume sending helper answer | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc03b5c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.126399; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #139 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #139 spent 0.0949 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.130664; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #193 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x55564da9a308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #193 spent 0.0819 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.151896; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #80 | libevent_malloc: new ptr-libevent@0x55564da9a308 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x7f4978028358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #80 spent 0.0979 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.16816; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #186 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #186 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.170452; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #171 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x7f49a4038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #171 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-202' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #202 at 0x55564daa68b8 | State DB: adding IKEv2 state #202 in UNDEFINED | pstats #202 ikev2.ike started | Message ID: init #202: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #202: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #202; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-202" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-202" IKE SA #202 "road-eastnet-nonat-202" "road-eastnet-nonat-202" #202: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-202 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-202": constructed local IKE proposals for road-eastnet-nonat-202 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 202 for state #202 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #202 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 | #202 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-202" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.186 milliseconds in whack | crypto helper 2 resuming | crypto helper 2 starting work-order 202 for state #202 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 202 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 202 time elapsed 0.000615 seconds | (#202) spent 0.619 milliseconds in crypto helper computing work-order 202: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 202 for state #202 to event queue | scheduling resume sending helper answer for #202 | libevent_malloc: new ptr-libevent@0x7f49b403b588 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 202 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #202 | **emit ISAKMP Message: | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | ikev2 g^x 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | ikev2 g^x e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | ikev2 g^x 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ikev2 g^x ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | ikev2 g^x 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | ikev2 g^x bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | ikev2 g^x 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | ikev2 g^x a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | ikev2 g^x 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | ikev2 g^x c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | ikev2 g^x 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | ikev2 g^x e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | ikev2 g^x 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | ikev2 g^x a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | ikev2 g^x df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4c 25 30 46 0f a7 2d 68 96 35 45 76 0a 19 fc ab | IKEv2 nonce e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c 58 b7 22 ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 f6 d3 a5 59 8b 18 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ca | natd_hash: port=500 | natd_hash: hash= f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 fb d9 b1 a9 | natd_hash: hash= 9d 52 cb e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 fb d9 b1 a9 | Notify data 9d 52 cb e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 f6 d3 a5 59 8b 18 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | natd_hash: hash= ae be d9 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | Notify data ae be d9 a7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #202 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #202: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #202 to 4294967295 after switching state | Message ID: IKE #202 skipping update_recv as MD is fake | Message ID: sent #202 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.202:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | state #202 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4038c28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #202 | libevent_malloc: new ptr-libevent@0x55564daa8c78 size 128 | #202 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.172318 | resume sending helper answer for #202 suppresed complete_v2_state_transition() and stole MD | #202 spent 0.342 milliseconds in resume sending helper answer | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b403b588 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.187598; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #140 | libevent_malloc: new ptr-libevent@0x7f49b403b588 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #140 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.18989; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #194 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x55564da9d1c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #194 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0507 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.232316; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #172 | libevent_malloc: new ptr-libevent@0x55564da9d1c8 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x7f49b00282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #172 spent 0.447 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.242354; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #81 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #81 spent 0.703 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.329 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.249731; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #195 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x55564da9e8d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #195 spent 0.701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.256019; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #141 | libevent_malloc: new ptr-libevent@0x55564da9e8d8 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x55564da0ac68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #141 spent 0.46 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-203' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #203 at 0x55564daa8038 | State DB: adding IKEv2 state #203 in UNDEFINED | pstats #203 ikev2.ike started | Message ID: init #203: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #203: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #203; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-203" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-203" IKE SA #203 "road-eastnet-nonat-203" "road-eastnet-nonat-203" #203: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-203 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-203": constructed local IKE proposals for road-eastnet-nonat-203 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 203 for state #203 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564da0ac68 size 128 | #203 spent 0.527 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 203 for state #203 | RESET processing: connection "road-eastnet-nonat-203" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 203 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.783 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.228 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 203 time elapsed 0.002191 seconds | (#203) spent 2.19 milliseconds in crypto helper computing work-order 203: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 203 for state #203 to event queue | scheduling resume sending helper answer for #203 | libevent_malloc: new ptr-libevent@0x7f49b803bfe8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 203 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #203 | **emit ISAKMP Message: | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | ikev2 g^x b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | ikev2 g^x d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | ikev2 g^x 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | ikev2 g^x 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | ikev2 g^x 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | ikev2 g^x 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | ikev2 g^x e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | ikev2 g^x 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ikev2 g^x ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | ikev2 g^x 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | ikev2 g^x 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | ikev2 g^x a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | ikev2 g^x bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | ikev2 g^x e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | ikev2 g^x 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 40 92 dd 62 59 ba a6 36 da 8c 11 f5 d0 77 5a 17 | IKEv2 nonce e3 6b 0e 39 4b 60 38 9c de 3f 34 6b 56 f1 8a 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 20 15 03 94 aa c3 e2 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cb | natd_hash: port=500 | natd_hash: hash= 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b 10 1d 89 dc | natd_hash: hash= 3f 93 40 e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b 10 1d 89 dc | Notify data 3f 93 40 e3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 20 15 03 94 aa c3 e2 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | natd_hash: hash= 56 a3 b0 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | Notify data 56 a3 b0 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #203 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #203: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #203 to 4294967295 after switching state | Message ID: IKE #203 skipping update_recv as MD is fake | Message ID: sent #203 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.203:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | state #203 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da0ac68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564daaa3f8 size 128 | #203 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.261257 | resume sending helper answer for #203 suppresed complete_v2_state_transition() and stole MD | #203 spent 1.58 milliseconds in resume sending helper answer | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b803bfe8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.261664; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #187 | libevent_malloc: new ptr-libevent@0x7f49b803bfe8 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x7f4988038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #187 spent 0.371 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.177 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.292371; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #173 | libevent_malloc: new ptr-libevent@0x7f4988038b68 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x55564da2daf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #173 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.300717; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003877 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #82 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.311107; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x55564da9ffe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #196 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-204' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #204 at 0x55564daa97b8 | State DB: adding IKEv2 state #204 in UNDEFINED | pstats #204 ikev2.ike started | Message ID: init #204: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #204: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #204; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-204" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-204" IKE SA #204 "road-eastnet-nonat-204" "road-eastnet-nonat-204" #204: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-204 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-204": constructed local IKE proposals for road-eastnet-nonat-204 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 204 for state #204 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #204 | libevent_malloc: new ptr-libevent@0x55564da9ffe8 size 128 | #204 spent 0.226 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | crypto helper 5 starting work-order 204 for state #204 | RESET processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-204" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 204 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.325 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 204 time elapsed 0.000684 seconds | (#204) spent 0.689 milliseconds in crypto helper computing work-order 204: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 204 for state #204 to event queue | scheduling resume sending helper answer for #204 | libevent_malloc: new ptr-libevent@0x7f49ac03e388 size 128 | crypto helper 5 waiting (nothing to do) | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.32074; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #188 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #188 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 204 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #204 | **emit ISAKMP Message: | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | ikev2 g^x d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | ikev2 g^x a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | ikev2 g^x 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | ikev2 g^x 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | ikev2 g^x 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | ikev2 g^x 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | ikev2 g^x 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | ikev2 g^x 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | ikev2 g^x 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | ikev2 g^x 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | ikev2 g^x e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | ikev2 g^x d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | ikev2 g^x 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | ikev2 g^x 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | ikev2 g^x 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b 3e 35 04 75 | IKEv2 nonce 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 0e c7 81 c0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 41 9b d2 68 04 54 94 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cc | natd_hash: port=500 | natd_hash: hash= 2b bd 48 bd ea 80 31 1d f4 22 7d 05 eb 3e 72 e8 | natd_hash: hash= 68 67 a1 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b bd 48 bd ea 80 31 1d f4 22 7d 05 eb 3e 72 e8 | Notify data 68 67 a1 87 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 41 9b d2 68 04 54 94 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | natd_hash: hash= bf 6b ba dd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | Notify data bf 6b ba dd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #204 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #204: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #204 to 4294967295 after switching state | Message ID: IKE #204 skipping update_recv as MD is fake | Message ID: sent #204 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.204:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | state #204 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da9ffe8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #204 | libevent_malloc: new ptr-libevent@0x55564daabb08 size 128 | #204 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.32137 | resume sending helper answer for #204 suppresed complete_v2_state_transition() and stole MD | #204 spent 0.383 milliseconds in resume sending helper answer | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac03e388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.322609; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #142 | libevent_malloc: new ptr-libevent@0x7f49ac03e388 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #142 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.353847; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #174 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #174 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0754 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.362237; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #83 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x7f49880282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #83 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.37353; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #197 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x55564daa1768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #197 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-205' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #205 at 0x55564daaaf38 | State DB: adding IKEv2 state #205 in UNDEFINED | pstats #205 ikev2.ike started | Message ID: init #205: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #205: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #205; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-205" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-205" IKE SA #205 "road-eastnet-nonat-205" "road-eastnet-nonat-205" #205: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-205 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-205": constructed local IKE proposals for road-eastnet-nonat-205 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 205 for state #205 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da17c08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #205 | libevent_malloc: new ptr-libevent@0x55564daa1768 size 128 | crypto helper 6 resuming | #205 spent 0.188 milliseconds in ikev2_parent_outI1() | crypto helper 6 starting work-order 205 for state #205 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 205 | RESET processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-205" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.315 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 205 time elapsed 0.000751 seconds | (#205) spent 0.743 milliseconds in crypto helper computing work-order 205: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 205 for state #205 to event queue | scheduling resume sending helper answer for #205 | libevent_malloc: new ptr-libevent@0x7f49b003e2b8 size 128 | crypto helper 6 waiting (nothing to do) | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.380508; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #189 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #189 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 205 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #205 | **emit ISAKMP Message: | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | ikev2 g^x d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | ikev2 g^x 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | ikev2 g^x 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | ikev2 g^x 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | ikev2 g^x 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | ikev2 g^x c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | ikev2 g^x 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | ikev2 g^x 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | ikev2 g^x 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | ikev2 g^x b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ikev2 g^x ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | ikev2 g^x db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | ikev2 g^x 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | ikev2 g^x df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | ikev2 g^x 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 b9 04 35 a2 | IKEv2 nonce dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 a3 49 34 65 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 65 41 77 87 fd d2 74 b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cd | natd_hash: port=500 | natd_hash: hash= 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 a8 1c cf 5a | natd_hash: hash= 5d 72 85 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 a8 1c cf 5a | Notify data 5d 72 85 6c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 65 41 77 87 fd d2 74 b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | natd_hash: hash= ab d7 98 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | Notify data ab d7 98 bf | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #205 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #205: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #205 to 4294967295 after switching state | Message ID: IKE #205 skipping update_recv as MD is fake | Message ID: sent #205 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.205:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | state #205 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564daa1768 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da17c08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #205 | libevent_malloc: new ptr-libevent@0x55564daad218 size 128 | #205 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.381181 | resume sending helper answer for #205 suppresed complete_v2_state_transition() and stole MD | #205 spent 0.504 milliseconds in resume sending helper answer | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b003e2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.383465; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #143 | libevent_malloc: new ptr-libevent@0x7f49b003e2b8 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #143 spent 0.0896 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.411732; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #175 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #175 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.43305; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #198 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x55564daa2ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #198 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.439424; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #190 | libevent_malloc: new ptr-libevent@0x55564daa2ee8 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x7f4974038c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #190 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-206' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #206 at 0x55564daac648 | State DB: adding IKEv2 state #206 in UNDEFINED | pstats #206 ikev2.ike started | Message ID: init #206: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #206: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #206; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-206" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-206" IKE SA #206 "road-eastnet-nonat-206" "road-eastnet-nonat-206" #206: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-206 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-206": constructed local IKE proposals for road-eastnet-nonat-206 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 206 for state #206 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa2e78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #206 | libevent_malloc: new ptr-libevent@0x7f4974038c78 size 128 | #206 spent 0.187 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-206" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.29 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 206 for state #206 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 206 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 206 time elapsed 0.000625 seconds | (#206) spent 0.631 milliseconds in crypto helper computing work-order 206: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 206 for state #206 to event queue | scheduling resume sending helper answer for #206 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 206 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #206 | **emit ISAKMP Message: | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | ikev2 g^x fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | ikev2 g^x 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | ikev2 g^x 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | ikev2 g^x 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | ikev2 g^x b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | ikev2 g^x b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | ikev2 g^x fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | ikev2 g^x f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | ikev2 g^x 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | ikev2 g^x 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | ikev2 g^x 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | ikev2 g^x fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | ikev2 g^x a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | ikev2 g^x 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | ikev2 g^x 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 34 47 b5 79 f9 6b 03 18 cc b4 cb 2f ee 7f ff | IKEv2 nonce d1 88 7d 23 24 54 29 68 b0 76 1b 0f 8c 9b 7d 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c5 59 69 a7 34 f8 b3 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ce | natd_hash: port=500 | natd_hash: hash= 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 1b 4b 9a 3c | natd_hash: hash= 6b 04 47 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 1b 4b 9a 3c | Notify data 6b 04 47 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c5 59 69 a7 34 f8 b3 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | natd_hash: hash= 03 1a f2 38 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | Notify data 03 1a f2 38 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #206 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #206: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #206 to 4294967295 after switching state | Message ID: IKE #206 skipping update_recv as MD is fake | Message ID: sent #206 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.206:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | state #206 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974038c78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa2e78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #206 | libevent_malloc: new ptr-libevent@0x55564daae928 size 128 | #206 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.44105 | resume sending helper answer for #206 suppresed complete_v2_state_transition() and stole MD | #206 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4038c28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.445211; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #144 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #144 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0747 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.4515; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #84 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x7f49ac02da98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #84 spent 0.0992 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.4718; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #176 | libevent_malloc: new ptr-libevent@0x7f49ac02da98 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #176 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0774 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.495227; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #199 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x55564daa4668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #199 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-207' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #207 at 0x55564daadd58 | State DB: adding IKEv2 state #207 in UNDEFINED | pstats #207 ikev2.ike started | Message ID: init #207: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #207: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #207; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-207" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-207" IKE SA #207 "road-eastnet-nonat-207" "road-eastnet-nonat-207" #207: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-207 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-207": constructed local IKE proposals for road-eastnet-nonat-207 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 207 for state #207 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #207 | libevent_malloc: new ptr-libevent@0x55564daa4668 size 128 | #207 spent 0.165 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 207 for state #207 | RESET processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-207" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 207 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.247 milliseconds in whack | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.499387; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #191 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x7f4978038be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #191 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 207 time elapsed 0.000731 seconds | (#207) spent 0.722 milliseconds in crypto helper computing work-order 207: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 207 for state #207 to event queue | scheduling resume sending helper answer for #207 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 207 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #207 | **emit ISAKMP Message: | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | ikev2 g^x 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ikev2 g^x ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | ikev2 g^x 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | ikev2 g^x 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | ikev2 g^x 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | ikev2 g^x 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | ikev2 g^x e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | ikev2 g^x 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | ikev2 g^x 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | ikev2 g^x 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | ikev2 g^x 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | ikev2 g^x 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | ikev2 g^x 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ikev2 g^x ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | ikev2 g^x e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 f1 c8 53 97 | IKEv2 nonce d4 89 01 68 49 85 5e f3 7c eb 71 44 85 df d8 58 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 35 23 fc e4 c1 3e c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cf | natd_hash: port=500 | natd_hash: hash= a0 86 cb e1 c5 30 73 cf 08 25 3e e3 af 33 ce 50 | natd_hash: hash= a0 96 ee 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 86 cb e1 c5 30 73 cf 08 25 3e e3 af 33 ce 50 | Notify data a0 96 ee 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 35 23 fc e4 c1 3e c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | natd_hash: hash= 6c 5e 45 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | Notify data 6c 5e 45 3a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #207 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #207: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #207 to 4294967295 after switching state | Message ID: IKE #207 skipping update_recv as MD is fake | Message ID: sent #207 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.207:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | state #207 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564daa4668 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #207 | libevent_malloc: new ptr-libevent@0x55564dab00a8 size 128 | #207 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.500641 | resume sending helper answer for #207 suppresed complete_v2_state_transition() and stole MD | #207 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a803e4b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.504848; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #145 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x55564da49188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #145 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.533201; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #177 | libevent_malloc: new ptr-libevent@0x55564da49188 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x7f4994028448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #177 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.534489; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #85 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #85 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.554825; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #200 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x55564daa5d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #200 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0786 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-208' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #208 at 0x55564daaf468 | State DB: adding IKEv2 state #208 in UNDEFINED | pstats #208 ikev2.ike started | Message ID: init #208: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #208: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #208; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-208" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-208" IKE SA #208 "road-eastnet-nonat-208" "road-eastnet-nonat-208" #208: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-208 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-208": constructed local IKE proposals for road-eastnet-nonat-208 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 208 for state #208 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da33788 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #208 | libevent_malloc: new ptr-libevent@0x55564daa5d78 size 128 | #208 spent 0.16 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 starting work-order 208 for state #208 | RESET processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 208 | RESET processing: connection "road-eastnet-nonat-208" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 208 time elapsed 0.000721 seconds | (#208) spent 0.727 milliseconds in crypto helper computing work-order 208: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 208 for state #208 to event queue | scheduling resume sending helper answer for #208 | libevent_malloc: new ptr-libevent@0x7f499c03e498 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 208 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #208 | **emit ISAKMP Message: | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | ikev2 g^x 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | ikev2 g^x a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | ikev2 g^x 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | ikev2 g^x 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | ikev2 g^x b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | ikev2 g^x 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | ikev2 g^x b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | ikev2 g^x 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | ikev2 g^x 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | ikev2 g^x d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | ikev2 g^x 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | ikev2 g^x 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | ikev2 g^x 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ikev2 g^x ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | ikev2 g^x a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a 86 7a 11 e5 68 03 62 97 6b cc d4 b8 8a ca 58 | IKEv2 nonce b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad 18 f7 35 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9a 30 ae d5 69 11 3d 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d0 | natd_hash: port=500 | natd_hash: hash= 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b 00 5a 57 54 | natd_hash: hash= 7b 6d 7d 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b 00 5a 57 54 | Notify data 7b 6d 7d 2a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9a 30 ae d5 69 11 3d 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | natd_hash: hash= de 86 42 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | Notify data de 86 42 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #208 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #208: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #208 to 4294967295 after switching state | Message ID: IKE #208 skipping update_recv as MD is fake | Message ID: sent #208 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.208:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | state #208 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564daa5d78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da33788 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #208 | libevent_malloc: new ptr-libevent@0x55564dab17b8 size 128 | #208 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.561852 | resume sending helper answer for #208 suppresed complete_v2_state_transition() and stole MD | #208 spent 0.419 milliseconds in resume sending helper answer | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c03e498 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.566062; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003784 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #146 | libevent_malloc: new ptr-libevent@0x7f499c03e498 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #146 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.571389; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #192 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #192 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.594739; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #86 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x7f49a402db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #86 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.613054; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #201 | libevent_malloc: new ptr-libevent@0x7f49a402db48 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x55564daa74f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #201 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-209' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #209 at 0x55564dab0be8 | State DB: adding IKEv2 state #209 in UNDEFINED | pstats #209 ikev2.ike started | Message ID: init #209: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #209: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #209; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-209" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-209" IKE SA #209 "road-eastnet-nonat-209" "road-eastnet-nonat-209" #209: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-209 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-209": constructed local IKE proposals for road-eastnet-nonat-209 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 209 for state #209 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8ea48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #209 | libevent_malloc: new ptr-libevent@0x55564daa74f8 size 128 | #209 spent 0.169 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 resuming | RESET processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-209" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 10 starting work-order 209 for state #209 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 209 | spent 0.275 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 209 time elapsed 0.001026 seconds | (#209) spent 1.03 milliseconds in crypto helper computing work-order 209: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 209 for state #209 to event queue | scheduling resume sending helper answer for #209 | libevent_malloc: new ptr-libevent@0x7f49a003e3d8 size 128 | crypto helper 10 waiting (nothing to do) | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.621875; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #178 | libevent_malloc: new ptr-libevent@0x7f4978038be8 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #178 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 209 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #209 | **emit ISAKMP Message: | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | ikev2 g^x 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | ikev2 g^x 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | ikev2 g^x 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | ikev2 g^x cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | ikev2 g^x f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | ikev2 g^x e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | ikev2 g^x 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | ikev2 g^x 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | ikev2 g^x 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | ikev2 g^x 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | ikev2 g^x 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | ikev2 g^x bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | ikev2 g^x 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | ikev2 g^x f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | ikev2 g^x 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b 00 26 b0 f8 | IKEv2 nonce 74 e2 1f f8 97 68 97 1f ba 93 1f 80 85 54 1a 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd da 21 2a f0 14 ed af | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 1b bb 78 16 60 fe 57 1a df f2 7b 11 39 1a 0e fa | natd_hash: hash= 1e 07 d8 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b bb 78 16 60 fe 57 1a df f2 7b 11 39 1a 0e fa | Notify data 1e 07 d8 64 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd da 21 2a f0 14 ed af | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | natd_hash: hash= 1b 96 78 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | Notify data 1b 96 78 aa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #209 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #209: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #209 to 4294967295 after switching state | Message ID: IKE #209 skipping update_recv as MD is fake | Message ID: sent #209 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | state #209 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564daa74f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8ea48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #209 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 | #209 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.622476 | resume sending helper answer for #209 suppresed complete_v2_state_transition() and stole MD | #209 spent 0.431 milliseconds in resume sending helper answer | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a003e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.624722; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #147 | libevent_malloc: new ptr-libevent@0x7f49a003e3d8 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x7f4974033468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #147 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.631047; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #193 | libevent_malloc: new ptr-libevent@0x7f4974033468 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #193 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.655378; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #87 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #87 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.673674; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #202 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x55564daa8c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #202 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-210' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #210 at 0x55564dab22f8 | State DB: adding IKEv2 state #210 in UNDEFINED | pstats #210 ikev2.ike started | Message ID: init #210: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #210: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #210; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-210" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-210" IKE SA #210 "road-eastnet-nonat-210" "road-eastnet-nonat-210" #210: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-210 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-210": constructed local IKE proposals for road-eastnet-nonat-210 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 210 for state #210 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #210 | libevent_malloc: new ptr-libevent@0x55564daa8c78 size 128 | #210 spent 0.164 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | crypto helper 11 starting work-order 210 for state #210 | RESET processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-210" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 210 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 210 time elapsed 0.000643 seconds | (#210) spent 0.646 milliseconds in crypto helper computing work-order 210: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 210 for state #210 to event queue | scheduling resume sending helper answer for #210 | libevent_malloc: new ptr-libevent@0x7f499403e548 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 210 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #210 | **emit ISAKMP Message: | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | ikev2 g^x cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | ikev2 g^x 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | ikev2 g^x 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | ikev2 g^x d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | ikev2 g^x 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ikev2 g^x ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | ikev2 g^x 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | ikev2 g^x 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | ikev2 g^x c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | ikev2 g^x 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | ikev2 g^x 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | ikev2 g^x 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | ikev2 g^x 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | ikev2 g^x d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | ikev2 g^x 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a 39 0f 92 73 | IKEv2 nonce a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 25 c4 de 8a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a7 6f 88 d4 bc 72 e4 20 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d2 | natd_hash: port=500 | natd_hash: hash= a1 bb 2e 24 1b 61 8e 36 da 39 83 db 21 32 af 79 | natd_hash: hash= ac 29 27 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 bb 2e 24 1b 61 8e 36 da 39 83 db 21 32 af 79 | Notify data ac 29 27 a0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a7 6f 88 d4 bc 72 e4 20 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | natd_hash: hash= 5c ab fb 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | Notify data 5c ab fb 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #210 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #210: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #210 to 4294967295 after switching state | Message ID: IKE #210 skipping update_recv as MD is fake | Message ID: sent #210 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.210:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | state #210 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564daa8c78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #210 | libevent_malloc: new ptr-libevent@0x55564dab45d8 size 128 | #210 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.683057 | resume sending helper answer for #210 suppresed complete_v2_state_transition() and stole MD | #210 spent 0.401 milliseconds in resume sending helper answer | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499403e548 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.69123; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #194 | libevent_malloc: new ptr-libevent@0x7f499403e548 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #194 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.697564; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #148 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #148 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.712858; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #179 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #179 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.721147; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #88 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x7f499c02db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #88 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-211' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #211 at 0x55564dab3a08 | State DB: adding IKEv2 state #211 in UNDEFINED | pstats #211 ikev2.ike started | Message ID: init #211: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #211: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #211; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-211" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-211" IKE SA #211 "road-eastnet-nonat-211" "road-eastnet-nonat-211" #211: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-211 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-211": constructed local IKE proposals for road-eastnet-nonat-211 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 211 for state #211 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #211 | libevent_malloc: new ptr-libevent@0x7f499c02db48 size 128 | #211 spent 0.13 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-211" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.194 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 211 for state #211 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 211 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 211 time elapsed 0.000553 seconds | (#211) spent 0.569 milliseconds in crypto helper computing work-order 211: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 211 for state #211 to event queue | scheduling resume sending helper answer for #211 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 211 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #211 | **emit ISAKMP Message: | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ikev2 g^x ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | ikev2 g^x 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | ikev2 g^x 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | ikev2 g^x 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | ikev2 g^x 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | ikev2 g^x 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | ikev2 g^x 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | ikev2 g^x 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | ikev2 g^x c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | ikev2 g^x 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | ikev2 g^x 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | ikev2 g^x 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | ikev2 g^x a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | ikev2 g^x dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | ikev2 g^x 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c4 2a ca 61 91 75 ef e0 5f d7 a0 3e 85 59 a7 0d | IKEv2 nonce da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 91 5d 7b 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 d6 fc 69 5e 90 74 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d3 | natd_hash: port=500 | natd_hash: hash= bf 5d ca dc 16 17 a4 9f f2 cb a0 1e 15 d2 98 59 | natd_hash: hash= 65 a6 11 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 5d ca dc 16 17 a4 9f f2 cb a0 1e 15 d2 98 59 | Notify data 65 a6 11 a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 d6 fc 69 5e 90 74 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | natd_hash: hash= 4b a6 92 f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | Notify data 4b a6 92 f1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #211 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #211: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #211 to 4294967295 after switching state | Message ID: IKE #211 skipping update_recv as MD is fake | Message ID: sent #211 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.211:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | state #211 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c02db48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #211 | libevent_malloc: new ptr-libevent@0x55564dab5ce8 size 128 | #211 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.741642 | resume sending helper answer for #211 suppresed complete_v2_state_transition() and stole MD | #211 spent 0.319 milliseconds in resume sending helper answer | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499803e2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.750812; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #195 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #195 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.760258; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #203 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x55564daaa3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #203 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.76214; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #149 | libevent_malloc: new ptr-libevent@0x55564daaa3f8 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x7f496c028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #149 spent 0.403 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.796957; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003987 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #180 | libevent_malloc: new ptr-libevent@0x7f496c028438 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x7f49b0033238 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #180 spent 0.433 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.281 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.811921; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #89 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #89 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.812359; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #196 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.149 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.819997; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #150 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #150 spent 0.214 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0998 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-212' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #212 at 0x55564dab5118 | State DB: adding IKEv2 state #212 in UNDEFINED | pstats #212 ikev2.ike started | Message ID: init #212: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #212: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #212; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-212" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-212" IKE SA #212 "road-eastnet-nonat-212" "road-eastnet-nonat-212" #212: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-212 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-212": constructed local IKE proposals for road-eastnet-nonat-212 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 212 for state #212 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da2f298 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #212 | libevent_malloc: new ptr-libevent@0x7f49780055c8 size 128 | #212 spent 0.256 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | RESET processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 212 for state #212 | RESET processing: connection "road-eastnet-nonat-212" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 212 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.423 milliseconds in whack | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.821913; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #204 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x55564daabb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #204 spent 0.206 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 212 time elapsed 0.001787 seconds | (#212) spent 1.77 milliseconds in crypto helper computing work-order 212: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 212 for state #212 to event queue | scheduling resume sending helper answer for #212 | libevent_malloc: new ptr-libevent@0x7f498c03e328 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 212 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #212 | **emit ISAKMP Message: | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | ikev2 g^x e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ikev2 g^x ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | ikev2 g^x 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | ikev2 g^x 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | ikev2 g^x 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | ikev2 g^x 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | ikev2 g^x a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | ikev2 g^x b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | ikev2 g^x 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | ikev2 g^x 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ikev2 g^x ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | ikev2 g^x 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | ikev2 g^x 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | ikev2 g^x 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | ikev2 g^x 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 2c c7 76 04 | IKEv2 nonce 4c c4 2a df 58 dd 59 8b 1a 79 33 62 06 f4 5d 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8a 2f b9 b0 ef 4f 15 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d4 | natd_hash: port=500 | natd_hash: hash= d9 53 8c 83 65 8c 63 d9 be 1a fc 73 af 62 d1 28 | natd_hash: hash= b3 00 ee ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 53 8c 83 65 8c 63 d9 be 1a fc 73 af 62 d1 28 | Notify data b3 00 ee ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8a 2f b9 b0 ef 4f 15 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | natd_hash: hash= e6 42 85 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | Notify data e6 42 85 54 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #212 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #212: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #212 to 4294967295 after switching state | Message ID: IKE #212 skipping update_recv as MD is fake | Message ID: sent #212 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.212:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | state #212 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da2f298 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #212 | libevent_malloc: new ptr-libevent@0x55564dab7468 size 128 | #212 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.823478 | resume sending helper answer for #212 suppresed complete_v2_state_transition() and stole MD | #212 spent 0.813 milliseconds in resume sending helper answer | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c03e328 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.856893; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #181 | libevent_malloc: new ptr-libevent@0x7f498c03e328 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x7f49a40333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #181 spent 0.353 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.874696; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #197 | libevent_malloc: new ptr-libevent@0x7f49a40333b8 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x7f49880282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #197 spent 0.436 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.879619; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #151 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #151 spent 0.428 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.881541; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #205 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x55564daad218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #205 spent 0.403 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.889443; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564daad218 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x55564da534e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #90 spent 0.618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-213' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #213 at 0x55564dab6828 | State DB: adding IKEv2 state #213 in UNDEFINED | pstats #213 ikev2.ike started | Message ID: init #213: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #213: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #213; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-213" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-213" IKE SA #213 "road-eastnet-nonat-213" "road-eastnet-nonat-213" #213: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-213 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-213": constructed local IKE proposals for road-eastnet-nonat-213 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 213 for state #213 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564da534e8 size 128 | #213 spent 0.656 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 213 for state #213 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 213 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-213" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 1.02 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 213 time elapsed 0.004363 seconds | (#213) spent 4.36 milliseconds in crypto helper computing work-order 213: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 213 for state #213 to event queue | scheduling resume sending helper answer for #213 | libevent_malloc: new ptr-libevent@0x7f499003e318 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 213 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #213 | **emit ISAKMP Message: | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | ikev2 g^x a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | ikev2 g^x 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | ikev2 g^x 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | ikev2 g^x 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | ikev2 g^x 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | ikev2 g^x 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | ikev2 g^x f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | ikev2 g^x 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | ikev2 g^x 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | ikev2 g^x 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | ikev2 g^x 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | ikev2 g^x 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | ikev2 g^x 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | ikev2 g^x 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | ikev2 g^x d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 d2 b7 a7 84 | IKEv2 nonce ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 8d 19 f1 55 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9a 27 b0 69 f3 87 41 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d5 | natd_hash: port=500 | natd_hash: hash= 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 d5 87 03 4a | natd_hash: hash= 10 9b c9 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 d5 87 03 4a | Notify data 10 9b c9 e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9a 27 b0 69 f3 87 41 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | natd_hash: hash= 0f 5e e7 ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | Notify data 0f 5e e7 ab | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #213 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #213: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #213 to 4294967295 after switching state | Message ID: IKE #213 skipping update_recv as MD is fake | Message ID: sent #213 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.213:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | state #213 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da534e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564dab8be8 size 128 | #213 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10589.919114 | resume sending helper answer for #213 suppresed complete_v2_state_transition() and stole MD | #213 spent 2.38 milliseconds in resume sending helper answer | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499003e318 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.919698; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #182 | libevent_malloc: new ptr-libevent@0x7f499003e318 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #182 spent 0.551 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.934916; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #198 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #198 spent 0.662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.303 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10589.943451; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #206 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x55564daae928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #206 spent 0.506 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.234 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10589.946527; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #152 | libevent_malloc: new ptr-libevent@0x55564daae928 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #152 spent 0.545 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.286 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10589.97467; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #91 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #91 spent 0.621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.276 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10589.977957; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #183 spent 0.539 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10589.996828; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #199 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #199 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0818 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-214' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #214 at 0x55564dab7fa8 | State DB: adding IKEv2 state #214 in UNDEFINED | pstats #214 ikev2.ike started | Message ID: init #214: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #214: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #214; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-214" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-214" IKE SA #214 "road-eastnet-nonat-214" "road-eastnet-nonat-214" #214: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-214 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-214": constructed local IKE proposals for road-eastnet-nonat-214 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 214 for state #214 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f88 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #214 | libevent_malloc: new ptr-libevent@0x7f499001d308 size 128 | #214 spent 0.212 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | RESET processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-214" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 starting work-order 214 for state #214 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 214 | spent 0.349 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 214 time elapsed 0.00155 seconds | (#214) spent 1.52 milliseconds in crypto helper computing work-order 214: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 214 for state #214 to event queue | scheduling resume sending helper answer for #214 | libevent_malloc: new ptr-libevent@0x7f498403e1a8 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 214 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #214 | **emit ISAKMP Message: | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | ikev2 g^x d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | ikev2 g^x 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | ikev2 g^x 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | ikev2 g^x e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | ikev2 g^x 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | ikev2 g^x 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ikev2 g^x ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | ikev2 g^x 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | ikev2 g^x 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | ikev2 g^x e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | ikev2 g^x 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ikev2 g^x ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | ikev2 g^x f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | ikev2 g^x 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | ikev2 g^x 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3e bc 3d ef dd 5d b0 55 b7 fc ca ab 79 5b c0 e2 | IKEv2 nonce 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 17 05 f3 c3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 76 81 bf ce 9d e2 78 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d6 | natd_hash: port=500 | natd_hash: hash= 36 06 40 29 53 60 c1 70 6d ad f7 43 a2 1d 91 a6 | natd_hash: hash= c3 69 ec 9a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 06 40 29 53 60 c1 70 6d ad f7 43 a2 1d 91 a6 | Notify data c3 69 ec 9a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 76 81 bf ce 9d e2 78 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | natd_hash: hash= 1d 13 6c e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | Notify data 1d 13 6c e0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #214 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #214: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #214 to 4294967295 after switching state | Message ID: IKE #214 skipping update_recv as MD is fake | Message ID: sent #214 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.214:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | state #214 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499001d308 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f88 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #214 | libevent_malloc: new ptr-libevent@0x55564daba2f8 size 128 | #214 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.00082 | resume sending helper answer for #214 suppresed complete_v2_state_transition() and stole MD | #214 spent 0.78 milliseconds in resume sending helper answer | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498403e1a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0804 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.000981; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #207 | libevent_malloc: new ptr-libevent@0x7f498403e1a8 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x55564dab00a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #207 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0726 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.004336; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #153 | libevent_malloc: new ptr-libevent@0x55564dab00a8 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #153 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0791 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.035716; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002615 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #184 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #184 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.055031; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001416 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #200 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #200 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.056319; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #92 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x55564d9ff498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #92 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-215' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #215 at 0x55564dab9728 | State DB: adding IKEv2 state #215 in UNDEFINED | pstats #215 ikev2.ike started | Message ID: init #215: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #215: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #215; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-215" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-215" IKE SA #215 "road-eastnet-nonat-215" "road-eastnet-nonat-215" #215: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-215 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-215": constructed local IKE proposals for road-eastnet-nonat-215 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 215 for state #215 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #215 | libevent_malloc: new ptr-libevent@0x55564d9ff498 size 128 | #215 spent 0.194 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-215" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.292 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 215 for state #215 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 215 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 215 time elapsed 0.00063 seconds | (#215) spent 0.633 milliseconds in crypto helper computing work-order 215: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 215 for state #215 to event queue | scheduling resume sending helper answer for #215 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 215 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #215 | **emit ISAKMP Message: | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | ikev2 g^x 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | ikev2 g^x fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | ikev2 g^x 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | ikev2 g^x 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | ikev2 g^x c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | ikev2 g^x d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ikev2 g^x ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | ikev2 g^x c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | ikev2 g^x 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | ikev2 g^x 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | ikev2 g^x fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | ikev2 g^x 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | ikev2 g^x 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | ikev2 g^x 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | ikev2 g^x 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a b3 08 8e e1 | IKEv2 nonce 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d c5 5c 2f 0c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b1 04 b9 07 a6 64 56 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d7 | natd_hash: port=500 | natd_hash: hash= b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba 3a 43 8a 1c | natd_hash: hash= f3 85 81 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba 3a 43 8a 1c | Notify data f3 85 81 55 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b1 04 b9 07 a6 64 56 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | natd_hash: hash= 3e c6 dd 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | Notify data 3e c6 dd 6e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #215 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #215: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #215 to 4294967295 after switching state | Message ID: IKE #215 skipping update_recv as MD is fake | Message ID: sent #215 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.215:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | state #215 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9ff498 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a5538 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #215 | libevent_malloc: new ptr-libevent@0x55564dabba78 size 128 | #215 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.059839 | resume sending helper answer for #215 suppresed complete_v2_state_transition() and stole MD | #215 spent 0.518 milliseconds in resume sending helper answer | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498803e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.062049; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #208 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x55564dab17b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #208 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.064304; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #154 | libevent_malloc: new ptr-libevent@0x55564dab17b8 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #154 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.094613; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #185 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #185 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0763 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.113983; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000862 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #201 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x7f49a402db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #201 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-216' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #216 at 0x55564dabae38 | State DB: adding IKEv2 state #216 in UNDEFINED | pstats #216 ikev2.ike started | Message ID: init #216: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #216: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #216; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-216" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-216" IKE SA #216 "road-eastnet-nonat-216" "road-eastnet-nonat-216" #216: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-216 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-216": constructed local IKE proposals for road-eastnet-nonat-216 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 216 for state #216 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da56228 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #216 | libevent_malloc: new ptr-libevent@0x7f49a402db48 size 128 | #216 spent 0.135 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-216" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.592 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 216 for state #216 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 216 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 216 time elapsed 0.000757 seconds | (#216) spent 0.753 milliseconds in crypto helper computing work-order 216: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 216 for state #216 to event queue | scheduling resume sending helper answer for #216 | libevent_malloc: new ptr-libevent@0x7f497c03e3d8 size 128 | crypto helper 1 waiting (nothing to do) | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.122912; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #209 | libevent_malloc: new ptr-libevent@0x55564daabb08 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #209 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 216 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #216 | **emit ISAKMP Message: | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | ikev2 g^x fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | ikev2 g^x 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | ikev2 g^x 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | ikev2 g^x d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | ikev2 g^x 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | ikev2 g^x a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | ikev2 g^x bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | ikev2 g^x cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | ikev2 g^x 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | ikev2 g^x c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | ikev2 g^x d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | ikev2 g^x 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | ikev2 g^x 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | ikev2 g^x 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | ikev2 g^x 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa 99 44 27 af | IKEv2 nonce f4 5e 19 0d 36 cf b4 55 33 8c 90 2c 9d da a8 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 39 3d 33 bc eb 92 1d f9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d8 | natd_hash: port=500 | natd_hash: hash= 43 ce 31 14 58 d9 4f 27 60 ea 38 80 7c c6 dd 24 | natd_hash: hash= 4a fb 3b 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 ce 31 14 58 d9 4f 27 60 ea 38 80 7c c6 dd 24 | Notify data 4a fb 3b 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 39 3d 33 bc eb 92 1d f9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | natd_hash: hash= b7 72 0f 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | Notify data b7 72 0f 22 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #216 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #216: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #216 to 4294967295 after switching state | Message ID: IKE #216 skipping update_recv as MD is fake | Message ID: sent #216 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.216:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | state #216 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a402db48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da56228 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #216 | libevent_malloc: new ptr-libevent@0x55564dabd188 size 128 | #216 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.123558 | resume sending helper answer for #216 suppresed complete_v2_state_transition() and stole MD | #216 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c03e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.128844; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #155 | libevent_malloc: new ptr-libevent@0x7f497c03e3d8 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x55564da57968 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #155 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.148171; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #93 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #93 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.16944; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #186 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x7f4978028358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #186 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.174713; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #202 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #202 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.183016; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #210 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x55564dab45d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #210 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-217' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #217 at 0x55564dabc5b8 | State DB: adding IKEv2 state #217 in UNDEFINED | pstats #217 ikev2.ike started | Message ID: init #217: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #217: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #217; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-217" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-217" IKE SA #217 "road-eastnet-nonat-217" "road-eastnet-nonat-217" #217: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-217 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-217": constructed local IKE proposals for road-eastnet-nonat-217 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 217 for state #217 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #217 | libevent_malloc: new ptr-libevent@0x55564dab45d8 size 128 | #217 spent 0.179 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 217 for state #217 | RESET processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-217" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 217 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.265 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 217 time elapsed 0.000988 seconds | (#217) spent 0.987 milliseconds in crypto helper computing work-order 217: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 217 for state #217 to event queue | scheduling resume sending helper answer for #217 | libevent_malloc: new ptr-libevent@0x7f498003e3c8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 217 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #217 | **emit ISAKMP Message: | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | ikev2 g^x 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | ikev2 g^x 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | ikev2 g^x 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | ikev2 g^x f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | ikev2 g^x 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | ikev2 g^x e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ikev2 g^x ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | ikev2 g^x 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | ikev2 g^x 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | ikev2 g^x 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | ikev2 g^x f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | ikev2 g^x f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | ikev2 g^x 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | ikev2 g^x 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | ikev2 g^x 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 10 f1 8d 2d ce 38 86 8f cd e5 3c a5 51 f4 e1 | IKEv2 nonce 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 4e e1 57 05 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= de fe 6f a9 6b 4b 29 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d9 | natd_hash: port=500 | natd_hash: hash= 75 dc c1 3b f9 35 ec d8 74 30 cd a4 44 5d e5 8f | natd_hash: hash= 17 75 e9 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 dc c1 3b f9 35 ec d8 74 30 cd a4 44 5d e5 8f | Notify data 17 75 e9 cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= de fe 6f a9 6b 4b 29 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | natd_hash: hash= 79 df 29 a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | Notify data 79 df 29 a5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #217 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #217: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #217 to 4294967295 after switching state | Message ID: IKE #217 skipping update_recv as MD is fake | Message ID: sent #217 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.217:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | state #217 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dab45d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #217 | libevent_malloc: new ptr-libevent@0x55564dabe898 size 128 | #217 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.185373 | resume sending helper answer for #217 suppresed complete_v2_state_transition() and stole MD | #217 spent 0.543 milliseconds in resume sending helper answer | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498003e3c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.196607; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #156 | libevent_malloc: new ptr-libevent@0x7f498003e3c8 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #156 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.239895; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #94 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #94 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.242256; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #211 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x55564dab5ce8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #211 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-218' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #218 at 0x55564dabdcc8 | State DB: adding IKEv2 state #218 in UNDEFINED | pstats #218 ikev2.ike started | Message ID: init #218: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #218: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #218; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-218" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-218" IKE SA #218 "road-eastnet-nonat-218" "road-eastnet-nonat-218" #218: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-218 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-218": constructed local IKE proposals for road-eastnet-nonat-218 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 218 for state #218 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #218 | libevent_malloc: new ptr-libevent@0x55564dab5ce8 size 128 | #218 spent 0.144 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | crypto helper 17 starting work-order 218 for state #218 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 218 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-218" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 218 time elapsed 0.000944 seconds | (#218) spent 0.939 milliseconds in crypto helper computing work-order 218: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 218 for state #218 to event queue | scheduling resume sending helper answer for #218 | libevent_malloc: new ptr-libevent@0x7f497403e3d8 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 218 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #218 | **emit ISAKMP Message: | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | ikev2 g^x 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | ikev2 g^x 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | ikev2 g^x 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | ikev2 g^x f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | ikev2 g^x 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | ikev2 g^x c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | ikev2 g^x cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ikev2 g^x ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | ikev2 g^x 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | ikev2 g^x bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | ikev2 g^x c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | ikev2 g^x 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | ikev2 g^x a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | ikev2 g^x 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | ikev2 g^x 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 35 ad 86 76 | IKEv2 nonce 2e af aa de 1b a7 48 91 e7 80 8c af c5 0c 53 6c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 fb 9b 3f 78 e1 ba 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 da | natd_hash: port=500 | natd_hash: hash= 59 fe 68 db 34 a3 27 94 fe d7 3f 1b ef 98 48 3f | natd_hash: hash= 17 31 9d bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 fe 68 db 34 a3 27 94 fe d7 3f 1b ef 98 48 3f | Notify data 17 31 9d bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 fb 9b 3f 78 e1 ba 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | natd_hash: hash= 0c ee 3f e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | Notify data 0c ee 3f e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #218 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #218: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #218 to 4294967295 after switching state | Message ID: IKE #218 skipping update_recv as MD is fake | Message ID: sent #218 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.218:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | state #218 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dab5ce8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #218 | libevent_malloc: new ptr-libevent@0x55564dabffa8 size 128 | #218 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.248712 | resume sending helper answer for #218 suppresed complete_v2_state_transition() and stole MD | #218 spent 0.428 milliseconds in resume sending helper answer | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497403e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.256895; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #157 | libevent_malloc: new ptr-libevent@0x7f497403e3d8 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x55564da59088 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #157 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.261245; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999988 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564da59088 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #203 spent 0.0986 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.262535; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #187 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x7f49b803bfe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #187 spent 0.0896 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-219' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #219 at 0x55564dabf3d8 | State DB: adding IKEv2 state #219 in UNDEFINED | pstats #219 ikev2.ike started | Message ID: init #219: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #219: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #219; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-219" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-219" IKE SA #219 "road-eastnet-nonat-219" "road-eastnet-nonat-219" #219: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-219 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-219": constructed local IKE proposals for road-eastnet-nonat-219 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 219 for state #219 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa388 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #219 | libevent_malloc: new ptr-libevent@0x7f49b803bfe8 size 128 | crypto helper 18 resuming | #219 spent 0.174 milliseconds in ikev2_parent_outI1() | crypto helper 18 starting work-order 219 for state #219 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 219 | RESET processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-219" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.264 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 219 time elapsed 0.000835 seconds | (#219) spent 0.833 milliseconds in crypto helper computing work-order 219: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 219 for state #219 to event queue | scheduling resume sending helper answer for #219 | libevent_malloc: new ptr-libevent@0x7f497803e348 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 219 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #219 | **emit ISAKMP Message: | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | ikev2 g^x 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | ikev2 g^x 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ikev2 g^x ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | ikev2 g^x 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | ikev2 g^x 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | ikev2 g^x 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ikev2 g^x ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | ikev2 g^x c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | ikev2 g^x 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | ikev2 g^x 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | ikev2 g^x 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | ikev2 g^x c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | ikev2 g^x 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | ikev2 g^x 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | ikev2 g^x d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 85 53 12 de 0b fd 7f fd c1 4e cf 71 21 30 01 e1 | IKEv2 nonce d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a 14 25 17 a8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 37 91 59 ba e6 e9 fc 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 db | natd_hash: port=500 | natd_hash: hash= e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 8c 75 cf 69 | natd_hash: hash= d1 7f af b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 8c 75 cf 69 | Notify data d1 7f af b0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 37 91 59 ba e6 e9 fc 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | natd_hash: hash= 92 01 4f 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | Notify data 92 01 4f 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #219 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #219: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #219 to 4294967295 after switching state | Message ID: IKE #219 skipping update_recv as MD is fake | Message ID: sent #219 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.219:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | state #219 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b803bfe8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa388 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #219 | libevent_malloc: new ptr-libevent@0x55564dabfec8 size 128 | #219 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.30832 | resume sending helper answer for #219 suppresed complete_v2_state_transition() and stole MD | #219 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497803e348 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.315533; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #158 | libevent_malloc: new ptr-libevent@0x7f497803e348 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #158 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.31789; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #95 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x55564da5d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #95 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.321171; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #188 | libevent_malloc: new ptr-libevent@0x55564da5d668 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #188 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.32342; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #204 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #204 spent 0.0878 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.323529; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #212 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x55564dab7468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #212 spent 0.0669 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-220' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #220 at 0x55564dac0ae8 | State DB: adding IKEv2 state #220 in UNDEFINED | pstats #220 ikev2.ike started | Message ID: init #220: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #220: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #220; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-220" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-220" IKE SA #220 "road-eastnet-nonat-220" "road-eastnet-nonat-220" #220: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-220 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-220": constructed local IKE proposals for road-eastnet-nonat-220 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 220 for state #220 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da2f298 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #220 | libevent_malloc: new ptr-libevent@0x55564dab7468 size 128 | #220 spent 0.179 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 220 for state #220 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 220 | RESET processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-220" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.287 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 220 time elapsed 0.000826 seconds | (#220) spent 0.825 milliseconds in crypto helper computing work-order 220: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 220 for state #220 to event queue | scheduling resume sending helper answer for #220 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 220 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #220 | **emit ISAKMP Message: | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | ikev2 g^x 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | ikev2 g^x 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | ikev2 g^x 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | ikev2 g^x a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | ikev2 g^x b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | ikev2 g^x 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | ikev2 g^x b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | ikev2 g^x d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | ikev2 g^x 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | ikev2 g^x 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | ikev2 g^x dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | ikev2 g^x 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | ikev2 g^x a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | ikev2 g^x 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | ikev2 g^x af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 27 49 04 ee | IKEv2 nonce d1 17 68 2f a9 ba 01 11 1a 29 23 20 2c 8f 7a 0c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 0b 6b 98 b4 09 34 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dc | natd_hash: port=500 | natd_hash: hash= ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 ad 1f f2 db | natd_hash: hash= a6 38 fb e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 ad 1f f2 db | Notify data a6 38 fb e9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 0b 6b 98 b4 09 34 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | natd_hash: hash= 68 fd 3f 0d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | Notify data 68 fd 3f 0d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #220 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #220: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #220 to 4294967295 after switching state | Message ID: IKE #220 skipping update_recv as MD is fake | Message ID: sent #220 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.220:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | state #220 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dab7468 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da2f298 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #220 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 | #220 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.367337 | resume sending helper answer for #220 suppresed complete_v2_state_transition() and stole MD | #220 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c03e538 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.374602; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #159 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #159 spent 0.0935 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.378829; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #96 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x55564da5ed78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #96 spent 0.0985 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.381091; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #189 | libevent_malloc: new ptr-libevent@0x55564da5ed78 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #189 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0497 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.382375; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #205 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #205 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.417626; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #213 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x55564dab8be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #213 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-221' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #221 at 0x55564dac22f8 | State DB: adding IKEv2 state #221 in UNDEFINED | pstats #221 ikev2.ike started | Message ID: init #221: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #221: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #221; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-221" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-221" IKE SA #221 "road-eastnet-nonat-221" "road-eastnet-nonat-221" #221: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-221 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-221": constructed local IKE proposals for road-eastnet-nonat-221 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 221 for state #221 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #221 | libevent_malloc: new ptr-libevent@0x55564dab8be8 size 128 | #221 spent 0.184 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 221 for state #221 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 221 | RESET processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-221" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.342 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 221 time elapsed 0.000911 seconds | (#221) spent 0.919 milliseconds in crypto helper computing work-order 221: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 221 for state #221 to event queue | scheduling resume sending helper answer for #221 | libevent_malloc: new ptr-libevent@0x7f49bc040dd8 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 221 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #221 | **emit ISAKMP Message: | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ikev2 g^x ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | ikev2 g^x cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | ikev2 g^x 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | ikev2 g^x 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | ikev2 g^x eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | ikev2 g^x 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | ikev2 g^x b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | ikev2 g^x 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | ikev2 g^x 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | ikev2 g^x cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | ikev2 g^x b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | ikev2 g^x 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ikev2 g^x ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | ikev2 g^x bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | ikev2 g^x 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 12 dd 33 b6 44 1a a0 66 2f e2 17 69 8d 6e 54 23 | IKEv2 nonce ab a3 53 99 e0 d0 bf 28 00 0c b0 86 96 6d 31 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 79 5c 52 89 5c 0d af bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dd | natd_hash: port=500 | natd_hash: hash= d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 36 0c 13 1b | natd_hash: hash= 3f a4 3e 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 36 0c 13 1b | Notify data 3f a4 3e 71 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 79 5c 52 89 5c 0d af bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | natd_hash: hash= a6 e3 14 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | Notify data a6 e3 14 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #221 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #221: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #221 to 4294967295 after switching state | Message ID: IKE #221 skipping update_recv as MD is fake | Message ID: sent #221 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.221:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | state #221 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dab8be8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49980058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #221 | libevent_malloc: new ptr-libevent@0x55564dac4528 size 128 | #221 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.429546 | resume sending helper answer for #221 suppresed complete_v2_state_transition() and stole MD | #221 spent 0.718 milliseconds in resume sending helper answer | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc040dd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.438813; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #160 | libevent_malloc: new ptr-libevent@0x7f49bc040dd8 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x7f4974022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #160 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.078 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.440268; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f4974022bd8 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x55564daa2ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #190 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.44045; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #97 | libevent_malloc: new ptr-libevent@0x55564daa2ee8 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #97 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.075 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.444829; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #206 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #206 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.075 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.500282; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #191 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #191 spent 0.401 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.502165; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #214 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x55564daba2f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #214 spent 0.558 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.502863; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #98 | libevent_malloc: new ptr-libevent@0x55564daba2f8 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #98 spent 0.472 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.503414; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002773 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #207 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x7f498403e1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #207 spent 0.5 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.284 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.253 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.263 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.516101; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f498403e1a8 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #161 spent 0.394 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.185 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-222' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #222 at 0x55564dac3958 | State DB: adding IKEv2 state #222 in UNDEFINED | pstats #222 ikev2.ike started | Message ID: init #222: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #222: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #222; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-222" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-222" IKE SA #222 "road-eastnet-nonat-222" "road-eastnet-nonat-222" #222: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-222 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-222": constructed local IKE proposals for road-eastnet-nonat-222 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 222 for state #222 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da603a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #222 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 | #222 spent 0.414 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-222" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 2 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 2 starting work-order 222 for state #222 | spent 0.637 milliseconds in whack | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 222 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 222 time elapsed 0.002365 seconds | (#222) spent 2.34 milliseconds in crypto helper computing work-order 222: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 222 for state #222 to event queue | scheduling resume sending helper answer for #222 | libevent_malloc: new ptr-libevent@0x7f49b4040d98 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 222 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #222 | **emit ISAKMP Message: | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ikev2 g^x ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ikev2 g^x ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | ikev2 g^x 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | ikev2 g^x 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | ikev2 g^x 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | ikev2 g^x 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | ikev2 g^x 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | ikev2 g^x 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | ikev2 g^x 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | ikev2 g^x de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | ikev2 g^x 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | ikev2 g^x 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | ikev2 g^x d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | ikev2 g^x b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | ikev2 g^x 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f 8a ef 4a 00 | IKEv2 nonce 82 6c b0 41 38 f9 bb a0 24 be 3a 22 65 e6 f3 69 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e8 f4 ea a9 b2 2c ae da | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 de | natd_hash: port=500 | natd_hash: hash= db 87 40 f0 ab 92 94 39 81 a5 fe 60 f1 b5 74 ac | natd_hash: hash= 6b 3f 71 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 87 40 f0 ab 92 94 39 81 a5 fe 60 f1 b5 74 ac | Notify data 6b 3f 71 2a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e8 f4 ea a9 b2 2c ae da | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | natd_hash: hash= 54 38 dc d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | Notify data 54 38 dc d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #222 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #222: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #222 to 4294967295 after switching state | Message ID: IKE #222 skipping update_recv as MD is fake | Message ID: sent #222 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.222:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | state #222 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da603a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #222 | libevent_malloc: new ptr-libevent@0x55564dac4448 size 128 | #222 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.522454 | resume sending helper answer for #222 suppresed complete_v2_state_transition() and stole MD | #222 spent 1.38 milliseconds in resume sending helper answer | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4040d98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.176 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.561023; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #215 | libevent_malloc: new ptr-libevent@0x7f49b4040d98 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x55564dabba78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #215 spent 0.386 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.56148; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #99 | libevent_malloc: new ptr-libevent@0x55564dabba78 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #99 spent 0.285 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.187 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.155 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.563393; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #208 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #208 spent 0.365 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.57327; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #192 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #192 spent 0.664 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.261 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.578474; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #162 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x7f4988022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #162 spent 0.558 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.25 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-223' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #223 at 0x55564dac5068 | State DB: adding IKEv2 state #223 in UNDEFINED | pstats #223 ikev2.ike started | Message ID: init #223: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #223: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #223; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-223" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-223" IKE SA #223 "road-eastnet-nonat-223" "road-eastnet-nonat-223" #223: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-223 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-223": constructed local IKE proposals for road-eastnet-nonat-223 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 223 for state #223 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da1dae8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #223 | libevent_malloc: new ptr-libevent@0x7f4988022a68 size 128 | #223 spent 0.473 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 223 for state #223 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 223 | RESET processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-223" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.809 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 223 time elapsed 0.003575 seconds | (#223) spent 3.55 milliseconds in crypto helper computing work-order 223: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 223 for state #223 to event queue | scheduling resume sending helper answer for #223 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 223 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #223 | **emit ISAKMP Message: | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | ikev2 g^x e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | ikev2 g^x 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | ikev2 g^x 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | ikev2 g^x 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | ikev2 g^x 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | ikev2 g^x 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | ikev2 g^x 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | ikev2 g^x 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | ikev2 g^x e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | ikev2 g^x 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | ikev2 g^x 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | ikev2 g^x 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | ikev2 g^x 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | ikev2 g^x 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | ikev2 g^x dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 be f6 7e bc b3 bd e2 72 69 65 46 8d 1d c8 3a | IKEv2 nonce 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 a5 0e 45 0c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a4 36 3f 22 d1 66 63 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 df | natd_hash: port=500 | natd_hash: hash= 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b 69 d8 df 15 | natd_hash: hash= 25 52 30 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b 69 d8 df 15 | Notify data 25 52 30 7b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a4 36 3f 22 d1 66 63 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | natd_hash: hash= 99 e5 2d 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | Notify data 99 e5 2d 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #223 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #223: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #223 to 4294967295 after switching state | Message ID: IKE #223 skipping update_recv as MD is fake | Message ID: sent #223 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.223:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | state #223 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988022a68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da1dae8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564dac5c48 size 128 | #223 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.617323 | resume sending helper answer for #223 suppresed complete_v2_state_transition() and stole MD | #223 spent 2.09 milliseconds in resume sending helper answer | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8041748 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.284 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.619945; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #100 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #100 spent 0.359 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.186 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.624737; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501179 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #216 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x55564dabd188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #216 spent 0.385 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.62521; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002734 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #209 | libevent_malloc: new ptr-libevent@0x55564dabd188 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x55564daabb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #209 spent 0.415 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.317 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.289 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.633574; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #193 | libevent_malloc: new ptr-libevent@0x55564daabb08 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x7f4974033468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #193 spent 0.382 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.187 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.641418; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #163 | libevent_malloc: new ptr-libevent@0x7f4974033468 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #163 spent 0.353 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.680231; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #101 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #101 spent 0.496 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.258 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.685313; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #210 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #210 spent 0.566 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.263 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.686315; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #217 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x55564dabe898 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #217 spent 0.446 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.253 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.692292; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #194 | libevent_malloc: new ptr-libevent@0x55564dabe898 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x7f499403e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #194 spent 0.371 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.19 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.701089; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #164 | libevent_malloc: new ptr-libevent@0x7f499403e548 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x7f4980022a58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #164 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.175 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-224' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #224 at 0x55564dac6878 | State DB: adding IKEv2 state #224 in UNDEFINED | pstats #224 ikev2.ike started | Message ID: init #224: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #224: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #224; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-224" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-224" IKE SA #224 "road-eastnet-nonat-224" "road-eastnet-nonat-224" #224: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-224 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-224": constructed local IKE proposals for road-eastnet-nonat-224 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 224 for state #224 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #224 | libevent_malloc: new ptr-libevent@0x7f4980022a58 size 128 | #224 spent 0.436 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 starting work-order 224 for state #224 | RESET processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 224 | RESET processing: connection "road-eastnet-nonat-224" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.702 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 224 time elapsed 0.002712 seconds | (#224) spent 2.71 milliseconds in crypto helper computing work-order 224: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 224 for state #224 to event queue | scheduling resume sending helper answer for #224 | libevent_malloc: new ptr-libevent@0x7f49ac043b98 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 224 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #224 | **emit ISAKMP Message: | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | ikev2 g^x cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | ikev2 g^x 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | ikev2 g^x 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | ikev2 g^x 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | ikev2 g^x 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | ikev2 g^x db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | ikev2 g^x 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | ikev2 g^x 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | ikev2 g^x 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | ikev2 g^x 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | ikev2 g^x 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | ikev2 g^x d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | ikev2 g^x 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | ikev2 g^x 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | ikev2 g^x b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 b2 f7 fa 83 | IKEv2 nonce fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 3e ba c0 36 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 21 b3 85 05 64 cd 24 06 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e0 | natd_hash: port=500 | natd_hash: hash= f0 38 1e 4a 4c a3 55 9a 24 75 99 19 75 f9 63 05 | natd_hash: hash= 7b 46 72 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 38 1e 4a 4c a3 55 9a 24 75 99 19 75 f9 63 05 | Notify data 7b 46 72 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 21 b3 85 05 64 cd 24 06 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | natd_hash: hash= ba c4 2a ce | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | Notify data ba c4 2a ce | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #224 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #224: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #224 to 4294967295 after switching state | Message ID: IKE #224 skipping update_recv as MD is fake | Message ID: sent #224 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.224:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | state #224 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980022a58 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #224 | libevent_malloc: new ptr-libevent@0x55564dac8b18 size 128 | #224 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.715651 | resume sending helper answer for #224 suppresed complete_v2_state_transition() and stole MD | #224 spent 1.68 milliseconds in resume sending helper answer | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac043b98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.297 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.739322; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #102 | libevent_malloc: new ptr-libevent@0x7f49ac043b98 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #102 spent 0.374 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.744109; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #211 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #211 spent 0.365 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.749972; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #218 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x55564dabffa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #218 spent 0.354 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.183 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.752751; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004325 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #195 | libevent_malloc: new ptr-libevent@0x55564dabffa8 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x7f499803e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #195 spent 0.378 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.183 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.762573; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #165 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x55564da91708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #165 spent 0.373 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.188 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.801392; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #103 | libevent_malloc: new ptr-libevent@0x55564da91708 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x7f49a002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #103 spent 0.397 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.192 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-225' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #225 at 0x55564dac7ed8 | State DB: adding IKEv2 state #225 in UNDEFINED | pstats #225 ikev2.ike started | Message ID: init #225: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #225: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #225; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-225" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-225" IKE SA #225 "road-eastnet-nonat-225" "road-eastnet-nonat-225" #225: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-225 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-225": constructed local IKE proposals for road-eastnet-nonat-225 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 225 for state #225 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da5bee8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #225 | libevent_malloc: new ptr-libevent@0x7f49a002da88 size 128 | #225 spent 0.452 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | RESET processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-225" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 225 for state #225 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 225 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.709 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 225 time elapsed 0.003834 seconds | (#225) spent 3.79 milliseconds in crypto helper computing work-order 225: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 225 for state #225 to event queue | scheduling resume sending helper answer for #225 | libevent_malloc: new ptr-libevent@0x7f49b0043ac8 size 128 | crypto helper 6 waiting (nothing to do) | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.809687; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #219 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x55564dabfec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #219 spent 0.377 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 225 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #225 | **emit ISAKMP Message: | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | ikev2 g^x 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | ikev2 g^x a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | ikev2 g^x c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | ikev2 g^x 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | ikev2 g^x 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | ikev2 g^x 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | ikev2 g^x 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | ikev2 g^x 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | ikev2 g^x cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | ikev2 g^x a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | ikev2 g^x 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | ikev2 g^x 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | ikev2 g^x 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | ikev2 g^x f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | ikev2 g^x 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 18 89 45 9a | IKEv2 nonce 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f 46 e3 e6 58 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c1 ce 6e c3 a2 bf 2b e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e1 | natd_hash: port=500 | natd_hash: hash= ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 11 1c 67 9f | natd_hash: hash= 5f a1 7a b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 11 1c 67 9f | Notify data 5f a1 7a b7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c1 ce 6e c3 a2 bf 2b e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | natd_hash: hash= 02 aa cb 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | Notify data 02 aa cb 1e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #225 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #225: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #225 to 4294967295 after switching state | Message ID: IKE #225 skipping update_recv as MD is fake | Message ID: sent #225 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.225:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | state #225 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a002da88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da5bee8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #225 | libevent_malloc: new ptr-libevent@0x55564daca298 size 128 | #225 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.811508 | resume sending helper answer for #225 suppresed complete_v2_state_transition() and stole MD | #225 spent 1.33 milliseconds in resume sending helper answer | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0043ac8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.156 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.814196; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f49b0043ac8 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #196 spent 0.367 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.175 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.824969; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #212 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #212 spent 0.365 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.831735; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #166 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x7f49a8028468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #166 spent 0.381 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.175 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.867559; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #104 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #104 spent 0.29 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.126 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.868059; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #220 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #220 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.875559; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #197 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x7f49a40333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #197 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0981 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-226' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #226 at 0x55564dac9658 | State DB: adding IKEv2 state #226 in UNDEFINED | pstats #226 ikev2.ike started | Message ID: init #226: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #226: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #226; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-226" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-226" IKE SA #226 "road-eastnet-nonat-226" "road-eastnet-nonat-226" #226: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-226 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-226": constructed local IKE proposals for road-eastnet-nonat-226 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 226 for state #226 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da67858 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #226 | libevent_malloc: new ptr-libevent@0x7f49a40333b8 size 128 | #226 spent 0.297 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | crypto helper 7 starting work-order 226 for state #226 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 226 | RESET processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-226" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.466 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 226 time elapsed 0.001224 seconds | (#226) spent 1.22 milliseconds in crypto helper computing work-order 226: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 226 for state #226 to event queue | scheduling resume sending helper answer for #226 | libevent_malloc: new ptr-libevent@0x7f49a4043ad8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 226 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #226 | **emit ISAKMP Message: | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | ikev2 g^x 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | ikev2 g^x 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | ikev2 g^x 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | ikev2 g^x 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | ikev2 g^x 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | ikev2 g^x 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | ikev2 g^x 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | ikev2 g^x 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | ikev2 g^x 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | ikev2 g^x e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | ikev2 g^x 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | ikev2 g^x 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | ikev2 g^x 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | ikev2 g^x d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ikev2 g^x ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 bc b2 2c 3b | IKEv2 nonce 4b 77 27 d4 38 68 eb 58 de 39 2d ce 01 2b 30 7f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d7 b1 04 a6 0a 5e 58 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e2 | natd_hash: port=500 | natd_hash: hash= ad 5a 41 6b 38 04 58 8f bc 27 e2 45 9e d4 06 1d | natd_hash: hash= 34 41 83 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ad 5a 41 6b 38 04 58 8f bc 27 e2 45 9e d4 06 1d | Notify data 34 41 83 10 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d7 b1 04 a6 0a 5e 58 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | natd_hash: hash= d5 0a 17 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | Notify data d5 0a 17 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #226 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #226: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #226 to 4294967295 after switching state | Message ID: IKE #226 skipping update_recv as MD is fake | Message ID: sent #226 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.226:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | state #226 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40333b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da67858 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #226 | libevent_malloc: new ptr-libevent@0x55564dacba18 size 128 | #226 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.884709 | resume sending helper answer for #226 suppresed complete_v2_state_transition() and stole MD | #226 spent 0.747 milliseconds in resume sending helper answer | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4043ad8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0826 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.888971; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003342 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #167 | libevent_malloc: new ptr-libevent@0x7f49a4043ad8 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #167 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0923 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10590.918384; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #213 spent 0.254 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.131 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.927973; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #105 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #105 spent 0.274 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10590.929525; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #221 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x55564dac4528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #221 spent 0.245 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.12 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.93507; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #198 | libevent_malloc: new ptr-libevent@0x55564dac4528 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #198 spent 0.269 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10590.949633; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #168 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x55564da97558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #168 spent 0.267 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.11 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-227' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #227 at 0x55564dacadd8 | State DB: adding IKEv2 state #227 in UNDEFINED | pstats #227 ikev2.ike started | Message ID: init #227: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #227: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #227; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-227" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-227" IKE SA #227 "road-eastnet-nonat-227" "road-eastnet-nonat-227" #227: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-227 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-227": constructed local IKE proposals for road-eastnet-nonat-227 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 227 for state #227 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da5d588 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #227 | libevent_malloc: new ptr-libevent@0x55564da97558 size 128 | #227 spent 0.295 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 227 for state #227 | RESET processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 227 | RESET processing: connection "road-eastnet-nonat-227" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.459 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 227 time elapsed 0.001448 seconds | (#227) spent 1.45 milliseconds in crypto helper computing work-order 227: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 227 for state #227 to event queue | scheduling resume sending helper answer for #227 | libevent_malloc: new ptr-libevent@0x7f49a8043d28 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 227 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #227 | **emit ISAKMP Message: | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | ikev2 g^x 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | ikev2 g^x 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | ikev2 g^x b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | ikev2 g^x 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | ikev2 g^x 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | ikev2 g^x 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | ikev2 g^x 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | ikev2 g^x 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | ikev2 g^x 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | ikev2 g^x 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | ikev2 g^x c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | ikev2 g^x dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | ikev2 g^x fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | ikev2 g^x 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | ikev2 g^x 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea e3 b4 08 ea | IKEv2 nonce 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 0a ae e2 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 9b 6c 0e d0 29 0e b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e3 | natd_hash: port=500 | natd_hash: hash= f6 41 3c d4 1e bb 22 0c b9 18 35 3e 6e 6b c4 94 | natd_hash: hash= d5 2e 60 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 41 3c d4 1e bb 22 0c b9 18 35 3e 6e 6b c4 94 | Notify data d5 2e 60 a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 9b 6c 0e d0 29 0e b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | natd_hash: hash= ba 35 94 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | Notify data ba 35 94 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #227 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #227: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #227 to 4294967295 after switching state | Message ID: IKE #227 skipping update_recv as MD is fake | Message ID: sent #227 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.227:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | state #227 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da97558 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da5d588 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #227 | libevent_malloc: new ptr-libevent@0x55564dacd198 size 128 | #227 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10590.95821 | resume sending helper answer for #227 suppresed complete_v2_state_transition() and stole MD | #227 spent 0.929 milliseconds in resume sending helper answer | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8043d28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.117 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10590.986541; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #106 | libevent_malloc: new ptr-libevent@0x7f49a8043d28 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #106 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10590.99804; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00365 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #199 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #199 spent 0.192 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.087 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.00562; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #214 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #214 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0784 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-228' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #228 at 0x55564dacc558 | State DB: adding IKEv2 state #228 in UNDEFINED | pstats #228 ikev2.ike started | Message ID: init #228: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #228: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #228; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-228" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-228" IKE SA #228 "road-eastnet-nonat-228" "road-eastnet-nonat-228" #228: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-228 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-228": constructed local IKE proposals for road-eastnet-nonat-228 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 228 for state #228 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #228 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 | crypto helper 9 resuming | crypto helper 9 starting work-order 228 for state #228 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 228 | #228 spent 0.174 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-228" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.271 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 228 time elapsed 0.000688 seconds | (#228) spent 0.695 milliseconds in crypto helper computing work-order 228: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 228 for state #228 to event queue | scheduling resume sending helper answer for #228 | libevent_malloc: new ptr-libevent@0x7f499c043ca8 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 228 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #228 | **emit ISAKMP Message: | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | ikev2 g^x 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | ikev2 g^x 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | ikev2 g^x 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | ikev2 g^x 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | ikev2 g^x 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | ikev2 g^x 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | ikev2 g^x 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | ikev2 g^x 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | ikev2 g^x a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | ikev2 g^x c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | ikev2 g^x 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | ikev2 g^x 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | ikev2 g^x 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | ikev2 g^x 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | ikev2 g^x df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 7c 51 f9 50 | IKEv2 nonce b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb 5b 5d 65 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d4 fa 7c 28 a5 4e e6 f3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e4 | natd_hash: port=500 | natd_hash: hash= b0 2b 10 6b bb 30 31 48 36 47 a7 34 6f ea 2c dc | natd_hash: hash= af ea 15 b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 2b 10 6b bb 30 31 48 36 47 a7 34 6f ea 2c dc | Notify data af ea 15 b3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d4 fa 7c 28 a5 4e e6 f3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | natd_hash: hash= 50 43 03 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | Notify data 50 43 03 d5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #228 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #228: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #228 to 4294967295 after switching state | Message ID: IKE #228 skipping update_recv as MD is fake | Message ID: sent #228 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.228:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | state #228 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #228 | libevent_malloc: new ptr-libevent@0x55564dace8a8 size 128 | #228 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.022297 | resume sending helper answer for #228 suppresed complete_v2_state_transition() and stole MD | #228 spent 0.489 milliseconds in resume sending helper answer | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c043ca8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.02242; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #222 | libevent_malloc: new ptr-libevent@0x7f499c043ca8 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x55564dac4448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #222 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.027712; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564dac4448 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x55564da98cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #169 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0766 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.046127; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #107 | libevent_malloc: new ptr-libevent@0x55564da98cd8 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x7f49a00332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #107 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.056467; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002852 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #200 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #200 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.062811; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #215 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x7f49b4040d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #215 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-229' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #229 at 0x55564dacdcd8 | State DB: adding IKEv2 state #229 in UNDEFINED | pstats #229 ikev2.ike started | Message ID: init #229: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #229: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #229; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-229" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-229" IKE SA #229 "road-eastnet-nonat-229" "road-eastnet-nonat-229" #229: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-229 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-229": constructed local IKE proposals for road-eastnet-nonat-229 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 229 for state #229 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac2e58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #229 | libevent_malloc: new ptr-libevent@0x7f49b4040d98 size 128 | #229 spent 0.203 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 229 for state #229 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 229 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-229" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.31 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 229 time elapsed 0.000858 seconds | (#229) spent 0.865 milliseconds in crypto helper computing work-order 229: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 229 for state #229 to event queue | scheduling resume sending helper answer for #229 | libevent_malloc: new ptr-libevent@0x7f49a0043be8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 229 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #229 | **emit ISAKMP Message: | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | ikev2 g^x 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | ikev2 g^x 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | ikev2 g^x 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | ikev2 g^x a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | ikev2 g^x 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ikev2 g^x ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | ikev2 g^x 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | ikev2 g^x 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | ikev2 g^x 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | ikev2 g^x 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | ikev2 g^x 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | ikev2 g^x 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | ikev2 g^x 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | ikev2 g^x 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | ikev2 g^x f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 cd 1b 25 e0 | IKEv2 nonce 1e d5 43 64 70 87 d2 78 db cb e5 de 5f 2e e7 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7a ca 64 ce 32 ae f7 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e5 | natd_hash: port=500 | natd_hash: hash= a1 1d e4 80 a9 54 83 05 8c 3b 57 47 a2 0d 8c d1 | natd_hash: hash= bc fa 3a 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 1d e4 80 a9 54 83 05 8c 3b 57 47 a2 0d 8c d1 | Notify data bc fa 3a 68 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7a ca 64 ce 32 ae f7 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | natd_hash: hash= 25 42 4c 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | Notify data 25 42 4c 3f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #229 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #229: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #229 to 4294967295 after switching state | Message ID: IKE #229 skipping update_recv as MD is fake | Message ID: sent #229 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.229:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | state #229 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4040d98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac2e58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #229 | libevent_malloc: new ptr-libevent@0x55564dacffb8 size 128 | #229 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.085385 | resume sending helper answer for #229 suppresed complete_v2_state_transition() and stole MD | #229 spent 0.362 milliseconds in resume sending helper answer | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0043be8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.103594; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #170 | libevent_malloc: new ptr-libevent@0x7f49a0043be8 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #170 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.105924; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #108 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x7f49940334c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #108 spent 0.0919 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.115182; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #201 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #201 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.116623; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.4993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564dac5c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #223 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.124948; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #216 | libevent_malloc: new ptr-libevent@0x55564dac5c48 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #216 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-230' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #230 at 0x55564dacf3e8 | State DB: adding IKEv2 state #230 in UNDEFINED | pstats #230 ikev2.ike started | Message ID: init #230: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #230: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #230; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-230" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-230" IKE SA #230 "road-eastnet-nonat-230" "road-eastnet-nonat-230" #230: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-230 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-230": constructed local IKE proposals for road-eastnet-nonat-230 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 230 for state #230 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564d9c9b88 size 128 | crypto helper 11 resuming | crypto helper 11 starting work-order 230 for state #230 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 230 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 230 time elapsed 0.000983 seconds | (#230) spent 0.993 milliseconds in crypto helper computing work-order 230: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 230 for state #230 to event queue | scheduling resume sending helper answer for #230 | libevent_malloc: new ptr-libevent@0x7f4994043db8 size 128 | crypto helper 11 waiting (nothing to do) | #230 spent 0.179 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-230" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.269 milliseconds in whack | processing resume sending helper answer for #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 230 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #230 | **emit ISAKMP Message: | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | ikev2 g^x 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | ikev2 g^x 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | ikev2 g^x 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | ikev2 g^x da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | ikev2 g^x aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | ikev2 g^x 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | ikev2 g^x f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | ikev2 g^x 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | ikev2 g^x f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | ikev2 g^x 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | ikev2 g^x 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | ikev2 g^x c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | ikev2 g^x 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | ikev2 g^x 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | ikev2 g^x 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 d5 e9 fd b7 | IKEv2 nonce 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c d3 76 19 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 2d c2 6b cc ad 2a 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e6 | natd_hash: port=500 | natd_hash: hash= 97 b7 50 55 24 55 81 83 c4 20 e0 d2 76 a0 92 28 | natd_hash: hash= e9 c5 8d 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 b7 50 55 24 55 81 83 c4 20 e0 d2 76 a0 92 28 | Notify data e9 c5 8d 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 2d c2 6b cc ad 2a 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | natd_hash: hash= 12 03 a6 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | Notify data 12 03 a6 d9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #230 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #230: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #230 to 4294967295 after switching state | Message ID: IKE #230 skipping update_recv as MD is fake | Message ID: sent #230 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.230:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | state #230 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564d9c9b88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564dad1738 size 128 | #230 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.150425 | resume sending helper answer for #230 suppresed complete_v2_state_transition() and stole MD | #230 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994043db8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.166088; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #109 | libevent_malloc: new ptr-libevent@0x7f4994043db8 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x7f499c01d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #109 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.171444; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #171 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #171 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.17573; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #202 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x7f4978028358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #202 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.187091; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #217 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #217 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.215445; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499794 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #224 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x55564dac8b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #224 spent 0.539 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-231' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #231 at 0x55564dad0af8 | State DB: adding IKEv2 state #231 in UNDEFINED | pstats #231 ikev2.ike started | Message ID: init #231: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #231: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #231; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-231" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-231" IKE SA #231 "road-eastnet-nonat-231" "road-eastnet-nonat-231" #231: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-231 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-231": constructed local IKE proposals for road-eastnet-nonat-231 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 231 for state #231 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #231 | libevent_malloc: new ptr-libevent@0x55564dac8b18 size 128 | crypto helper 12 resuming | crypto helper 12 starting work-order 231 for state #231 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 231 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 231 time elapsed 0.000941 seconds | (#231) spent 0.95 milliseconds in crypto helper computing work-order 231: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 231 for state #231 to event queue | scheduling resume sending helper answer for #231 | libevent_malloc: new ptr-libevent@0x7f4998043b28 size 128 | crypto helper 12 waiting (nothing to do) | #231 spent 0.184 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-231" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.628 milliseconds in whack | processing resume sending helper answer for #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 231 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #231 | **emit ISAKMP Message: | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | ikev2 g^x 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | ikev2 g^x dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | ikev2 g^x 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | ikev2 g^x 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | ikev2 g^x be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | ikev2 g^x 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | ikev2 g^x 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | ikev2 g^x 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | ikev2 g^x 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | ikev2 g^x f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | ikev2 g^x f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | ikev2 g^x bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | ikev2 g^x 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | ikev2 g^x d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | ikev2 g^x 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce a2 8c fa 6b 46 32 6a dd 09 2b 18 2e f6 a6 a4 | IKEv2 nonce d6 1c 46 22 70 6e 69 62 31 03 57 d4 88 33 38 13 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 05 47 c1 c6 8f 70 66 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e7 | natd_hash: port=500 | natd_hash: hash= e9 7b 88 35 3d de f8 5a f8 5b 31 52 ea 3d 84 96 | natd_hash: hash= d0 be eb fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 7b 88 35 3d de f8 5a f8 5b 31 52 ea 3d 84 96 | Notify data d0 be eb fc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 05 47 c1 c6 8f 70 66 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | natd_hash: hash= cf 22 c3 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | Notify data cf 22 c3 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #231 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #231: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #231 to 4294967295 after switching state | Message ID: IKE #231 skipping update_recv as MD is fake | Message ID: sent #231 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.231:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | state #231 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dac8b18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #231 | libevent_malloc: new ptr-libevent@0x55564dad2e48 size 128 | #231 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.22286 | resume sending helper answer for #231 suppresed complete_v2_state_transition() and stole MD | #231 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998043b28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.233787; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #172 | libevent_malloc: new ptr-libevent@0x7f4998043b28 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x55564da9d1c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #172 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.240159; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #110 | libevent_malloc: new ptr-libevent@0x55564da9d1c8 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #110 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.251506; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002794 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #218 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #218 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.262885; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x55564da59088 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #203 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-232' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #232 at 0x55564dad2278 | State DB: adding IKEv2 state #232 in UNDEFINED | pstats #232 ikev2.ike started | Message ID: init #232: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #232: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #232; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-232" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-232" IKE SA #232 "road-eastnet-nonat-232" "road-eastnet-nonat-232" #232: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-232 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-232": constructed local IKE proposals for road-eastnet-nonat-232 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 232 for state #232 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #232 | libevent_malloc: new ptr-libevent@0x55564da59088 size 128 | #232 spent 0.184 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 232 for state #232 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 232 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 232 time elapsed 0.000942 seconds | (#232) spent 0.938 milliseconds in crypto helper computing work-order 232: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 232 for state #232 to event queue | scheduling resume sending helper answer for #232 | libevent_malloc: new ptr-libevent@0x7f498c043b98 size 128 | crypto helper 13 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-232" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | processing resume sending helper answer for #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 232 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #232 | **emit ISAKMP Message: | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | ikev2 g^x dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | ikev2 g^x 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | ikev2 g^x af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | ikev2 g^x 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | ikev2 g^x 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | ikev2 g^x c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | ikev2 g^x 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | ikev2 g^x d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | ikev2 g^x aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | ikev2 g^x 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | ikev2 g^x 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | ikev2 g^x 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | ikev2 g^x 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | ikev2 g^x d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | ikev2 g^x c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 61 24 fa 08 | IKEv2 nonce 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 49 27 cd 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 79 f5 e8 96 e6 c5 00 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e8 | natd_hash: port=500 | natd_hash: hash= 58 27 61 dc ee b4 cf 3a 81 97 a8 12 8c d8 e4 bb | natd_hash: hash= 22 c3 90 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 27 61 dc ee b4 cf 3a 81 97 a8 12 8c d8 e4 bb | Notify data 22 c3 90 56 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 79 f5 e8 96 e6 c5 00 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | natd_hash: hash= 8a de 5f 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | Notify data 8a de 5f 8f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #232 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #232: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #232 to 4294967295 after switching state | Message ID: IKE #232 skipping update_recv as MD is fake | Message ID: sent #232 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.232:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | state #232 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da59088 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #232 | libevent_malloc: new ptr-libevent@0x55564dad4558 size 128 | #232 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.288359 | resume sending helper answer for #232 suppresed complete_v2_state_transition() and stole MD | #232 spent 0.512 milliseconds in resume sending helper answer | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c043b98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.293575; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #173 | libevent_malloc: new ptr-libevent@0x7f498c043b98 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x7f4988038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #173 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.310949; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #219 | libevent_malloc: new ptr-libevent@0x7f4988038b68 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | #219 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.311108; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.4996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #225 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x55564daca298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #225 spent 0.0739 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.316388; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #111 | libevent_malloc: new ptr-libevent@0x55564daca298 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #111 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.324784; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #204 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #204 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-233' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #233 at 0x55564dad3988 | State DB: adding IKEv2 state #233 in UNDEFINED | pstats #233 ikev2.ike started | Message ID: init #233: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #233: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #233; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-233" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-233" IKE SA #233 "road-eastnet-nonat-233" "road-eastnet-nonat-233" #233: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-233 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-233": constructed local IKE proposals for road-eastnet-nonat-233 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 233 for state #233 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa2a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #233 | libevent_malloc: new ptr-libevent@0x7f496c012338 size 128 | #233 spent 0.189 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 233 for state #233 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 233 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 233 time elapsed 0.000886 seconds | (#233) spent 0.871 milliseconds in crypto helper computing work-order 233: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 233 for state #233 to event queue | scheduling resume sending helper answer for #233 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 | crypto helper 14 waiting (nothing to do) | RESET processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-233" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.303 milliseconds in whack | processing resume sending helper answer for #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 233 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #233 | **emit ISAKMP Message: | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | ikev2 g^x f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | ikev2 g^x 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | ikev2 g^x 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | ikev2 g^x c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | ikev2 g^x a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | ikev2 g^x 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | ikev2 g^x 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | ikev2 g^x 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | ikev2 g^x 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | ikev2 g^x 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | ikev2 g^x 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | ikev2 g^x 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | ikev2 g^x 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | ikev2 g^x 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | ikev2 g^x d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 99 b8 cb 27 13 b9 44 e6 64 0a f8 be 74 25 e2 7a | IKEv2 nonce e0 63 46 03 5c e4 f7 fb 91 b3 75 6a 97 1d 36 57 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 33 a2 b2 7b 70 7c cd 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e9 | natd_hash: port=500 | natd_hash: hash= 68 6a c5 13 51 69 ac 98 aa 0a d4 29 b3 d1 a6 6f | natd_hash: hash= 74 d9 45 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 6a c5 13 51 69 ac 98 aa 0a d4 29 b3 d1 a6 6f | Notify data 74 d9 45 f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 33 a2 b2 7b 70 7c cd 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | natd_hash: hash= a2 41 5d 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | Notify data a2 41 5d 8f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #233 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #233: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #233 to 4294967295 after switching state | Message ID: IKE #233 skipping update_recv as MD is fake | Message ID: sent #233 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.233:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | state #233 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c012338 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa2a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #233 | libevent_malloc: new ptr-libevent@0x55564dad5c68 size 128 | #233 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.352733 | resume sending helper answer for #233 suppresed complete_v2_state_transition() and stole MD | #233 spent 0.422 milliseconds in resume sending helper answer | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499002da88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.355343; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #174 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #174 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.369678; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #220 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #220 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.375999; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #112 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #112 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.383349; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #205 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #205 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.385655; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #226 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x55564dacba18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #226 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.411995; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #175 | libevent_malloc: new ptr-libevent@0x55564dacba18 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #175 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-234' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #234 at 0x55564dad5098 | State DB: adding IKEv2 state #234 in UNDEFINED | pstats #234 ikev2.ike started | Message ID: init #234: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #234: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #234; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-234" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-234" IKE SA #234 "road-eastnet-nonat-234" "road-eastnet-nonat-234" #234: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-234 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-234": constructed local IKE proposals for road-eastnet-nonat-234 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 234 for state #234 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ede48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #234 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 | crypto helper 15 resuming | crypto helper 15 starting work-order 234 for state #234 | #234 spent 0.198 milliseconds in ikev2_parent_outI1() | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 234 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-234" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.328 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 234 time elapsed 0.001086 seconds | (#234) spent 1.08 milliseconds in crypto helper computing work-order 234: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 234 for state #234 to event queue | scheduling resume sending helper answer for #234 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 234 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #234 | **emit ISAKMP Message: | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | ikev2 g^x fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | ikev2 g^x 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | ikev2 g^x 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | ikev2 g^x 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | ikev2 g^x 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | ikev2 g^x d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | ikev2 g^x 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | ikev2 g^x 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | ikev2 g^x c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | ikev2 g^x 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | ikev2 g^x 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | ikev2 g^x dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | ikev2 g^x bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ikev2 g^x ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | ikev2 g^x 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 43 57 71 92 | IKEv2 nonce dd a4 c0 b3 21 de 52 f9 02 ee c6 92 fb d4 09 0f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 99 42 29 d3 ef 1c 58 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ea | natd_hash: port=500 | natd_hash: hash= 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c 4f 96 2d fa | natd_hash: hash= cc 50 47 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c 4f 96 2d fa | Notify data cc 50 47 64 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 99 42 29 d3 ef 1c 58 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | natd_hash: hash= d9 84 13 c3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | Notify data d9 84 13 c3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #234 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #234: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #234 to 4294967295 after switching state | Message ID: IKE #234 skipping update_recv as MD is fake | Message ID: sent #234 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.234:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | state #234 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ede48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #234 | libevent_malloc: new ptr-libevent@0x55564dad73e8 size 128 | #234 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.417856 | resume sending helper answer for #234 suppresed complete_v2_state_transition() and stole MD | #234 spent 0.5 milliseconds in resume sending helper answer | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984043a18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.430102; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #221 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #221 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.436445; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #113 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x7f4988033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #113 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.446841; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #206 | libevent_malloc: new ptr-libevent@0x7f4988033358 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #206 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.458191; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #227 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x55564dacd198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #227 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0742 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.472552; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #176 | libevent_malloc: new ptr-libevent@0x55564dacd198 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x7f49ac02da98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #176 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-235' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #235 at 0x55564dad67a8 | State DB: adding IKEv2 state #235 in UNDEFINED | pstats #235 ikev2.ike started | Message ID: init #235: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #235: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #235; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-235" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-235" IKE SA #235 "road-eastnet-nonat-235" "road-eastnet-nonat-235" #235: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-235 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-235": constructed local IKE proposals for road-eastnet-nonat-235 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 235 for state #235 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #235 | libevent_malloc: new ptr-libevent@0x7f49ac02da98 size 128 | #235 spent 0.193 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 235 for state #235 | RESET processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-235" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 235 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.314 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 235 time elapsed 0.000897 seconds | (#235) spent 0.901 milliseconds in crypto helper computing work-order 235: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 235 for state #235 to event queue | scheduling resume sending helper answer for #235 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 235 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #235 | **emit ISAKMP Message: | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | ikev2 g^x b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | ikev2 g^x 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | ikev2 g^x 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | ikev2 g^x 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | ikev2 g^x 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | ikev2 g^x 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | ikev2 g^x c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | ikev2 g^x cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | ikev2 g^x b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | ikev2 g^x 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | ikev2 g^x 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | ikev2 g^x 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | ikev2 g^x 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | ikev2 g^x 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | ikev2 g^x 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe 00 84 6a ff | IKEv2 nonce e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 18 f0 e9 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 58 ca f2 cb c5 86 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 eb | natd_hash: port=500 | natd_hash: hash= d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d 73 f1 76 7e | natd_hash: hash= a3 4a cd 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d 73 f1 76 7e | Notify data a3 4a cd 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 58 ca f2 cb c5 86 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | natd_hash: hash= 6b cd c7 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | Notify data 6b cd c7 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #235 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #235: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #235 to 4294967295 after switching state | Message ID: IKE #235 skipping update_recv as MD is fake | Message ID: sent #235 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.235:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | state #235 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac02da98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #235 | libevent_malloc: new ptr-libevent@0x55564dad8b68 size 128 | #235 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.482252 | resume sending helper answer for #235 suppresed complete_v2_state_transition() and stole MD | #235 spent 0.342 milliseconds in resume sending helper answer | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988017a98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.494427; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #114 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #114 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.503791; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00315 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #207 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #207 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.522115; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #228 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x55564dace8a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #228 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.523392; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000938 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #222 | libevent_malloc: new ptr-libevent@0x55564dace8a8 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x7f499c043ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #222 spent 0.429 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.534038; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #177 | libevent_malloc: new ptr-libevent@0x7f499c043ca8 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x55564da49188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #177 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-236' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #236 at 0x55564dad7f28 | State DB: adding IKEv2 state #236 in UNDEFINED | pstats #236 ikev2.ike started | Message ID: init #236: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #236: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #236; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-236" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-236" IKE SA #236 "road-eastnet-nonat-236" "road-eastnet-nonat-236" #236: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-236 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-236": constructed local IKE proposals for road-eastnet-nonat-236 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 236 for state #236 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #236 | libevent_malloc: new ptr-libevent@0x55564da49188 size 128 | #236 spent 0.185 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | crypto helper 1 starting work-order 236 for state #236 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 236 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 236 time elapsed 0.000558 seconds | (#236) spent 0.563 milliseconds in crypto helper computing work-order 236: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 236 for state #236 to event queue | scheduling resume sending helper answer for #236 | libevent_malloc: new ptr-libevent@0x7f497c043c48 size 128 | crypto helper 1 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-236" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.582 milliseconds in whack | processing resume sending helper answer for #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 236 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #236 | **emit ISAKMP Message: | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | ikev2 g^x 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | ikev2 g^x 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ikev2 g^x ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | ikev2 g^x 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | ikev2 g^x d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | ikev2 g^x f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | ikev2 g^x 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | ikev2 g^x 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ikev2 g^x ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | ikev2 g^x b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | ikev2 g^x 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | ikev2 g^x 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | ikev2 g^x bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | ikev2 g^x 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | ikev2 g^x 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fe ba 94 06 0b ce ad 6d 1e 5b 11 ef b8 eb b2 c4 | IKEv2 nonce e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 ff 17 a3 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 15 ec 5f 0b 6e 0b e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ec | natd_hash: port=500 | natd_hash: hash= a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 b8 8a 20 48 | natd_hash: hash= 8b 6a 60 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 b8 8a 20 48 | Notify data 8b 6a 60 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 15 ec 5f 0b 6e 0b e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | natd_hash: hash= 5e f8 96 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | Notify data 5e f8 96 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #236 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #236: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #236 to 4294967295 after switching state | Message ID: IKE #236 skipping update_recv as MD is fake | Message ID: sent #236 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.236:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | state #236 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da49188 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #236 | libevent_malloc: new ptr-libevent@0x55564dada2e8 size 128 | #236 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.54712 | resume sending helper answer for #236 suppresed complete_v2_state_transition() and stole MD | #236 spent 0.434 milliseconds in resume sending helper answer | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c043c48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0289 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.55529; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00435 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada278 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #115 | libevent_malloc: new ptr-libevent@0x7f497c043c48 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x7f49800333a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #115 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.56463; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #208 | libevent_malloc: new ptr-libevent@0x7f49800333a8 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #208 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.586003; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #229 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x55564dacffb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #229 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-237' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #237 at 0x55564dad96a8 | State DB: adding IKEv2 state #237 in UNDEFINED | pstats #237 ikev2.ike started | Message ID: init #237: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #237: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #237; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-237" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-237" IKE SA #237 "road-eastnet-nonat-237" "road-eastnet-nonat-237" #237: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-237 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-237": constructed local IKE proposals for road-eastnet-nonat-237 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 237 for state #237 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac2e58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #237 | libevent_malloc: new ptr-libevent@0x55564dacffb8 size 128 | #237 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | crypto helper 3 starting work-order 237 for state #237 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 237 | RESET processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-237" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 237 time elapsed 0.000996 seconds | (#237) spent 1 milliseconds in crypto helper computing work-order 237: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 237 for state #237 to event queue | scheduling resume sending helper answer for #237 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 237 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #237 | **emit ISAKMP Message: | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | ikev2 g^x 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | ikev2 g^x 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | ikev2 g^x 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | ikev2 g^x 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | ikev2 g^x bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | ikev2 g^x 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | ikev2 g^x 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | ikev2 g^x fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | ikev2 g^x 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | ikev2 g^x 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | ikev2 g^x 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | ikev2 g^x 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | ikev2 g^x 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | ikev2 g^x 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | ikev2 g^x b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e 75 9c b5 28 7f 99 22 30 69 98 d9 42 4d 43 04 | IKEv2 nonce cd 94 0d ce bb 10 f2 64 53 58 25 3f c0 84 6d 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1d 39 ff 4c e8 31 6a 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ed | natd_hash: port=500 | natd_hash: hash= 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 7c e4 5b b6 | natd_hash: hash= 9f 4c 5f ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 7c e4 5b b6 | Notify data 9f 4c 5f ff | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1d 39 ff 4c e8 31 6a 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | natd_hash: hash= 19 be 0d c9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | Notify data 19 be 0d c9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #237 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #237: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #237 to 4294967295 after switching state | Message ID: IKE #237 skipping update_recv as MD is fake | Message ID: sent #237 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.237:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | state #237 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dacffb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac2e58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #237 | libevent_malloc: new ptr-libevent@0x55564dadb9f8 size 128 | #237 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.610712 | resume sending helper answer for #237 suppresed complete_v2_state_transition() and stole MD | #237 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980038bb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.615936; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #116 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #116 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0689 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.617278; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #223 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.623587; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #178 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x7f4978038be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #178 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.62593; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #209 | libevent_malloc: new ptr-libevent@0x7f4978038be8 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x55564dabd188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #209 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.652465; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564dabd188 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x55564dad1738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #230 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-238' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #238 at 0x55564dadae28 | State DB: adding IKEv2 state #238 in UNDEFINED | pstats #238 ikev2.ike started | Message ID: init #238: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #238: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #238; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-238" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-238" IKE SA #238 "road-eastnet-nonat-238" "road-eastnet-nonat-238" #238: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-238 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-238": constructed local IKE proposals for road-eastnet-nonat-238 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 238 for state #238 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #238 | libevent_malloc: new ptr-libevent@0x55564dad1738 size 128 | #238 spent 0.183 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-238" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 17 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 17 starting work-order 238 for state #238 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 238 | spent 0.69 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 238 time elapsed 0.000784 seconds | (#238) spent 0.79 milliseconds in crypto helper computing work-order 238: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 238 for state #238 to event queue | scheduling resume sending helper answer for #238 | libevent_malloc: new ptr-libevent@0x7f4974043c48 size 128 | crypto helper 17 waiting (nothing to do) | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.674703; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadb918 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #117 | libevent_malloc: new ptr-libevent@0x55564dabfec8 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x55564da7a5e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #117 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 238 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #238 | **emit ISAKMP Message: | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | ikev2 g^x 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ikev2 g^x ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | ikev2 g^x 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | ikev2 g^x 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | ikev2 g^x 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | ikev2 g^x 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | ikev2 g^x 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | ikev2 g^x 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | ikev2 g^x 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | ikev2 g^x 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | ikev2 g^x 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | ikev2 g^x f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | ikev2 g^x 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | ikev2 g^x b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | ikev2 g^x eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c 89 75 89 c4 | IKEv2 nonce 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f e4 25 c4 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 04 4e db f7 b3 e5 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ee | natd_hash: port=500 | natd_hash: hash= a7 1a 05 c0 f1 31 c9 fe da ce 51 76 05 4c 09 17 | natd_hash: hash= 27 cb 7b 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 1a 05 c0 f1 31 c9 fe da ce 51 76 05 4c 09 17 | Notify data 27 cb 7b 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 04 4e db f7 b3 e5 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | natd_hash: hash= 36 55 de 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | Notify data 36 55 de 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #238 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #238: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #238 to 4294967295 after switching state | Message ID: IKE #238 skipping update_recv as MD is fake | Message ID: sent #238 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.238:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | state #238 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dad1738 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #238 | libevent_malloc: new ptr-libevent@0x55564dadd108 size 128 | #238 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.67542 | resume sending helper answer for #238 suppresed complete_v2_state_transition() and stole MD | #238 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974043c48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0516 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.686665; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #210 | libevent_malloc: new ptr-libevent@0x7f4974043c48 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #210 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0791 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.714055; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #179 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #179 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.716433; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #224 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #224 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.723796; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500936 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #231 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x55564dad2e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #231 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-239' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #239 at 0x55564dadc538 | State DB: adding IKEv2 state #239 in UNDEFINED | pstats #239 ikev2.ike started | Message ID: init #239: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #239: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #239; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-239" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-239" IKE SA #239 "road-eastnet-nonat-239" "road-eastnet-nonat-239" #239: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-239 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-239": constructed local IKE proposals for road-eastnet-nonat-239 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 239 for state #239 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #239 | libevent_malloc: new ptr-libevent@0x55564dad2e48 size 128 | crypto helper 18 resuming | #239 spent 0.187 milliseconds in ikev2_parent_outI1() | crypto helper 18 starting work-order 239 for state #239 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 239 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 239 time elapsed 0.000817 seconds | (#239) spent 0.827 milliseconds in crypto helper computing work-order 239: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 239 for state #239 to event queue | scheduling resume sending helper answer for #239 | libevent_malloc: new ptr-libevent@0x7f4978043bb8 size 128 | crypto helper 18 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-239" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.316 milliseconds in whack | processing resume sending helper answer for #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 239 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #239 | **emit ISAKMP Message: | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | ikev2 g^x 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | ikev2 g^x a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | ikev2 g^x df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | ikev2 g^x 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | ikev2 g^x fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | ikev2 g^x f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | ikev2 g^x 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | ikev2 g^x 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | ikev2 g^x 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | ikev2 g^x cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ikev2 g^x ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | ikev2 g^x 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | ikev2 g^x 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | ikev2 g^x a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | ikev2 g^x 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f3 56 4d 65 71 cf 57 08 47 b9 2f af d4 09 91 d1 | IKEv2 nonce 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 14 18 94 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 63 b2 ca f0 cc e7 06 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ef | natd_hash: port=500 | natd_hash: hash= db b6 d4 63 49 a4 30 05 5d 5b 95 e5 7e 40 d5 ac | natd_hash: hash= 10 c3 d7 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db b6 d4 63 49 a4 30 05 5d 5b 95 e5 7e 40 d5 ac | Notify data 10 c3 d7 96 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 63 b2 ca f0 cc e7 06 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | natd_hash: hash= bd 78 26 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | Notify data bd 78 26 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #239 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #239: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #239 to 4294967295 after switching state | Message ID: IKE #239 skipping update_recv as MD is fake | Message ID: sent #239 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.239:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | state #239 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dad2e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #239 | libevent_malloc: new ptr-libevent@0x55564dade818 size 128 | #239 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.737321 | resume sending helper answer for #239 suppresed complete_v2_state_transition() and stole MD | #239 spent 0.601 milliseconds in resume sending helper answer | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978043bb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.745544; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #211 | libevent_malloc: new ptr-libevent@0x7f4978043bb8 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #211 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.754812; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005211 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #118 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #118 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.789185; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500826 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #232 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x55564dad4558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #232 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-240' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #240 at 0x55564daddc48 | State DB: adding IKEv2 state #240 in UNDEFINED | pstats #240 ikev2.ike started | Message ID: init #240: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #240: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #240; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-240" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-240" IKE SA #240 "road-eastnet-nonat-240" "road-eastnet-nonat-240" #240: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-240 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-240": constructed local IKE proposals for road-eastnet-nonat-240 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 240 for state #240 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564dad4558 size 128 | #240 spent 0.199 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 resuming | crypto helper 19 starting work-order 240 for state #240 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 240 | RESET processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-240" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.288 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 240 time elapsed 0.000773 seconds | (#240) spent 0.777 milliseconds in crypto helper computing work-order 240: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 240 for state #240 to event queue | scheduling resume sending helper answer for #240 | libevent_malloc: new ptr-libevent@0x7f496c043d48 size 128 | crypto helper 19 waiting (nothing to do) | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.798271; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #180 | libevent_malloc: new ptr-libevent@0x55564da7a5e8 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x7f496c028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #180 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 240 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #240 | **emit ISAKMP Message: | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | ikev2 g^x f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | ikev2 g^x be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | ikev2 g^x 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | ikev2 g^x 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | ikev2 g^x d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | ikev2 g^x e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | ikev2 g^x b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | ikev2 g^x 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | ikev2 g^x 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | ikev2 g^x 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | ikev2 g^x 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | ikev2 g^x c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | ikev2 g^x 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | ikev2 g^x d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | ikev2 g^x 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 1c e0 4c 9f | IKEv2 nonce a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 61 a0 19 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 53 38 83 15 4d 49 9f ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f0 | natd_hash: port=500 | natd_hash: hash= 91 2c dc a6 dc 14 e0 aa 78 20 4e ae 44 56 54 2c | natd_hash: hash= 7a f8 d0 b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 2c dc a6 dc 14 e0 aa 78 20 4e ae 44 56 54 2c | Notify data 7a f8 d0 b3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 53 38 83 15 4d 49 9f ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | natd_hash: hash= 23 2f de 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | Notify data 23 2f de 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #240 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #240: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #240 to 4294967295 after switching state | Message ID: IKE #240 skipping update_recv as MD is fake | Message ID: sent #240 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.240:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | state #240 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dad4558 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564dadff28 size 128 | #240 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.798918 | resume sending helper answer for #240 suppresed complete_v2_state_transition() and stole MD | #240 spent 0.417 milliseconds in resume sending helper answer | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c043d48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0533 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.812164; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #225 | libevent_malloc: new ptr-libevent@0x7f496c043d48 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | #225 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.813526; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #119 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x7f496c033518 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #119 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.826826; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #212 | libevent_malloc: new ptr-libevent@0x7f496c033518 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #212 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.853198; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #233 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x55564dad5c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #233 spent 0.193 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.858554; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #181 | libevent_malloc: new ptr-libevent@0x55564dad5c68 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x7f498c03e328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #181 spent 0.473 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-241' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #241 at 0x55564dadf358 | State DB: adding IKEv2 state #241 in UNDEFINED | pstats #241 ikev2.ike started | Message ID: init #241: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #241: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #241; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-241" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-241" IKE SA #241 "road-eastnet-nonat-241" "road-eastnet-nonat-241" #241: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-241 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-241": constructed local IKE proposals for road-eastnet-nonat-241 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 241 for state #241 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #241 | libevent_malloc: new ptr-libevent@0x7f498c03e328 size 128 | #241 spent 0.196 milliseconds in ikev2_parent_outI1() | crypto helper 0 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 starting work-order 241 for state #241 | RESET processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 241 | RESET processing: connection "road-eastnet-nonat-241" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.699 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 241 time elapsed 0.000833 seconds | (#241) spent 0.805 milliseconds in crypto helper computing work-order 241: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 241 for state #241 to event queue | scheduling resume sending helper answer for #241 | libevent_malloc: new ptr-libevent@0x7f49bc046648 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 241 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #241 | **emit ISAKMP Message: | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | ikev2 g^x 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | ikev2 g^x bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | ikev2 g^x 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | ikev2 g^x a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ikev2 g^x ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | ikev2 g^x aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | ikev2 g^x 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | ikev2 g^x 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | ikev2 g^x c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | ikev2 g^x e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | ikev2 g^x f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | ikev2 g^x 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | ikev2 g^x a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | ikev2 g^x 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | ikev2 g^x 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 32 67 11 e5 d8 df 0a 44 2c ad 21 3d 67 e6 fc | IKEv2 nonce 32 ea d4 07 16 54 6c f5 f0 3b 16 06 8a 4b 3b e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d8 72 0a 38 4d dc 78 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f1 | natd_hash: port=500 | natd_hash: hash= 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 2c 87 73 de | natd_hash: hash= 60 c8 dd 35 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 2c 87 73 de | Notify data 60 c8 dd 35 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d8 72 0a 38 4d dc 78 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | natd_hash: hash= 7e c2 be aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | Notify data 7e c2 be aa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #241 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #241: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #241 to 4294967295 after switching state | Message ID: IKE #241 skipping update_recv as MD is fake | Message ID: sent #241 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.241:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | state #241 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c03e328 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564dadfe48 size 128 | #241 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.865045 | resume sending helper answer for #241 suppresed complete_v2_state_transition() and stole MD | #241 spent 0.562 milliseconds in resume sending helper answer | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc046648 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.14 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.875464; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #120 | libevent_malloc: new ptr-libevent@0x7f49bc046648 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #120 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.887355; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #226 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #226 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.918817; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #234 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x55564dad73e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #234 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10591.919006; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564dad73e8 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #213 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8b78 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.920333; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #182 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x7f499003e318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8b78 | #182 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-242' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #242 at 0x55564dae0a68 | State DB: adding IKEv2 state #242 in UNDEFINED | pstats #242 ikev2.ike started | Message ID: init #242: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #242: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #242; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-242" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-242" IKE SA #242 "road-eastnet-nonat-242" "road-eastnet-nonat-242" #242: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-242 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-242": constructed local IKE proposals for road-eastnet-nonat-242 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 242 for state #242 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab8b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #242 | libevent_malloc: new ptr-libevent@0x7f499003e318 size 128 | crypto helper 2 resuming | crypto helper 2 starting work-order 242 for state #242 | #242 spent 0.184 milliseconds in ikev2_parent_outI1() | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 242 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-242" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 242 time elapsed 0.000702 seconds | (#242) spent 0.668 milliseconds in crypto helper computing work-order 242: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 242 for state #242 to event queue | scheduling resume sending helper answer for #242 | libevent_malloc: new ptr-libevent@0x7f49b40465a8 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 242 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #242 | **emit ISAKMP Message: | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | ikev2 g^x c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | ikev2 g^x 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | ikev2 g^x 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | ikev2 g^x 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | ikev2 g^x 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | ikev2 g^x 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | ikev2 g^x 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | ikev2 g^x 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | ikev2 g^x 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | ikev2 g^x 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | ikev2 g^x 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | ikev2 g^x f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | ikev2 g^x 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | ikev2 g^x 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | ikev2 g^x 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 36 2b a9 53 43 47 3c a6 73 19 99 01 12 c9 cc b6 | IKEv2 nonce 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 84 00 d9 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= da 06 00 17 91 9f b9 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f2 | natd_hash: port=500 | natd_hash: hash= 6a 55 04 41 5a a4 51 07 c9 57 74 4a 05 c5 00 f5 | natd_hash: hash= b0 b7 b4 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 55 04 41 5a a4 51 07 c9 57 74 4a 05 c5 00 f5 | Notify data b0 b7 b4 41 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= da 06 00 17 91 9f b9 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | natd_hash: hash= 00 ed 3c 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | Notify data 00 ed 3c 6c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #242 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #242: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #242 to 4294967295 after switching state | Message ID: IKE #242 skipping update_recv as MD is fake | Message ID: sent #242 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.242:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | state #242 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499003e318 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab8b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #242 | libevent_malloc: new ptr-libevent@0x55564dae2d08 size 128 | #242 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.926794 | resume sending helper answer for #242 suppresed complete_v2_state_transition() and stole MD | #242 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b40465a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.932997; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae2c98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #121 | libevent_malloc: new ptr-libevent@0x7f49b40465a8 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #121 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10591.959338; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #227 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #227 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10591.978681; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #183 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #183 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10591.98104; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #1 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #1 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10591.983385; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #235 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x55564dad8b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #235 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-243' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #243 at 0x55564dae20c8 | State DB: adding IKEv2 state #243 in UNDEFINED | pstats #243 ikev2.ike started | Message ID: init #243: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #243: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #243; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-243" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-243" IKE SA #243 "road-eastnet-nonat-243" "road-eastnet-nonat-243" #243: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-243 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-243": constructed local IKE proposals for road-eastnet-nonat-243 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 243 for state #243 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #243 | libevent_malloc: new ptr-libevent@0x55564dad8b68 size 128 | #243 spent 0.193 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | RESET processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 243 for state #243 | RESET processing: connection "road-eastnet-nonat-243" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 243 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.312 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 243 time elapsed 0.001006 seconds | (#243) spent 1 milliseconds in crypto helper computing work-order 243: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 243 for state #243 to event queue | scheduling resume sending helper answer for #243 | libevent_malloc: new ptr-libevent@0x7f49b8046fb8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 243 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #243 | **emit ISAKMP Message: | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ikev2 g^x ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | ikev2 g^x 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | ikev2 g^x 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | ikev2 g^x 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | ikev2 g^x a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | ikev2 g^x 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | ikev2 g^x 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | ikev2 g^x 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | ikev2 g^x 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | ikev2 g^x a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | ikev2 g^x cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ikev2 g^x ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | ikev2 g^x 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | ikev2 g^x 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | ikev2 g^x b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 88 6f e7 1d 28 72 47 bf b4 5b 12 1e 30 fc 02 b1 | IKEv2 nonce 63 f5 5c 70 f8 99 73 52 5a bd ae 17 e6 76 c6 69 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b1 07 95 81 ab 47 9a 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f3 | natd_hash: port=500 | natd_hash: hash= aa 4a c8 12 13 6a b2 87 02 d8 60 6b 8b 30 51 9c | natd_hash: hash= 74 d4 9f a9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 4a c8 12 13 6a b2 87 02 d8 60 6b 8b 30 51 9c | Notify data 74 d4 9f a9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b1 07 95 81 ab 47 9a 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | natd_hash: hash= 74 1a e9 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | Notify data 74 1a e9 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #243 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #243: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #243 to 4294967295 after switching state | Message ID: IKE #243 skipping update_recv as MD is fake | Message ID: sent #243 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.243:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | state #243 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dad8b68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49ac0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #243 | libevent_malloc: new ptr-libevent@0x55564dae4488 size 128 | #243 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10591.989605 | resume sending helper answer for #243 suppresed complete_v2_state_transition() and stole MD | #243 spent 0.443 milliseconds in resume sending helper answer | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8046fb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10591.99582; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #122 | libevent_malloc: new ptr-libevent@0x7f49b8046fb8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x7f49b80367d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #122 spent 0.0975 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.082 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.006166; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005346 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #214 | libevent_malloc: new ptr-libevent@0x7f49b80367d8 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #214 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.02387; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #228 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #228 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.036227; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #184 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #184 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.047571; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #236 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x55564dada2e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #236 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-244' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #244 at 0x55564dae3848 | State DB: adding IKEv2 state #244 in UNDEFINED | pstats #244 ikev2.ike started | Message ID: init #244: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #244: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #244; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-244" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-244" IKE SA #244 "road-eastnet-nonat-244" "road-eastnet-nonat-244" #244: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-244 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-244": constructed local IKE proposals for road-eastnet-nonat-244 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 244 for state #244 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #244 | libevent_malloc: new ptr-libevent@0x55564dada2e8 size 128 | #244 spent 0.186 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 244 for state #244 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 244 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 244 time elapsed 0.000746 seconds | (#244) spent 0.741 milliseconds in crypto helper computing work-order 244: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 244 for state #244 to event queue | scheduling resume sending helper answer for #244 | libevent_malloc: new ptr-libevent@0x7f49ac0493a8 size 128 | crypto helper 5 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-244" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.273 milliseconds in whack | processing resume sending helper answer for #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 244 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #244 | **emit ISAKMP Message: | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | ikev2 g^x 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ikev2 g^x ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | ikev2 g^x 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | ikev2 g^x 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | ikev2 g^x 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | ikev2 g^x 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | ikev2 g^x 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | ikev2 g^x d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | ikev2 g^x 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | ikev2 g^x e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | ikev2 g^x f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | ikev2 g^x de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | ikev2 g^x d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | ikev2 g^x 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | ikev2 g^x 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 30 07 71 24 3d 4d 97 0c 26 9a e6 93 3f 94 ef | IKEv2 nonce 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c 62 6c fd fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2d 37 69 e3 5d 15 b3 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f4 | natd_hash: port=500 | natd_hash: hash= a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 57 46 2f e2 | natd_hash: hash= a2 e2 5f 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 57 46 2f e2 | Notify data a2 e2 5f 8f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2d 37 69 e3 5d 15 b3 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | natd_hash: hash= 89 9e 25 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | Notify data 89 9e 25 45 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #244 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #244: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #244 to 4294967295 after switching state | Message ID: IKE #244 skipping update_recv as MD is fake | Message ID: sent #244 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.244:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | state #244 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dada2e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #244 | libevent_malloc: new ptr-libevent@0x55564dae5b98 size 128 | #244 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.054373 | resume sending helper answer for #244 suppresed complete_v2_state_transition() and stole MD | #244 spent 0.355 milliseconds in resume sending helper answer | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac0493a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.061565; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #123 | libevent_malloc: new ptr-libevent@0x7f49ac0493a8 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x7f49ac038b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #123 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.064891; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #215 | libevent_malloc: new ptr-libevent@0x7f49ac038b78 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #215 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.087226; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #229 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #229 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.095592; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #185 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #185 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.101945; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #2 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.111289; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #237 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x55564dadb9f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #237 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-245' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #245 at 0x55564dae4fc8 | State DB: adding IKEv2 state #245 in UNDEFINED | pstats #245 ikev2.ike started | Message ID: init #245: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #245: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #245; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-245" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-245" IKE SA #245 "road-eastnet-nonat-245" "road-eastnet-nonat-245" #245: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-245 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-245": constructed local IKE proposals for road-eastnet-nonat-245 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 245 for state #245 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac2e58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #245 | libevent_malloc: new ptr-libevent@0x55564dadb9f8 size 128 | crypto helper 6 resuming | crypto helper 6 starting work-order 245 for state #245 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 245 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 245 time elapsed 0.00099 seconds | (#245) spent 0.994 milliseconds in crypto helper computing work-order 245: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 245 for state #245 to event queue | scheduling resume sending helper answer for #245 | libevent_malloc: new ptr-libevent@0x7f49b0049338 size 128 | crypto helper 6 waiting (nothing to do) | #245 spent 0.184 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-245" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.274 milliseconds in whack | processing resume sending helper answer for #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 245 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #245 | **emit ISAKMP Message: | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | ikev2 g^x 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | ikev2 g^x 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | ikev2 g^x cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | ikev2 g^x b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | ikev2 g^x fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | ikev2 g^x cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | ikev2 g^x 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | ikev2 g^x 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | ikev2 g^x df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | ikev2 g^x 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | ikev2 g^x c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | ikev2 g^x 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | ikev2 g^x 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | ikev2 g^x 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | ikev2 g^x 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 fe 72 ba 8d | IKEv2 nonce f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 b8 34 c5 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 c7 f4 3b b8 1f df 79 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f5 | natd_hash: port=500 | natd_hash: hash= ce ca e3 32 0b c9 de 11 4f e4 a0 2e 34 97 ba f3 | natd_hash: hash= b9 b4 7e 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce ca e3 32 0b c9 de 11 4f e4 a0 2e 34 97 ba f3 | Notify data b9 b4 7e 5f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 c7 f4 3b b8 1f df 79 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | natd_hash: hash= 09 4a 0d 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | Notify data 09 4a 0d 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #245 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #245: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #245 to 4294967295 after switching state | Message ID: IKE #245 skipping update_recv as MD is fake | Message ID: sent #245 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.245:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | state #245 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dadb9f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac2e58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #245 | libevent_malloc: new ptr-libevent@0x55564dae72a8 size 128 | #245 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.120877 | resume sending helper answer for #245 suppresed complete_v2_state_transition() and stole MD | #245 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0049338 | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.120927; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #124 | libevent_malloc: new ptr-libevent@0x7f49b0049338 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x55564da85ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #124 spent 0.0964 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0509 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.126247; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #216 | libevent_malloc: new ptr-libevent@0x55564da85ee8 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x55564dac5c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #216 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.153571; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003146 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564dac5c48 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x55564dabd188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #230 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.164937; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006738 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #3 | libevent_malloc: new ptr-libevent@0x55564dabd188 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #3 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.170229; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #186 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #186 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.175529; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #238 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x55564dadd108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #238 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.180903; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005178 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #125 | libevent_malloc: new ptr-libevent@0x55564dadd108 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #125 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-246' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #246 at 0x55564dae66d8 | State DB: adding IKEv2 state #246 in UNDEFINED | pstats #246 ikev2.ike started | Message ID: init #246: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #246: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #246; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-246" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-246" IKE SA #246 "road-eastnet-nonat-246" "road-eastnet-nonat-246" #246: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-246 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-246": constructed local IKE proposals for road-eastnet-nonat-246 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 246 for state #246 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da136d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #246 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 | crypto helper 7 resuming | crypto helper 7 starting work-order 246 for state #246 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 246 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 246 time elapsed 0.000936 seconds | (#246) spent 0.944 milliseconds in crypto helper computing work-order 246: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 246 for state #246 to event queue | scheduling resume sending helper answer for #246 | libevent_malloc: new ptr-libevent@0x7f49a40492e8 size 128 | crypto helper 7 waiting (nothing to do) | #246 spent 0.195 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-246" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.292 milliseconds in whack | processing resume sending helper answer for #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 246 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #246 | **emit ISAKMP Message: | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | ikev2 g^x 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | ikev2 g^x 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | ikev2 g^x 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | ikev2 g^x e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | ikev2 g^x 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | ikev2 g^x a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ikev2 g^x ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ikev2 g^x ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | ikev2 g^x 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ikev2 g^x ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | ikev2 g^x 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | ikev2 g^x 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | ikev2 g^x bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | ikev2 g^x 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | ikev2 g^x 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f 7d 8c 56 49 | IKEv2 nonce 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 3a b5 53 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 69 c2 c3 f7 24 b4 1a 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f6 | natd_hash: port=500 | natd_hash: hash= 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 b2 18 cc 42 | natd_hash: hash= 6a d5 0a 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 b2 18 cc 42 | Notify data 6a d5 0a 40 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 69 c2 c3 f7 24 b4 1a 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | natd_hash: hash= 25 3f ac 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | Notify data 25 3f ac 20 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #246 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #246: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #246 to 4294967295 after switching state | Message ID: IKE #246 skipping update_recv as MD is fake | Message ID: sent #246 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.246:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | state #246 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da136d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #246 | libevent_malloc: new ptr-libevent@0x55564dae89b8 size 128 | #246 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.186325 | resume sending helper answer for #246 suppresed complete_v2_state_transition() and stole MD | #246 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40492e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.188673; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #217 | libevent_malloc: new ptr-libevent@0x7f49a40492e8 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x7f4978028358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #217 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.22305; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #4 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.224335; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001475 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #231 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #231 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.237584; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #239 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x55564dade818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #239 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.240942; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #126 | libevent_malloc: new ptr-libevent@0x55564dade818 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x7f49780333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #126 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-247' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #247 at 0x55564dae7de8 | State DB: adding IKEv2 state #247 in UNDEFINED | pstats #247 ikev2.ike started | Message ID: init #247: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #247: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #247; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-247" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-247" IKE SA #247 "road-eastnet-nonat-247" "road-eastnet-nonat-247" #247: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-247 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-247": constructed local IKE proposals for road-eastnet-nonat-247 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 247 for state #247 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #247 | libevent_malloc: new ptr-libevent@0x7f49780333d8 size 128 | #247 spent 0.176 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | crypto helper 8 starting work-order 247 for state #247 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 247 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 247 time elapsed 0.000832 seconds | (#247) spent 0.842 milliseconds in crypto helper computing work-order 247: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 247 for state #247 to event queue | scheduling resume sending helper answer for #247 | libevent_malloc: new ptr-libevent@0x7f49a8049598 size 128 | crypto helper 8 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-247" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.266 milliseconds in whack | processing resume sending helper answer for #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 247 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #247 | **emit ISAKMP Message: | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | ikev2 g^x 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | ikev2 g^x 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | ikev2 g^x fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | ikev2 g^x 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | ikev2 g^x 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | ikev2 g^x 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | ikev2 g^x c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | ikev2 g^x d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | ikev2 g^x 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | ikev2 g^x c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | ikev2 g^x 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | ikev2 g^x 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | ikev2 g^x 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | ikev2 g^x f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | ikev2 g^x 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 83 1b fc 7f 35 28 96 82 2f 3c 58 53 9c 8b ad e5 | IKEv2 nonce 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 af 18 0c 51 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 25 43 d6 68 29 45 8d 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f7 | natd_hash: port=500 | natd_hash: hash= ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 30 9c 06 c1 | natd_hash: hash= 21 6c 35 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 30 9c 06 c1 | Notify data 21 6c 35 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 25 43 d6 68 29 45 8d 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | natd_hash: hash= d8 62 3b 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | Notify data d8 62 3b 3a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #247 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #247: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #247 to 4294967295 after switching state | Message ID: IKE #247 skipping update_recv as MD is fake | Message ID: sent #247 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.247:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | state #247 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780333d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #247 | libevent_malloc: new ptr-libevent@0x55564daea0c8 size 128 | #247 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.252585 | resume sending helper answer for #247 suppresed complete_v2_state_transition() and stole MD | #247 spent 0.345 milliseconds in resume sending helper answer | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8049598 | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.25264; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #218 | libevent_malloc: new ptr-libevent@0x7f49a8049598 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #218 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.263009; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #187 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #187 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.287337; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #5 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.290682; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #232 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #232 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.298964; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x55564dadff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #240 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.300243; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564dadff28 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x55564da88de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #127 spent 0.0875 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.312479; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #219 | libevent_malloc: new ptr-libevent@0x55564da88de8 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x7f4988038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #219 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-248' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #248 at 0x55564dae94f8 | State DB: adding IKEv2 state #248 in UNDEFINED | pstats #248 ikev2.ike started | Message ID: init #248: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #248: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #248; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-248" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-248" IKE SA #248 "road-eastnet-nonat-248" "road-eastnet-nonat-248" #248: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-248 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-248": constructed local IKE proposals for road-eastnet-nonat-248 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 248 for state #248 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d078 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f4988038b68 size 128 | #248 spent 0.174 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 248 for state #248 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 248 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 248 time elapsed 0.000647 seconds | (#248) spent 0.631 milliseconds in crypto helper computing work-order 248: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 248 for state #248 to event queue | scheduling resume sending helper answer for #248 | libevent_malloc: new ptr-libevent@0x7f499c0494b8 size 128 | crypto helper 9 waiting (nothing to do) | RESET processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-248" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.258 milliseconds in whack | processing resume sending helper answer for #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 248 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #248 | **emit ISAKMP Message: | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | ikev2 g^x 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | ikev2 g^x 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | ikev2 g^x 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | ikev2 g^x 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | ikev2 g^x c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | ikev2 g^x 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | ikev2 g^x 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | ikev2 g^x 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | ikev2 g^x c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | ikev2 g^x 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | ikev2 g^x 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | ikev2 g^x 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | ikev2 g^x 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | ikev2 g^x 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ikev2 g^x ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e d6 14 74 fc | IKEv2 nonce 53 70 22 d8 8c 94 08 05 05 7d 9a cd 29 d5 aa ce | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 53 90 91 21 06 45 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f8 | natd_hash: port=500 | natd_hash: hash= 63 58 de ff fb 89 83 db eb 24 01 76 c3 fd 95 90 | natd_hash: hash= ea 65 b5 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 58 de ff fb 89 83 db eb 24 01 76 c3 fd 95 90 | Notify data ea 65 b5 54 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 53 90 91 21 06 45 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | natd_hash: hash= a1 54 64 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | Notify data a1 54 64 9b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #248 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #248: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #248 to 4294967295 after switching state | Message ID: IKE #248 skipping update_recv as MD is fake | Message ID: sent #248 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.248:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | state #248 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988038b68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d078 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #248 | libevent_malloc: new ptr-libevent@0x55564daeb848 size 128 | #248 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.316989 | resume sending helper answer for #248 suppresed complete_v2_state_transition() and stole MD | #248 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0494b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.322199; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #188 | libevent_malloc: new ptr-libevent@0x7f499c0494b8 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x55564da5d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #188 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.348598; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #6 | libevent_malloc: new ptr-libevent@0x55564da5d668 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #6 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.354899; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #233 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #233 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.361168; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #128 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x55564da8a4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #128 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.365452; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564da8a4f8 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x55564dadfe48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #241 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.370814; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003477 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #220 | libevent_malloc: new ptr-libevent@0x55564dadfe48 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #220 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-249' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #249 at 0x55564daeac08 | State DB: adding IKEv2 state #249 in UNDEFINED | pstats #249 ikev2.ike started | Message ID: init #249: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #249: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #249; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-249" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-249" IKE SA #249 "road-eastnet-nonat-249" "road-eastnet-nonat-249" #249: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-249 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-249": constructed local IKE proposals for road-eastnet-nonat-249 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 249 for state #249 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a9cb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #249 | libevent_malloc: new ptr-libevent@0x55564da19468 size 128 | #249 spent 0.167 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 249 for state #249 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 249 | RESET processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-249" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.602 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 249 time elapsed 0.000762 seconds | (#249) spent 0.755 milliseconds in crypto helper computing work-order 249: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 249 for state #249 to event queue | scheduling resume sending helper answer for #249 | libevent_malloc: new ptr-libevent@0x7f49a00493f8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 249 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #249 | **emit ISAKMP Message: | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | ikev2 g^x f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | ikev2 g^x fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | ikev2 g^x 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | ikev2 g^x c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | ikev2 g^x cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | ikev2 g^x f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | ikev2 g^x a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | ikev2 g^x cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | ikev2 g^x b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | ikev2 g^x dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | ikev2 g^x 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | ikev2 g^x 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | ikev2 g^x 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | ikev2 g^x 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | ikev2 g^x 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fd c9 a9 43 c2 11 16 05 b0 1c 9c ce db f0 82 31 | IKEv2 nonce 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 04 bb cf 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 53 7b b2 13 b1 62 f1 50 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f9 | natd_hash: port=500 | natd_hash: hash= d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 6d af ba 79 | natd_hash: hash= f8 4c 99 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 6d af ba 79 | Notify data f8 4c 99 26 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 53 7b b2 13 b1 62 f1 50 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | natd_hash: hash= 38 88 ad ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | Notify data 38 88 ad ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #249 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #249: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #249 to 4294967295 after switching state | Message ID: IKE #249 skipping update_recv as MD is fake | Message ID: sent #249 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.249:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | state #249 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564da19468 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a9cb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #249 | libevent_malloc: new ptr-libevent@0x55564daecfc8 size 128 | #249 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.380395 | resume sending helper answer for #249 suppresed complete_v2_state_transition() and stole MD | #249 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00493f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.382584; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #189 | libevent_malloc: new ptr-libevent@0x7f49a00493f8 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x55564da5ed78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #189 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.40787; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #7 | libevent_malloc: new ptr-libevent@0x55564da5ed78 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x55564da067a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #7 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.420209; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #234 | libevent_malloc: new ptr-libevent@0x55564da067a8 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #234 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.42149; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #129 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x55564da8bc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #129 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8b78 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.427819; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #242 | libevent_malloc: new ptr-libevent@0x55564da8bc08 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x55564dae2d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8b78 | #242 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.43115; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #221 | libevent_malloc: new ptr-libevent@0x55564dae2d08 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #221 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.441445; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x7f4974022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #190 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-250' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #250 at 0x55564daec388 | State DB: adding IKEv2 state #250 in UNDEFINED | pstats #250 ikev2.ike started | Message ID: init #250: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #250: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #250; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-250" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-250" IKE SA #250 "road-eastnet-nonat-250" "road-eastnet-nonat-250" #250: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-250 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-250": constructed local IKE proposals for road-eastnet-nonat-250 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 250 for state #250 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #250 | libevent_malloc: new ptr-libevent@0x7f4974022bd8 size 128 | #250 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | crypto helper 11 starting work-order 250 for state #250 | RESET processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-250" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 250 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.24 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 250 time elapsed 0.00112 seconds | (#250) spent 1.1 milliseconds in crypto helper computing work-order 250: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 250 for state #250 to event queue | scheduling resume sending helper answer for #250 | libevent_malloc: new ptr-libevent@0x7f4994049628 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 250 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #250 | **emit ISAKMP Message: | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | ikev2 g^x 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ikev2 g^x ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | ikev2 g^x 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | ikev2 g^x 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | ikev2 g^x 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ikev2 g^x ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ikev2 g^x ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | ikev2 g^x 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | ikev2 g^x 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | ikev2 g^x 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | ikev2 g^x 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | ikev2 g^x b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | ikev2 g^x 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | ikev2 g^x 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | ikev2 g^x 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 d8 3f 92 d2 | IKEv2 nonce 2f e0 37 4a 54 28 32 20 74 ed 33 99 50 a3 3f 5b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d9 b3 f5 9f 3d 17 ff 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fa | natd_hash: port=500 | natd_hash: hash= d9 24 08 82 71 ed 0c 22 7f 92 62 8f 7b a2 71 47 | natd_hash: hash= 90 d9 68 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 24 08 82 71 ed 0c 22 7f 92 62 8f 7b a2 71 47 | Notify data 90 d9 68 52 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d9 b3 f5 9f 3d 17 ff 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | natd_hash: hash= 91 c5 93 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | Notify data 91 c5 93 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #250 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #250: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #250 to 4294967295 after switching state | Message ID: IKE #250 skipping update_recv as MD is fake | Message ID: sent #250 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.250:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | state #250 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974022bd8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #250 | libevent_malloc: new ptr-libevent@0x55564daee6d8 size 128 | #250 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.446765 | resume sending helper answer for #250 suppresed complete_v2_state_transition() and stole MD | #250 spent 0.416 milliseconds in resume sending helper answer | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994049628 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.473945; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daece78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f4994049628 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #8 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.484307; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #235 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #235 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.490655; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #243 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x55564dae4488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #243 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.500984; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #191 | libevent_malloc: new ptr-libevent@0x55564dae4488 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #191 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-251' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #251 at 0x55564daedb08 | State DB: adding IKEv2 state #251 in UNDEFINED | pstats #251 ikev2.ike started | Message ID: init #251: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #251: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #251; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-251" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-251" IKE SA #251 "road-eastnet-nonat-251" "road-eastnet-nonat-251" #251: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-251 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-251": constructed local IKE proposals for road-eastnet-nonat-251 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 251 for state #251 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #251 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 | #251 spent 0.18 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 251 for state #251 | RESET processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 251 | RESET processing: connection "road-eastnet-nonat-251" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.281 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 251 time elapsed 0.001051 seconds | (#251) spent 1.05 milliseconds in crypto helper computing work-order 251: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 251 for state #251 to event queue | scheduling resume sending helper answer for #251 | libevent_malloc: new ptr-libevent@0x7f4998049398 size 128 | libevent_realloc: release ptr-libevent@0x7f49b8028068 | libevent_realloc: new ptr-libevent@0x7f499804bda8 size 4096 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 251 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #251 | **emit ISAKMP Message: | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | ikev2 g^x a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | ikev2 g^x 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | ikev2 g^x 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ikev2 g^x ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | ikev2 g^x 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | ikev2 g^x 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | ikev2 g^x 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | ikev2 g^x 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | ikev2 g^x d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | ikev2 g^x 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | ikev2 g^x 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | ikev2 g^x 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | ikev2 g^x c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | ikev2 g^x 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | ikev2 g^x 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 39 27 23 ef 10 68 27 17 33 d0 9b 1d f8 af 44 ad | IKEv2 nonce 34 e0 54 74 a4 14 64 18 7e e5 dd 21 f2 f6 50 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e5 37 f2 d0 67 1a 0a 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fb | natd_hash: port=500 | natd_hash: hash= 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 2c 5c c9 eb | natd_hash: hash= 39 d5 be 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 2c 5c c9 eb | Notify data 39 d5 be 75 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e5 37 f2 d0 67 1a 0a 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | natd_hash: hash= 05 e4 71 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | Notify data 05 e4 71 c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #251 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #251: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #251 to 4294967295 after switching state | Message ID: IKE #251 skipping update_recv as MD is fake | Message ID: sent #251 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.251:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | state #251 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #251 | libevent_malloc: new ptr-libevent@0x55564daefe58 size 128 | #251 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.508389 | resume sending helper answer for #251 suppresed complete_v2_state_transition() and stole MD | #251 spent 0.34 milliseconds in resume sending helper answer | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998049398 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.51057; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f4998049398 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #130 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.52483; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #222 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x55564dace8a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #222 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.536126; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #9 | libevent_malloc: new ptr-libevent@0x55564dace8a8 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #9 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.548424; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #236 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #236 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.555702; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #244 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x55564dae5b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #244 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-252' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #252 at 0x55564daef218 | State DB: adding IKEv2 state #252 in UNDEFINED | pstats #252 ikev2.ike started | Message ID: init #252: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #252: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #252; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-252" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-252" IKE SA #252 "road-eastnet-nonat-252" "road-eastnet-nonat-252" #252: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-252 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-252": constructed local IKE proposals for road-eastnet-nonat-252 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 252 for state #252 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #252 | libevent_malloc: new ptr-libevent@0x55564dae5b98 size 128 | #252 spent 0.135 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | crypto helper 13 starting work-order 252 for state #252 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 252 | RESET processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-252" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 252 time elapsed 0.000938 seconds | (#252) spent 0.945 milliseconds in crypto helper computing work-order 252: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 252 for state #252 to event queue | scheduling resume sending helper answer for #252 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 252 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #252 | **emit ISAKMP Message: | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | ikev2 g^x 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | ikev2 g^x 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | ikev2 g^x 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | ikev2 g^x 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | ikev2 g^x 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | ikev2 g^x 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | ikev2 g^x d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | ikev2 g^x db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | ikev2 g^x 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | ikev2 g^x 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | ikev2 g^x b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | ikev2 g^x 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ikev2 g^x ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | ikev2 g^x 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | ikev2 g^x c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce be 26 d2 2a 5a ab aa fc ac 80 74 cb b5 86 03 88 | IKEv2 nonce 91 37 51 7f e7 89 87 22 c4 21 9d 3e d3 c1 e6 c7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c8 4d 4e e2 da b9 00 91 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fc | natd_hash: port=500 | natd_hash: hash= 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 15 ad 31 b6 | natd_hash: hash= 25 ff 60 ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 15 ad 31 b6 | Notify data 25 ff 60 ab | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c8 4d 4e e2 da b9 00 91 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | natd_hash: hash= ed c4 9b 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | Notify data ed c4 9b 99 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #252 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #252: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #252 to 4294967295 after switching state | Message ID: IKE #252 skipping update_recv as MD is fake | Message ID: sent #252 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.252:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | state #252 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dae5b98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #252 | libevent_malloc: new ptr-libevent@0x55564daf15d8 size 128 | #252 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10592.569423 | resume sending helper answer for #252 suppresed complete_v2_state_transition() and stole MD | #252 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c022ac8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.574611; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #192 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #192 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.597916; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #10 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #10 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.606198; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #131 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x55564da8d358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #131 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.612477; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #237 | libevent_malloc: new ptr-libevent@0x55564da8d358 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #237 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.618856; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #223 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.62113; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #245 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x55564dae72a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #245 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name initiating all conns with alias='road-eastnet-nonat-253' | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0699 milliseconds in whack | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.634583; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #193 | libevent_malloc: new ptr-libevent@0x55564dae72a8 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x55564daabb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #193 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.658862; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006179 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #11 | libevent_malloc: new ptr-libevent@0x55564daabb08 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #11 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.667136; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #132 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #132 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.67648; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #238 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #238 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.687822; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #246 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x55564dae89b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #246 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.693194; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #194 | libevent_malloc: new ptr-libevent@0x55564dae89b8 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x55564dabe898 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #194 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.71647; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #12 | libevent_malloc: new ptr-libevent@0x55564dabe898 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #12 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.71781; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #224 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #224 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.731153; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005813 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #133 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #133 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.738458; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #239 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #239 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.75373; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #247 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x55564daea0c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #247 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.753898; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #195 | libevent_malloc: new ptr-libevent@0x55564daea0c8 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x55564dabffa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #195 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.776346; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564dabffa8 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #13 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.793645; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005891 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #134 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #134 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.799959; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #240 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #240 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0726 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.813325; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #225 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x7f496c043d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #225 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.815666; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f496c043d48 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x7f49b0043ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #196 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.816962; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f49b0043ac8 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x55564daeb848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #248 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.836288; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #14 | libevent_malloc: new ptr-libevent@0x55564daeb848 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x55564da0c408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #14 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.850609; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #135 | libevent_malloc: new ptr-libevent@0x55564da0c408 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #135 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0836 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.866004; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x55564da8a4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #241 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.876332; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #197 | libevent_malloc: new ptr-libevent@0x55564da8a4f8 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #197 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0508 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.881639; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #249 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x55564daecfc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #249 spent 0.0929 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.888932; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004223 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #226 | libevent_malloc: new ptr-libevent@0x55564daecfc8 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #226 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.89624; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #15 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x7f499c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #15 spent 0.334 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.911744; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #136 | libevent_malloc: new ptr-libevent@0x7f499c0282d8 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x7f497c028398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #136 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0742 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.929183; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #242 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x55564da8bc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #242 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.93647; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003215 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #198 | libevent_malloc: new ptr-libevent@0x55564da8bc08 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x55564dac4528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #198 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10592.947766; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #250 | libevent_malloc: new ptr-libevent@0x55564dac4528 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x55564daee6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #250 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10592.957086; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #16 | libevent_malloc: new ptr-libevent@0x55564daee6d8 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x7f49a0028218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #16 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10592.960357; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #227 | libevent_malloc: new ptr-libevent@0x7f49a0028218 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #227 spent 0.0845 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10592.969611; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #137 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #137 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10592.991916; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #243 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #243 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10592.999213; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #199 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #199 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10593.009483; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #251 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x55564daefe58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #251 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.021851; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564daefe58 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x55564da40808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #17 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.025109; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #228 | libevent_malloc: new ptr-libevent@0x55564da40808 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #228 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.056357; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #244 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #244 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.057692; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #200 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x7f49a00332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #200 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.061003; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003333 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x7f496c038d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #138 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0886 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 1 | retransmits: current time 10593.070412; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #252 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x55564daf15d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #252 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0885 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.088807; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #229 | libevent_malloc: new ptr-libevent@0x55564daf15d8 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #229 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.095155; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x55564da137b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #18 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.116443; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #201 | libevent_malloc: new ptr-libevent@0x55564da137b8 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x7f49940334c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #201 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.122808; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #245 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #245 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa7488 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.127174; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #139 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa7488 | #139 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.154565; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #230 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x55564dac5c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #230 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.160951; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006289 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564dac5c48 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #19 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.176225; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #202 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #202 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.188512; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #140 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x7f49b403b588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #140 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.189797; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #246 | libevent_malloc: new ptr-libevent@0x7f49b403b588 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #246 spent 0.0923 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.225073; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #231 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #231 spent 0.215 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.229499; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004568 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #20 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x55564da44d38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #20 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0921 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.255028; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #247 | libevent_malloc: new ptr-libevent@0x55564da44d38 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #247 spent 0.489 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.162 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.257916; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #141 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x55564da9e8d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #141 spent 0.344 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.237 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.26469; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564da9e8d8 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #203 spent 0.34 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.169 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.291451; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #232 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #232 spent 0.35 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.172 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.318233; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x7f49b0043ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #248 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.183 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da51d68 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.321974; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f49b0043ac8 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x7f49b402acf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da51d68 | #21 spent 0.325 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.167 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.323648; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #142 | libevent_malloc: new ptr-libevent@0x7f49b402acf8 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x7f49ac03e388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #142 spent 0.359 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.234 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.325522; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #204 | libevent_malloc: new ptr-libevent@0x7f49ac03e388 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #204 spent 0.485 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.162 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.3564; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #233 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #233 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.163 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.380154; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x7f49b802b6f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #22 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0749 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.382543; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #249 | libevent_malloc: new ptr-libevent@0x7f49b802b6f8 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #249 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.38486; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003679 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #205 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #205 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.38499; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #143 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x7f49b003e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #143 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.421322; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #234 | libevent_malloc: new ptr-libevent@0x7f49b003e2b8 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x55564da067a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #234 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.440605; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #23 | libevent_malloc: new ptr-libevent@0x55564da067a8 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x55564da17d58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #23 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0774 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.445982; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #144 | libevent_malloc: new ptr-libevent@0x55564da17d58 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | libevent_free: release ptr-libevent@0x7f49a4038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #144 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.447256; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #206 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x7f4988033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #206 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.448565; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #250 | libevent_malloc: new ptr-libevent@0x7f4988033358 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x55564dac4528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #250 spent 0.0884 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.485922; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #235 | libevent_malloc: new ptr-libevent@0x55564dac4528 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #235 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.498245; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #24 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x55564da34f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #24 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0517 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.504532; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003891 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #207 | libevent_malloc: new ptr-libevent@0x55564da34f78 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #207 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.506834; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #145 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #145 spent 0.212 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.510231; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #251 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #251 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0689 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.549553; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #236 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #236 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.555851; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #25 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x7f4994017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #25 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.565144; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #208 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x7f49800333a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #208 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.567418; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #146 | libevent_malloc: new ptr-libevent@0x7f49800333a8 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x7f499c03e498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | #146 spent 0.0855 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 2 | retransmits: current time 10593.571639; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #252 | libevent_malloc: new ptr-libevent@0x7f499c03e498 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x7f496c038d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #252 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0782 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.613965; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #237 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x55564da8d358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #237 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.625343; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #147 | libevent_malloc: new ptr-libevent@0x55564da8d358 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x7f49a003e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #147 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.627618; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005142 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #209 | libevent_malloc: new ptr-libevent@0x7f49a003e3d8 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x7f4978038be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #209 spent 0.0971 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0693 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.62991; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #26 | libevent_malloc: new ptr-libevent@0x7f4978038be8 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x55564da4c0a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #26 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.677287; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001867 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #238 | libevent_malloc: new ptr-libevent@0x55564da4c0a8 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #238 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.687604; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #210 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x7f4974043c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #210 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.689906; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #27 | libevent_malloc: new ptr-libevent@0x7f4974043c48 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x55564da4d778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #27 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.698371; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #148 | libevent_malloc: new ptr-libevent@0x55564da4d778 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #148 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.739653; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #239 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #239 spent 0.208 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.746045; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #211 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x7f4978043bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #211 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.751459; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #28 | libevent_malloc: new ptr-libevent@0x7f4978043bb8 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #28 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.763831; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #149 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x55564daaa3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #149 spent 0.0972 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.801053; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564daaa3f8 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #240 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.821359; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #150 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #150 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.826826; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #29 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x55564da51dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #29 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0978 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.828246; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #212 | libevent_malloc: new ptr-libevent@0x55564da51dd8 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x7f496c033518 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #212 spent 0.187 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0949 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.867635; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #241 | libevent_malloc: new ptr-libevent@0x7f496c033518 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #241 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.880011; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #151 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x7f49880282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #151 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.904276; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #30 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x55564da26778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #30 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0787 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10593.920651; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564da26778 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x55564dad73e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #213 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.930942; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #242 | libevent_malloc: new ptr-libevent@0x55564dad73e8 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x7f497c028398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #242 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10593.947326; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #152 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x55564daae928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #152 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0791 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10593.977797; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #31 | libevent_malloc: new ptr-libevent@0x55564daae928 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x55564da26698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #31 spent 0.308 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10593.993514; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #243 | libevent_malloc: new ptr-libevent@0x55564da26698 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #243 spent 0.577 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.272 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.00569; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #153 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x55564dab00a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #153 spent 0.388 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.177 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.007549; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #214 | libevent_malloc: new ptr-libevent@0x55564dab00a8 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x7f49b80367d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #214 spent 0.382 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.048277; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #32 | libevent_malloc: new ptr-libevent@0x7f49b80367d8 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x55564da54b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #32 spent 0.247 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.057816; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #244 | libevent_malloc: new ptr-libevent@0x55564da54b18 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #244 spent 0.217 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.065255; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #154 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x55564dab17b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #154 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.066562; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #215 | libevent_malloc: new ptr-libevent@0x55564dab17b8 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x7f49ac038b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #215 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.121999; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #33 | libevent_malloc: new ptr-libevent@0x7f49ac038b78 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x7f49b8014d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #33 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.123327; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #245 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x7f49940334c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #245 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.127619; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #216 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x55564da85ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #216 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.129937; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #155 | libevent_malloc: new ptr-libevent@0x55564da85ee8 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x7f497c03e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #155 spent 0.0877 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.189212; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003839 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #217 | libevent_malloc: new ptr-libevent@0x7f497c03e3d8 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x7f49a40492e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #217 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.190494; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #246 | libevent_malloc: new ptr-libevent@0x7f49a40492e8 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x7f49b403b588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #246 spent 0.0844 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.193727; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #34 | libevent_malloc: new ptr-libevent@0x7f49b403b588 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x7f49a802dc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #34 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb998 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.197058; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #156 | libevent_malloc: new ptr-libevent@0x7f49a802dc78 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x7f498003e3c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb998 | #156 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.253424; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #218 | libevent_malloc: new ptr-libevent@0x7f498003e3c8 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x7f49a8049598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #218 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.254769; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #35 | libevent_malloc: new ptr-libevent@0x7f49a8049598 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #35 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.256075; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #247 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x55564da44d38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #247 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.258355; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #157 | libevent_malloc: new ptr-libevent@0x55564da44d38 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x7f497403e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #157 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.313689; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #219 | libevent_malloc: new ptr-libevent@0x7f497403e3d8 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x55564da88de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #219 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.316055; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004113 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #158 | libevent_malloc: new ptr-libevent@0x55564da88de8 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x7f497803e348 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #158 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.316235; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #36 | libevent_malloc: new ptr-libevent@0x7f497803e348 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x7f497402dc58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #36 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.319564; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f497402dc58 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #248 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.372834; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #220 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x55564dadfe48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #220 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.375116; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #159 | libevent_malloc: new ptr-libevent@0x55564dadfe48 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #159 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.376394; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #37 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x7f497802db68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #37 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.383719; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #249 | libevent_malloc: new ptr-libevent@0x7f497802db68 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x7f49b802b6f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #249 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8b78 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.432081; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #221 | libevent_malloc: new ptr-libevent@0x7f49b802b6f8 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x55564dae2d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8b78 | #221 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.436382; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #38 | libevent_malloc: new ptr-libevent@0x55564dae2d08 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x7f496c02dca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #38 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.439801; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #160 | libevent_malloc: new ptr-libevent@0x7f496c02dca8 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x7f49bc040dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #160 spent 0.365 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.449325; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #250 | libevent_malloc: new ptr-libevent@0x7f49bc040dd8 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x7f4988033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #250 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0533 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.498648; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #39 | libevent_malloc: new ptr-libevent@0x7f4988033358 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #39 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0331 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.510969; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #251 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #251 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.517328; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x7f498403e1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #161 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.526625; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #222 | libevent_malloc: new ptr-libevent@0x7f498403e1a8 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #222 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.559997; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #40 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #40 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 3 | retransmits: current time 10594.572294; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #252 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x7f499c03e498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | #252 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.579657; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #162 | libevent_malloc: new ptr-libevent@0x7f499c03e498 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #162 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0951 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.620073; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #223 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.624399; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #41 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #41 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.642747; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005784 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #163 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x7f4974033468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #163 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.689117; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #42 | libevent_malloc: new ptr-libevent@0x7f4974033468 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x55564da37cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #42 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.702498; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #164 | libevent_malloc: new ptr-libevent@0x55564da37cb8 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x7f499403e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #164 spent 0.236 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0918 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.719964; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #224 | libevent_malloc: new ptr-libevent@0x7f499403e548 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #224 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.750234; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #43 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x55564da39438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #43 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.763532; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #165 | libevent_malloc: new ptr-libevent@0x55564da39438 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x7f499803e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #165 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.812746; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #44 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x55564da39558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #44 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.814082; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #225 | libevent_malloc: new ptr-libevent@0x55564da39558 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #225 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.832414; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #166 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #166 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.872803; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #45 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x55564da6a748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #45 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.890068; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #226 | libevent_malloc: new ptr-libevent@0x55564da6a748 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x55564daecfc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #226 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.890234; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #167 | libevent_malloc: new ptr-libevent@0x55564daecfc8 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x7f49a4043ad8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #167 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.934612; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f49a4043ad8 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x55564da3f0f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #46 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0511 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10594.950926; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564da3f0f8 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #168 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10594.961208; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002998 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #227 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x7f49a0028218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #227 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10594.992585; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #47 | libevent_malloc: new ptr-libevent@0x7f49a0028218 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x55564da10928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #47 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.026914; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #228 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x55564da40808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #228 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.028264; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564da40808 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x55564dac4448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #169 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.05457; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #48 | libevent_malloc: new ptr-libevent@0x55564dac4448 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x55564da120a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #48 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.088 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.090996; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005611 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #229 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x55564daf15d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #229 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.104536; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #170 | libevent_malloc: new ptr-libevent@0x55564daf15d8 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x7f49a0043be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #170 spent 0.255 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0792 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.114061; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #49 | libevent_malloc: new ptr-libevent@0x7f49a0043be8 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x55564da41f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #49 spent 0.251 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa7488 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.155598; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564da41f18 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa7488 | #230 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.171974; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #171 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x7f499c01d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #171 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.174334; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #50 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #50 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0913 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.226752; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #231 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #231 spent 0.399 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7bcf8 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.233349; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #51 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x7f498c033248 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7bcf8 | #51 spent 0.089 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.234598; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006321 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #172 | libevent_malloc: new ptr-libevent@0x7f498c033248 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x7f4998043b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #172 spent 0.0827 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.292843; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #232 | libevent_malloc: new ptr-libevent@0x7f4998043b28 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #232 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.29414; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005167 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #173 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x7f498c043b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #173 spent 0.0911 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.294247; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f498c043b98 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x7f49900332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #52 spent 0.0685 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0371 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.35554; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f49900332f8 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x7f49840331d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | #53 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0486 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.356805; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #174 | libevent_malloc: new ptr-libevent@0x7f49840331d8 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #174 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.35697; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #233 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #233 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.413341; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #175 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x55564dacba18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #175 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0931 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.422773; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #234 | libevent_malloc: new ptr-libevent@0x55564dacba18 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x7f49b003e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #234 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0819 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.4432; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #54 | libevent_malloc: new ptr-libevent@0x7f49b003e2b8 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #54 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.473569; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005038 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #176 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x55564dacd198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #176 spent 0.187 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0879 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.48699; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004738 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #235 | libevent_malloc: new ptr-libevent@0x55564dacd198 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x55564dac4528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #235 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.50633; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #55 | libevent_malloc: new ptr-libevent@0x55564dac4528 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x55564da61c08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #55 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0809 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.535768; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #177 | libevent_malloc: new ptr-libevent@0x55564da61c08 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x7f499c043ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #177 spent 0.211 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0907 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.550231; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #236 | libevent_malloc: new ptr-libevent@0x7f499c043ca8 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #236 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0831 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.563593; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #56 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #56 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0849 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.61501; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #237 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x7f496c038d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #237 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.624389; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #178 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #178 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.624507; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #57 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #57 spent 0.0791 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.678847; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #238 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x55564da4c0a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #238 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da875f8 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.710273; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564da4c0a8 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x55564da43628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da875f8 | #58 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0996 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.715762; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #179 | libevent_malloc: new ptr-libevent@0x55564da43628 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #179 spent 0.214 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.740241; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #239 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #239 spent 0.231 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.099 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.0039 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.793811; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #59 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | #59 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.799134; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #180 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x55564da7a5e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #180 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.802445; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564da7a5e8 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x55564daaa3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #240 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0559 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.851795; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #60 | libevent_malloc: new ptr-libevent@0x55564daaa3f8 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x55564da802a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #60 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0781 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.859193; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005704 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #181 | libevent_malloc: new ptr-libevent@0x55564da802a8 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x55564dad5c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #181 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0776 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.868593; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564dad5c68 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x7f496c033518 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #241 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10595.911953; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #61 | libevent_malloc: new ptr-libevent@0x7f496c033518 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x55564da819b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #61 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.921282; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #182 | libevent_malloc: new ptr-libevent@0x55564da819b8 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #182 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.932572; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #242 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x55564dad73e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #242 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10595.979866; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005978 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564dad73e8 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #183 spent 0.456 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10595.994499; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #243 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x55564da26698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #243 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0873 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.001913; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #62 | libevent_malloc: new ptr-libevent@0x55564da26698 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #62 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0838 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.037334; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #184 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #184 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.058658; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #244 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x55564da54b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #244 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0508 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.088936; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #63 | libevent_malloc: new ptr-libevent@0x55564da54b18 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #63 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0517 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.096315; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #185 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #185 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.124616; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #245 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x7f49b8014d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #245 spent 0.241 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0992 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.155116; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005338 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #64 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #64 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0795 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.171529; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #186 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #186 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.191848; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #246 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x7f49a40492e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #246 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.215141; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #65 | libevent_malloc: new ptr-libevent@0x7f49a40492e8 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x55564da87668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #65 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.257479; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #247 | libevent_malloc: new ptr-libevent@0x55564da87668 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #247 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0766 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.264802; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #187 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #187 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.278103; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #66 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x7f49a8038c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | #66 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.320415; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f49a8038c48 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x7f497402dc58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #248 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.323764; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #188 | libevent_malloc: new ptr-libevent@0x7f497402dc58 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x7f499c0494b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #188 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da92e98 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.335081; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #67 | libevent_malloc: new ptr-libevent@0x7f499c0494b8 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x7f499c038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da92e98 | #67 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.383423; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #189 | libevent_malloc: new ptr-libevent@0x7f499c038c28 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x7f49a00493f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #189 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.384727; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #249 | libevent_malloc: new ptr-libevent@0x7f49a00493f8 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x7f497802db68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #249 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da95d68 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.400013; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #68 | libevent_malloc: new ptr-libevent@0x7f497802db68 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x7f49a0038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da95d68 | #68 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.442306; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da95d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f49a0038b68 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #190 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.450643; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #250 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x7f49bc040dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #250 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0344 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.455923; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003868 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f49bc040dd8 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x7f4994038cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #69 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.502239; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #191 | libevent_malloc: new ptr-libevent@0x7f4994038cd8 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x55564dae4488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #191 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.512532; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004143 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #251 | libevent_malloc: new ptr-libevent@0x55564dae4488 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #251 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.517898; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #70 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #70 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 4 | retransmits: current time 10596.573264; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #252 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #252 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.575622; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #192 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #192 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.576992; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #71 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x7f498c038ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #71 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.634323; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f498c038ab8 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x7f4990038b08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | #72 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.635604; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #193 | libevent_malloc: new ptr-libevent@0x7f4990038b08 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x55564dae72a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #193 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.69489; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #194 | libevent_malloc: new ptr-libevent@0x55564dae72a8 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x55564dae89b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #194 spent 0.422 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.695319; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #73 | libevent_malloc: new ptr-libevent@0x55564dae89b8 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x7f4984038938 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #73 spent 0.0742 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0365 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.754613; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #195 | libevent_malloc: new ptr-libevent@0x7f4984038938 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x55564daea0c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #195 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.769931; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #74 | libevent_malloc: new ptr-libevent@0x55564daea0c8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #74 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.816269; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x7f496c043d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #196 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.826627; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #75 | libevent_malloc: new ptr-libevent@0x7f496c043d48 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x55564da92f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #75 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.877905; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #197 | libevent_malloc: new ptr-libevent@0x55564da92f08 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x55564da8a4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #197 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.910192; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #76 | libevent_malloc: new ptr-libevent@0x55564da8a4f8 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #76 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10596.937491; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #198 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x55564da8bc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #198 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10596.972797; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #77 | libevent_malloc: new ptr-libevent@0x55564da8bc08 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x7f499c0333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #77 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.000155; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #199 | libevent_malloc: new ptr-libevent@0x7f499c0333b8 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #199 spent 0.0958 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.031427; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #78 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x7f49a4022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #78 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.058826; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005211 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #200 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #200 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.091113; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #79 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x55564da9a3e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #79 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0874 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.117476; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #201 | libevent_malloc: new ptr-libevent@0x55564da9a3e8 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x55564da137b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #201 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.153835; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006814 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #80 | libevent_malloc: new ptr-libevent@0x55564da137b8 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x55564da9a308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #80 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.177134; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004816 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #202 | libevent_malloc: new ptr-libevent@0x55564da9a308 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #202 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.243483; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006816 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #81 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x7f49b00282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #81 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.265769; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #203 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x55564da9e8d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #203 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0753 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.301177; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564da9e8d8 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x55564da2daf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #82 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.326554; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #204 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x7f49ac03e388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #204 spent 0.362 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.36311; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #83 | libevent_malloc: new ptr-libevent@0x7f49ac03e388 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #83 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.386379; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #205 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #205 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.448675; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #206 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x7f49a4038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #206 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.452004; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #84 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #84 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.505365; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #207 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x55564da34f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #207 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.53564; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005848 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #85 | libevent_malloc: new ptr-libevent@0x55564da34f78 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x7f4994028448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #85 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.566037; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #208 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x7f4994017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #208 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.595502; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #86 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #86 spent 0.431 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.628386; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #209 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x7f49a003e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #209 spent 0.226 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.656813; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #87 | libevent_malloc: new ptr-libevent@0x7f49a003e3d8 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #87 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.688128; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #210 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #210 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.722468; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #88 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #88 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.747751; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #211 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #211 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.813159; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #89 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x7f49b0033238 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #89 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.829516; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006038 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #212 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x55564da51dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #212 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.890832; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564da51dd8 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x55564daad218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #90 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10597.92112; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564daad218 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x55564da26778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #213 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10597.975494; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #91 | libevent_malloc: new ptr-libevent@0x55564da26778 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #91 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.008847; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #214 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x55564dab00a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #214 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.057119; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #92 | libevent_malloc: new ptr-libevent@0x55564dab00a8 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #92 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.067514; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #215 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x55564dab17b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #215 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.12883; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #216 | libevent_malloc: new ptr-libevent@0x55564dab17b8 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x7f49940334c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #216 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.149168; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #93 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x55564da57968 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #93 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.190442; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #217 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x7f497c03e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #217 spent 0.357 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.240948; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #94 | libevent_malloc: new ptr-libevent@0x7f497c03e3d8 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #94 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb998 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.254237; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #218 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x7f498003e3c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb998 | #218 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.314529; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #219 | libevent_malloc: new ptr-libevent@0x7f498003e3c8 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x7f497403e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #219 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.319938; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #95 | libevent_malloc: new ptr-libevent@0x7f497403e3d8 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #95 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.374277; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #220 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #220 spent 0.2 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0825 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.380733; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #96 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #96 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.433085; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003539 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #221 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x7f49b802b6f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #221 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.441414; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f49b802b6f8 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x55564daa2ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #97 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0812 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.503849; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #98 | libevent_malloc: new ptr-libevent@0x55564daa2ee8 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x55564daba2f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #98 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.52718; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #222 | libevent_malloc: new ptr-libevent@0x55564daba2f8 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x7f498403e1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #222 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0798 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.562588; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #99 | libevent_malloc: new ptr-libevent@0x7f498403e1a8 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x55564dabba78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #99 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0805 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.620989; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564dabba78 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #223 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.621124; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #100 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #100 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.681553; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #101 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #101 spent 0.57 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.721606; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #224 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x7f499403e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #224 spent 0.214 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.740074; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #102 | libevent_malloc: new ptr-libevent@0x7f499403e548 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x7f49ac043b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #102 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.802429; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #103 | libevent_malloc: new ptr-libevent@0x7f49ac043b98 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x55564da91708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #103 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.815819; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #225 | libevent_malloc: new ptr-libevent@0x55564da91708 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x55564da39558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #225 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0826 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.868267; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #104 | libevent_malloc: new ptr-libevent@0x55564da39558 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x7f49a8028468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #104 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0888 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.891719; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00701 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #226 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x55564da6a748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #226 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.929006; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #105 | libevent_malloc: new ptr-libevent@0x55564da6a748 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #105 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10598.962301; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #227 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #227 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd128 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10598.987599; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #106 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x7f49a8043d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd128 | #106 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.028923; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006626 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #228 | libevent_malloc: new ptr-libevent@0x7f49a8043d28 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x55564da10928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #228 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.047222; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #107 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x55564da98cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #107 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.092613; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #229 | libevent_malloc: new ptr-libevent@0x55564da98cd8 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x55564da120a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #229 spent 0.356 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.107258; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #108 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #108 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0511 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.156591; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x55564da41f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #230 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad16c8 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.167936; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006686 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #109 | libevent_malloc: new ptr-libevent@0x55564da41f18 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x7f4994043db8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad16c8 | #109 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.22724; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #231 | libevent_malloc: new ptr-libevent@0x7f4994043db8 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #231 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.241632; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #110 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x55564da9d1c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #110 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.295026; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #232 | libevent_malloc: new ptr-libevent@0x55564da9d1c8 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x7f4998043b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #232 spent 0.423 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.317941; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #111 | libevent_malloc: new ptr-libevent@0x7f4998043b28 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x55564daca298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #111 spent 0.609 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.325 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.359142; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006409 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #233 | libevent_malloc: new ptr-libevent@0x55564daca298 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #233 spent 0.423 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.238 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.378051; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #112 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #112 spent 0.415 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.423983; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #234 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x55564dacba18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #234 spent 0.604 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.334 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.438159; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #113 | libevent_malloc: new ptr-libevent@0x55564dacba18 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #113 spent 0.296 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.488754; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #235 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x55564dacd198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #235 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad8af8 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.4951; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #114 | libevent_malloc: new ptr-libevent@0x55564dacd198 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad8af8 | #114 spent 0.0884 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.551362; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #236 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x7f499c043ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #236 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada278 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.556641; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005701 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #115 | libevent_malloc: new ptr-libevent@0x7f499c043ca8 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x7f497c043c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada278 | #115 spent 0.0885 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.616908; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006196 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada278 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #237 | libevent_malloc: new ptr-libevent@0x7f497c043c48 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #237 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dada198 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.617062; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #116 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada198 | #116 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadb918 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.675416; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #117 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x55564dabfec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadb918 | #117 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.680716; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadb918 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #238 | libevent_malloc: new ptr-libevent@0x55564dabfec8 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #238 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.741012; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #239 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #239 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.755354; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #118 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #118 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.803711; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x55564da7a5e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #240 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.81405; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #119 | libevent_malloc: new ptr-libevent@0x55564da7a5e8 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | #119 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.869326; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004281 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x55564dad5c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #241 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.876599; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #120 | libevent_malloc: new ptr-libevent@0x55564dad5c68 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x7f49bc046648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #120 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.933957; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #242 | libevent_malloc: new ptr-libevent@0x7f49bc046648 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #242 spent 0.0974 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dae2c98 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.93408; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #121 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x7f49b40465a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae2c98 | #121 spent 0.0694 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10599.995398; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae2c98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #243 | libevent_malloc: new ptr-libevent@0x7f49b40465a8 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #243 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10599.997783; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #122 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x7f49b8046fb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #122 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.059045; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #244 | libevent_malloc: new ptr-libevent@0x7f49b8046fb8 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #244 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.062337; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #123 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x7f49ac0493a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | #123 spent 0.086 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.121597; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #124 | libevent_malloc: new ptr-libevent@0x7f49ac0493a8 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x7f49b0049338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #124 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0739 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.12498; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #245 | libevent_malloc: new ptr-libevent@0x7f49b0049338 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #245 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.182275; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #125 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x55564dadd108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #125 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.193554; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #246 | libevent_malloc: new ptr-libevent@0x55564dadd108 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #246 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.242823; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #126 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x55564dade818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #126 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.258134; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #247 | libevent_malloc: new ptr-libevent@0x55564dade818 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x55564da87668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #247 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.301464; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005998 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564da87668 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x55564dadff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #127 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.321818; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004829 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #248 | libevent_malloc: new ptr-libevent@0x55564dadff28 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x7f49a8038c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | #248 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.362204; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #128 | libevent_malloc: new ptr-libevent@0x7f49a8038c48 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #128 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.385513; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005118 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #249 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x7f49a00493f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #249 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.422813; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #129 | libevent_malloc: new ptr-libevent@0x7f49a00493f8 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #129 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.451115; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00435 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #250 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #250 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.511403; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x7f4998049398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #130 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.513681; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #251 | libevent_malloc: new ptr-libevent@0x7f4998049398 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x55564dae4488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #251 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 5 | retransmits: current time 10600.574075; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #252 | libevent_malloc: new ptr-libevent@0x55564dae4488 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #252 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.607428; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #131 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #131 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.668819; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #132 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #132 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.732193; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #133 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #133 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.794503; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #134 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #134 spent 0.621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.851406; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00479 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #135 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x55564da0c408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #135 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.912778; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #136 | libevent_malloc: new ptr-libevent@0x55564da0c408 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x7f499c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #136 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10600.970157; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #137 | libevent_malloc: new ptr-libevent@0x7f499c0282d8 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #137 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.06254; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x7f49a00332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #138 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.128808; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #139 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #139 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.189155; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #140 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #140 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.259533; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #141 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #141 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da51d68 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.324922; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #142 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x7f49b402acf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da51d68 | #142 spent 0.56 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.386697; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #143 | libevent_malloc: new ptr-libevent@0x7f49b402acf8 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #143 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.447076; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #144 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | libevent_free: release ptr-libevent@0x55564da17d58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #144 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.507459; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #145 | libevent_malloc: new ptr-libevent@0x55564da17d58 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #145 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.568807; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #146 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x7f49800333a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #146 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.626099; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #147 | libevent_malloc: new ptr-libevent@0x7f49800333a8 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x55564da8d358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #147 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.699437; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #148 | libevent_malloc: new ptr-libevent@0x55564da8d358 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x55564da4d778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #148 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.76477; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008287 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #149 | libevent_malloc: new ptr-libevent@0x55564da4d778 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #149 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.82208; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #150 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #150 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.881399; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #151 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #151 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10601.948689; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #152 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x7f497c028398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #152 spent 0.358 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.006254; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #153 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #153 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.066548; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #154 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #154 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.131942; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #155 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x55564da85ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #155 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.198245; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #156 | libevent_malloc: new ptr-libevent@0x55564da85ee8 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x7f49a802dc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #156 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.259624; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006315 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #157 | libevent_malloc: new ptr-libevent@0x7f49a802dc78 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x55564da44d38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #157 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.31695; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #158 | libevent_malloc: new ptr-libevent@0x55564da44d38 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x55564da88de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #158 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.376258; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #159 | libevent_malloc: new ptr-libevent@0x55564da88de8 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x55564dadfe48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #159 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.440572; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #160 | libevent_malloc: new ptr-libevent@0x55564dadfe48 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x7f496c02dca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #160 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.51886; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #161 | libevent_malloc: new ptr-libevent@0x7f496c02dca8 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #161 spent 0.0963 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.580192; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006247 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #162 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x7f499c03e498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | #162 spent 0.319 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.643677; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #163 | libevent_malloc: new ptr-libevent@0x7f499c03e498 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #163 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.702997; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #164 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x55564da37cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #164 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.764307; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00477 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #165 | libevent_malloc: new ptr-libevent@0x55564da37cb8 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x55564da39438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #165 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.833623; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #166 | libevent_malloc: new ptr-libevent@0x55564da39438 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #166 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.891911; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #167 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x55564daecfc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #167 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10602.952215; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564daecfc8 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x55564da3f0f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #168 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.029513; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564da3f0f8 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x55564da40808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #169 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.105811; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #170 | libevent_malloc: new ptr-libevent@0x55564da40808 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x55564daf15d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #170 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa7488 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.173171; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #171 | libevent_malloc: new ptr-libevent@0x55564daf15d8 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa7488 | #171 spent 0.48 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7bcf8 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.23584; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #172 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x7f498c033248 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7bcf8 | #172 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.295128; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #173 | libevent_malloc: new ptr-libevent@0x7f498c033248 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #173 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.358442; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #174 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x7f49840331d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | #174 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.414781; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #175 | libevent_malloc: new ptr-libevent@0x7f49840331d8 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #175 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.474171; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #176 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #176 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.536487; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #177 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x55564da61c08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #177 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.625811; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #178 | libevent_malloc: new ptr-libevent@0x55564da61c08 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x7f496c038d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #178 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da875f8 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.716142; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #179 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x55564da43628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da875f8 | #179 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.800752; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #180 | libevent_malloc: new ptr-libevent@0x55564da43628 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | #180 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.86024; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #181 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x55564da802a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #181 spent 0.367 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.181 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.922984; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #182 | libevent_malloc: new ptr-libevent@0x55564da802a8 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x55564da819b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #182 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0753 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10603.981496; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564da819b8 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x55564dad73e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #183 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.038783; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005682 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #184 | libevent_malloc: new ptr-libevent@0x55564dad73e8 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #184 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.097062; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #185 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #185 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.172377; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #186 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #186 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.266731; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #187 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #187 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0559 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.324068; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #188 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x7f497402dc58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #188 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da92e98 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.384453; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #189 | libevent_malloc: new ptr-libevent@0x7f497402dc58 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x7f499c038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da92e98 | #189 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da95d68 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.443928; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f499c038c28 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x7f49a0038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da95d68 | #190 spent 0.35 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.17 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.503726; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da95d68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #191 | libevent_malloc: new ptr-libevent@0x7f49a0038b68 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x7f4994038cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #191 spent 0.3 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.576392; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #192 | libevent_malloc: new ptr-libevent@0x7f4994038cd8 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #192 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0823 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.636831; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #193 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x7f4990038b08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | #193 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0881 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.696303; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #194 | libevent_malloc: new ptr-libevent@0x7f4990038b08 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x55564dae72a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #194 spent 0.368 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.755859; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #195 | libevent_malloc: new ptr-libevent@0x55564dae72a8 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x7f4984038938 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #195 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.817182; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #196 | libevent_malloc: new ptr-libevent@0x7f4984038938 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #196 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.879481; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #197 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x55564da92f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #197 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10604.938927; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #198 | libevent_malloc: new ptr-libevent@0x55564da92f08 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #198 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.001273; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #199 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x7f499c0333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #199 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.060573; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #200 | libevent_malloc: new ptr-libevent@0x7f499c0333b8 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x7f49a4022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #200 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.118811; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #201 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x55564da9a3e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #201 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.178114; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005796 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #202 | libevent_malloc: new ptr-libevent@0x55564da9a3e8 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x55564da9a308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #202 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.266518; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564da9a308 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x7f49b00282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #203 spent 0.312 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.327038; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #204 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x55564da2daf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #204 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.387451; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #205 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #205 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.449744; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #206 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #206 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.506146; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #207 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #207 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.567601; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #208 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x7f4994028448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #208 spent 0.475 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.629736; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #209 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #209 spent 0.565 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.323 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.689868; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #210 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #210 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0886 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.748288; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #211 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #211 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.830648; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #212 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x7f49b0033238 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #212 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10605.922087; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.002973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #213 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x55564daad218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #213 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.010587; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #214 | libevent_malloc: new ptr-libevent@0x55564daad218 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #214 spent 0.609 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.293 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.068714; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #215 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #215 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.130051; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #216 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x55564dab17b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #216 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.19137; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #217 | libevent_malloc: new ptr-libevent@0x55564dab17b8 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x55564da57968 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #217 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.255688; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #218 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #218 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb998 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.315048; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #219 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x7f498003e3c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb998 | #219 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.375369; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #220 | libevent_malloc: new ptr-libevent@0x7f498003e3c8 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #220 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.434674; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #221 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #221 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.00305 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.528068; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #222 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x55564daba2f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #222 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.622389; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005066 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #223 | libevent_malloc: new ptr-libevent@0x55564daba2f8 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564dabba78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #223 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.722951; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #224 | libevent_malloc: new ptr-libevent@0x55564dabba78 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #224 spent 1.53 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.33 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.818085; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #225 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x55564da91708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #225 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.89243; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007721 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #226 | libevent_malloc: new ptr-libevent@0x55564da91708 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x7f49a8028468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #226 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10606.963731; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #227 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #227 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd128 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.030087; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #228 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x7f49a8043d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd128 | #228 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.093394; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #229 | libevent_malloc: new ptr-libevent@0x7f49a8043d28 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x55564da98cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #229 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.157739; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #230 | libevent_malloc: new ptr-libevent@0x55564da98cd8 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #230 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad16c8 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.228186; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #231 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x7f4994043db8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad16c8 | #231 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.296725; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #232 | libevent_malloc: new ptr-libevent@0x7f4994043db8 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x55564da9d1c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #232 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.360086; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #233 | libevent_malloc: new ptr-libevent@0x55564da9d1c8 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x55564daca298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #233 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.425486; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00763 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #234 | libevent_malloc: new ptr-libevent@0x55564daca298 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #234 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.489803; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #235 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #235 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad8af8 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.552106; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #236 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad8af8 | #236 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada278 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.618487; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #237 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x7f497c043c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada278 | #237 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadb918 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.681814; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada278 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #238 | libevent_malloc: new ptr-libevent@0x7f497c043c48 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x55564dabfec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadb918 | #238 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.742304; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadb918 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #239 | libevent_malloc: new ptr-libevent@0x55564dabfec8 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #239 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.804654; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #240 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0718 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.870059; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | #241 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.935424; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #242 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x7f49bc046648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #242 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10607.982667; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f49bc046648 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 55 d3 40 9a 61 f2 ca 7a 8e dd ef 59 1c fa 18 | 1c 15 3f 74 72 09 6c 08 54 7f 67 02 09 17 a5 94 | e6 59 bd 99 53 79 72 14 47 72 31 c3 eb 4d f0 5f | 5a c6 5f f1 b1 e9 a5 05 50 40 52 e1 5c 4f 09 f1 | d5 b0 7c bc a3 c8 29 32 fe 4e 3e 50 7c 33 07 ae | bd 47 d3 72 ae 1b bd 6b a0 31 a4 1b 9c 76 1e 3f | cf e7 36 6f b6 13 09 75 24 20 36 fb 1c b5 53 6e | a8 bc 95 a8 e5 f6 f4 52 f0 96 86 dc 1a bd 11 cb | 6b 89 cf d1 21 66 ad b8 5a 4c 98 34 b1 3e 31 51 | 53 20 c1 80 cf ab a2 bd e2 c5 c9 3b 03 a1 5a 2f | a4 f4 87 3d 55 57 3a a3 8c 4e 2c 24 a0 dd e3 52 | 2c 08 89 32 55 d7 72 4a aa 70 0d 4d be ca 8f 9e | 5c 69 ec f9 69 1d 7a e3 b2 a1 e9 00 e1 12 6a 65 | 40 18 2c d4 fc d5 53 c6 9c 0b 08 60 f6 03 fd f9 | 55 5f 2a 93 0e 9a f0 89 27 7b f7 3a f0 64 cc 66 | 33 d1 0e f5 08 d4 62 21 b6 9d 87 22 bb 4f 6d 87 | 29 00 00 24 52 f8 1d 97 6f 3d 14 b1 ac 7d ae 31 | 6c 81 ec d5 82 da 0b 53 85 2a b4 64 c0 69 04 b8 | 1b 02 ce 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 76 d5 f8 8f f9 99 c1 4f fd 09 53 | 9b 62 8c c8 8d be 28 30 00 00 00 1c 00 00 40 05 | 7f f5 3a 4a 6c 04 b5 1e cb da 09 1b 58 8a f9 bc | 3c f2 9d 21 | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #1 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 0b 50 11 31 32 5e 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 0e 0b 50 11 31 32 5e 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae2c98 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10607.995985; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #243 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x7f49b40465a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae2c98 | #243 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.060363; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae2c98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #244 | libevent_malloc: new ptr-libevent@0x7f49b40465a8 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x7f49b8046fb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #244 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.103688; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f49b8046fb8 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 06 92 03 be 4b 92 42 29 97 42 e7 bf c9 89 7f | e0 34 d3 00 97 6a 22 1d 74 58 c2 a2 7a f5 13 77 | 86 23 82 73 ae 8d da 35 40 f8 0f 52 0c 5c 7d 91 | 75 23 bd 44 d5 61 66 db aa 73 9a ed 85 5a b0 b9 | 41 e6 ba e4 b8 8c 2c 4a c2 d6 dc 6c a7 59 54 39 | 3c bc 4d 08 02 0c de d0 8b 2f 10 c1 93 13 ff 9a | c1 97 ca 00 7b 00 ff e6 55 92 5e d2 2f 34 cd 90 | f7 fe a5 81 6b 6c 64 a5 4b 0e 21 55 d9 6b 47 df | af 3e 8f 8a 90 c7 a5 1e c3 c5 08 8c f1 b0 6f fd | 5f 60 d5 0f d7 3e 1c d3 5c be 46 ea 59 05 15 8a | b9 02 e1 0c 70 de ea ab b1 ba b6 8a e1 83 d0 22 | 85 1e 20 29 d8 e3 cd a9 e5 77 7c 98 5b 54 38 56 | 0d dc cf c0 de 58 35 8a 6b 0d 07 19 62 44 ac 48 | f5 30 c6 ea a3 b0 fc 02 4d 1a 6b 04 79 40 9c 8e | 95 d5 59 a8 17 cc b3 cc b9 78 f2 7c bd 13 52 a4 | af 8c 14 66 9d 17 98 09 cc d8 48 19 db 82 d0 34 | 29 00 00 24 60 1d 2d ae d0 87 e0 96 cd ed db 0c | db 54 9b 90 5d 21 85 aa e7 0a d6 aa 30 54 b5 fc | 4f d5 8c ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 60 d8 d8 6e 4d 05 93 47 74 48 21 | a5 43 25 86 98 1e bd 6e 00 00 00 1c 00 00 40 05 | 33 22 3b 24 3f 66 49 a9 12 dc b6 ee 05 bc bc e0 | 65 d0 e1 6f | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #2 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c b4 20 af 98 40 80 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1c b4 20 af 98 40 80 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.126084; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #245 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x7f49b0049338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #245 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.16647; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f49b0049338 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 0e f4 58 97 e0 d3 ff 1f 99 8a b8 c4 73 80 4b | ac 77 3e 80 bd 94 03 7e 87 be ad a2 b5 61 8d f8 | 74 e1 0d c5 10 a7 b9 8e 5b b6 e2 2f 83 02 5c 44 | 11 6d 6f b7 f4 30 ff 72 3e 12 89 34 04 a4 e5 e0 | 56 f4 23 73 b2 a6 f0 70 c1 f9 ea f8 41 66 b1 e2 | 34 39 23 a2 b9 05 4c fa 54 42 34 fc 5c 36 70 1f | 7b a9 c4 bb d1 c0 b4 48 9b be 7f 52 cd 47 34 36 | f2 e8 8e 8e 7a 41 f4 62 ee 11 04 1c e4 46 f3 cc | 7c 66 f2 a6 fd 12 f6 04 19 29 5b 98 76 fb 41 2e | e4 d4 09 9f d9 0c 24 f4 ab 7c cd 76 2b c6 a6 20 | e6 75 d9 cf 9a fd 0d f5 5c 5d 3c bd 71 3b ef e7 | e0 a7 a8 45 16 3c 2c 87 51 28 ca 58 c1 9e 3a 1e | 35 e7 ba 41 00 dc ca e8 b4 4f c7 53 bc c9 21 38 | be f4 41 d8 10 c9 d5 2a a1 e8 d3 36 ad b8 dd 3e | b9 aa 42 bf c4 09 1e b8 b2 06 07 2a c0 97 9c e4 | 09 20 34 1d 1d 99 09 d4 cf b8 69 f0 36 d7 f6 f1 | 29 00 00 24 a4 e4 78 f3 c8 ca d4 5e 04 73 46 c0 | 13 87 5d 17 c5 91 0a 98 e9 b4 21 77 75 45 f9 ff | c8 f7 57 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 55 00 93 34 c8 23 e9 4b 2c a4 f3 | c8 3a b3 9c 49 f1 c3 f5 00 00 00 1c 00 00 40 05 | d2 11 81 27 8b 87 bc 42 43 b1 e8 bd 58 0d 5b 01 | 61 aa 46 35 | libevent_free: release ptr-libevent@0x55564dabd188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #3 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 d5 93 4f 07 a2 cf a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 31 d5 93 4f 07 a2 cf a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.194826; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #246 | libevent_malloc: new ptr-libevent@0x55564dabd188 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x55564dadd108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #246 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.224179; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #4 | libevent_malloc: new ptr-libevent@0x55564dadd108 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 c7 58 b5 0d a8 2b 77 d3 da 56 8c 37 bf 04 6a | 8e 30 f0 14 7d b5 ae 5b 5d 9c 5c 23 de 29 ab da | 3e 3b ec 2a a4 f5 82 a9 8d 82 9a 35 8d ec 78 63 | 99 78 da d3 6a d1 9f ec dc 3a 4e 71 c5 73 46 4f | f1 be 4e ce 1e 8c fa 61 21 a8 47 19 27 dc 05 c8 | 26 5e 7b d3 49 c3 8e 81 99 aa f1 59 6e 38 8a 51 | 19 16 e9 18 ac 40 cc b9 69 9b f8 b3 a3 d5 60 26 | 20 94 21 80 94 ea 35 5c 77 e3 61 a2 4d b4 3e da | 2d 53 d9 b7 a4 af 42 fc b0 29 f4 28 3a e0 8b b8 | 88 9b f5 c8 84 50 49 fe c7 32 6a 44 2c aa 23 ed | d6 5f bc 03 2a 3c 6e 28 80 07 54 4a b9 84 5a fc | dc 32 18 91 85 88 a3 a5 2d a5 88 04 5c f6 b1 b6 | 17 86 1f 92 ba 2f d5 b0 a1 38 b4 32 29 b6 ba ec | b9 50 c0 63 f6 57 a5 28 f4 ad 57 63 f0 36 58 5f | 21 34 9c d0 b9 ba 3a fe bc 97 27 63 f3 fe b5 36 | 77 b5 63 71 d1 79 11 24 e6 fd b8 3c bc 45 15 39 | 29 00 00 24 30 64 ae 68 43 9f 7e df f1 41 a4 bc | ed c1 dd a1 59 38 e9 94 9b ba fa 21 18 4c a0 d5 | 90 15 c4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 0b 41 01 c5 b1 bc 6f 38 eb 96 e7 | b4 22 83 30 19 4d 35 91 00 00 00 1c 00 00 40 05 | a4 8f b9 e0 66 15 ac 1d 75 d5 d7 d8 82 c7 fa db | a0 00 88 af | libevent_free: release ptr-libevent@0x7f4978028358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #4 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 23 31 16 6d 91 8e 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 44 23 31 16 6d 91 8e 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.259566; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #247 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x55564dade818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #247 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.288848; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #5 | libevent_malloc: new ptr-libevent@0x55564dade818 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 03 8c 22 e6 75 f3 02 c2 13 ef 13 e4 24 3c 61 | 9c ad 75 14 c5 2a e3 af fc 06 18 f4 4d 19 63 5b | 6c 84 bb 74 5f 57 f9 32 86 72 79 6e 82 49 4d 11 | f1 1a 7c 6c d3 f4 13 79 0f a2 99 87 04 be b9 85 | 87 a3 88 30 b2 b2 1c 9b a9 d4 2c 4d e0 07 7b ce | 59 3b 00 18 d1 8f 66 a6 88 24 34 44 08 bf a1 d4 | 0a b5 44 1f d6 60 d3 cc 24 cf 9c 4e eb e7 0e 5e | f8 46 18 bc 19 e1 66 02 db b8 95 e1 b6 f3 78 03 | 72 af 88 ce 8b 6b ec 8f 1e 8a 14 86 e3 19 00 a4 | 6c fb dc 2a 28 a4 0e 95 fc 4c bf fe c8 3a 10 14 | 44 0b 52 80 14 0d 18 60 fa fe f3 4f 5f c4 0d 7b | 48 1a 30 87 8e a4 07 57 51 d9 e2 57 98 84 7d 13 | 10 f7 17 2c 17 dc 96 e7 a3 e1 07 11 1c 97 8d 31 | 9f a2 c2 bc b2 26 76 27 02 33 06 a1 08 62 ba dd | a6 74 e5 5b 22 25 bc 84 26 ea 59 c4 1c c8 6c 7b | 9d cc fb 53 eb 8f e4 de fd 7e f9 05 4a d4 85 41 | 29 00 00 24 8b bc fd 40 df 1e 6e e3 08 32 2a d7 | eb 7b 28 d9 c2 a9 6f 64 58 4f d0 11 a9 d2 a6 06 | 89 89 ac bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 a3 0d 1d dd 0f 5c 18 61 03 b7 44 | f1 4f 51 cb b3 82 1f 3f 00 00 00 1c 00 00 40 05 | e9 34 af b6 6c f1 50 7c eb 45 37 65 e5 6e 62 ea | cd 80 c3 34 | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #5 spent 0.212 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 99 7c 54 a1 e5 1c 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 9b 99 7c 54 a1 e5 1c 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0888 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.323297; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006308 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x55564dadff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #248 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.349622; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #6 | libevent_malloc: new ptr-libevent@0x55564dadff28 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 62 eb 5a 9a 4a c2 ac d0 80 76 d3 33 43 3e 4d | fa 2b 96 76 41 8c 09 6e 44 49 de 29 4b 39 92 66 | a8 de eb 3b 9d 8a 5c 39 f2 6c 9e c4 3b 84 9e 79 | 27 90 7a 83 8a 23 c7 b8 0a 4c f9 8a 54 1d ef e5 | bf 03 09 75 6f 97 06 b4 38 03 e0 19 7b 58 ee 02 | 18 97 e7 f6 23 15 07 09 01 cc d3 db 99 23 9b 1a | 29 2e b3 b8 ae ad cc 1e 48 1d 7a 4a 69 47 c7 d9 | 77 55 fe 2d b7 d5 19 3e dd 92 c7 e1 7a 82 4f 2b | 59 5a bb c1 79 97 e5 1d d2 f8 ca 2e 52 08 9f e2 | da 0d 0c cb 51 e1 88 1b ed c4 06 82 4b 8d 5b 1d | 33 a2 a3 d6 04 f8 45 bf 9b 3b 4c f8 36 b6 1f 77 | 19 45 69 19 1f 7d 1c cf 67 b1 c3 67 9b c4 cd f4 | 70 61 d1 b4 f1 31 26 e0 75 91 88 cc 6a 82 16 6a | 47 b1 ce 87 55 c6 36 e8 fe d5 13 6f fd db 17 83 | ce 0d 19 66 cd 1c b6 94 01 64 54 de a5 4f c1 ed | c4 58 17 b5 96 cd 67 ac 43 9c c7 a0 42 45 9c c3 | 29 00 00 24 73 7e a2 aa 5b ff 0d ce 71 25 6d 7a | 4c e0 1f 53 4c 00 8d 6d 60 31 41 74 58 9a c0 7e | 26 de 89 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 9c 1b c3 e8 23 81 30 ca 86 c0 9e | db 49 ba 84 78 f8 63 59 00 00 00 1c 00 00 40 05 | 64 33 26 83 bd da 53 7c 8e b8 a9 87 6d ca 5d cd | f4 d8 9b e6 | libevent_free: release ptr-libevent@0x55564da5d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #6 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 77 73 88 7f 48 49 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 63 77 73 88 7f 48 49 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0489 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.385917; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #249 | libevent_malloc: new ptr-libevent@0x55564da5d668 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #249 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.409237; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f49bc02ae48 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 b5 1c 57 67 74 9b 55 f7 5b f3 cc 9e 6d ce e4 | 1c 5c 90 83 ef de 2b c5 3e 12 c9 26 1f 97 ca 02 | 5e be 6f f8 f3 fc 45 71 d9 4d f7 87 a5 ab 23 d4 | 54 d8 21 20 48 ad 8f 5c 27 1a 89 5d 24 df 20 b5 | a2 69 8a 9b c8 6c 3d cd d1 50 71 46 46 bd 64 84 | 84 20 d8 77 1e d4 56 26 57 71 fa 8f fb 3b 06 93 | 62 45 8a 67 9b 6c 65 ca 08 80 a0 b4 44 21 9e b0 | b0 b9 76 f6 ca f2 54 89 4d 9d ad 1c c0 67 f9 90 | 10 c0 c1 5d 7a fb 03 60 a9 9a 3c ca ef 11 48 8d | 93 4d 33 c8 23 45 45 13 7f b7 f8 3f 7b 3b 99 59 | ae 7e 4a 05 30 34 1a 2f b7 6d a1 0b 0e da 3f 1c | c7 87 3d 31 a6 0f 06 c2 2f 95 69 a5 58 e4 f3 1d | 79 cd 28 e6 d9 fe 50 75 ab 53 c3 98 50 b1 b8 63 | 40 a3 01 e2 76 47 77 44 00 bb 64 98 a4 bd 8a 5c | 7b 35 b7 31 78 ad 4c bd fe 6d 33 35 ea 48 94 f0 | c9 fb 90 0d 9c 99 2f 2c 9b fd 6d 7a 3b 12 bd 4f | 29 00 00 24 19 8b 31 cd f7 43 58 52 3d 32 47 01 | 06 a7 7b e6 d2 ca 84 de d7 9b ae 0e 25 c8 00 6f | d7 24 e4 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c ac 0f 5e 36 56 a5 55 6a 4e 09 ba | 8d 02 2b 8d ef c8 3b 27 00 00 00 1c 00 00 40 05 | aa ee 97 5a 70 fa 90 67 87 0d 93 b0 9e c6 c3 24 | 98 05 27 47 | libevent_free: release ptr-libevent@0x55564da5ed78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #7 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 43 ad 24 44 6a 17 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | 48 43 ad 24 44 6a 17 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.452634; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #250 | libevent_malloc: new ptr-libevent@0x55564da5ed78 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #250 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.119 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daece78 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.475987; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4b 1a 7f 61 87 d6 21 b9 ba 85 79 67 38 20 97 | 5e cc 52 7e bc 23 b5 fc 81 ad 0a b8 b1 47 30 2d | 65 65 dd e7 fd 79 cb 3f 09 22 27 ce 03 45 af 61 | d5 08 3c 54 67 a5 d0 7c 86 29 c4 ec e2 db 18 92 | f5 74 ce 46 d4 52 2b cb 34 58 0f 70 ac 37 9c 2f | ed e9 00 c7 77 65 d3 de 6c 1d 83 ae b4 d9 34 43 | 0b 9d c2 ea 85 64 41 e7 d8 26 ef 12 e2 2a f5 19 | 64 48 71 d7 bc 8a 1e c2 ef 66 91 ba 4e a4 d8 2b | e3 89 c0 27 63 52 81 c8 da 69 22 19 57 cd a6 d7 | 1c c0 d2 fc cb 25 52 fc c1 ca 15 83 ff fc 08 6c | 8a 8f 78 c9 6b 1a 34 5e 9c 33 d1 5f b4 32 df 51 | 7f 03 b5 9a 0e 02 68 db 88 7d 32 b4 31 1f 93 7c | b3 02 be 10 bd 45 ad ba 3d c9 4f bb 39 9e 3a bd | 35 1d b4 1a 7f 50 fc 6a da 81 b0 1b bf ee d4 65 | 99 e0 04 d4 0e 86 64 ea d0 4d ea 8c f5 51 e8 b1 | 5e f7 65 22 6e 03 9f 44 72 00 2e 44 85 8b 93 34 | 29 00 00 24 22 fe 14 96 2f 46 78 90 de 11 54 57 | 76 eb 60 64 d0 32 52 72 1b ff b5 12 2c f6 09 eb | f8 54 1e 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 a8 c7 98 d8 90 87 8b 94 52 4b | 13 33 0d 58 48 4a 52 db 00 00 00 1c 00 00 40 05 | 33 ef 59 16 9b 8d 0e 23 1f f3 38 2f 67 8a 39 15 | 56 e4 cf c3 | libevent_free: release ptr-libevent@0x7f4994049628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daece78 | #8 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 75 f8 68 96 f9 41 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | f4 75 f8 68 96 f9 41 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.514374; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daece78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #251 | libevent_malloc: new ptr-libevent@0x7f4994049628 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x7f4998049398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #251 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0906 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.537873; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007363 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #9 | libevent_malloc: new ptr-libevent@0x7f4998049398 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 e9 de e7 30 d1 95 5a 32 01 7b db 71 d3 a4 32 | 1c 02 59 2d 1c 3c ad 1d 44 1b 3e 46 c0 fe a8 4b | 3f 70 aa ce 08 29 81 be 61 59 4f 71 00 f4 24 e1 | 74 3e 22 2a ee 42 28 9a d8 51 b1 f8 27 bd 03 5b | 73 d8 ec e2 64 ff 84 35 18 99 9c b1 4a 52 12 4d | fd 9a 50 0b e4 56 12 79 1f fd 78 07 3f f9 a9 39 | 35 38 3f 3b 63 bb 2d 37 7d 14 46 26 74 39 74 57 | 1f d4 8c ce ac 89 b6 2d 8a 2d 77 ac 26 2d c6 04 | 47 67 de 60 fa 25 5f a3 9b c7 91 66 ef 90 39 e9 | cb d8 ba 12 fb 8f bc 1c f8 3b 53 e5 89 73 22 9b | 20 6e 1b ae 4c 54 fa 93 db 3b 0e 9f 87 ab 4c 44 | 09 03 95 c9 13 0f 85 15 e1 bb 6c c6 03 bf 99 93 | f8 e5 cc 58 0f cc 7a 1b b7 d7 3d 94 ae ef bc fe | 51 7e f5 65 94 fa 87 39 3c 30 55 a1 49 f2 81 1c | bb 60 8e ed 9a 32 ad 6f 2c 5b b3 f9 9c 88 1a ca | b5 3e 2a 0b 20 53 b6 98 40 57 c0 00 d9 60 53 dd | 29 00 00 24 17 25 03 5a 6f 9d 7d 54 0d 80 5a 77 | 55 9b d2 68 f3 ce 9d 23 9a ca dc 6d 53 71 9b 5b | 8c f1 ad a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 53 0e ae 1e 4f ed 0c 5a be a6 46 | 06 0d 10 89 67 5a 03 69 00 00 00 1c 00 00 40 05 | fb 10 96 2e 02 25 05 d5 d6 f1 a4 54 24 37 d0 85 | 32 b8 9a cc | libevent_free: release ptr-libevent@0x55564dace8a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #9 spent 0.366 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 37 20 97 5c 24 cf 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 88 37 20 97 5c 24 cf 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.168 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 6 | retransmits: current time 10608.575633; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #252 | libevent_malloc: new ptr-libevent@0x55564dace8a8 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x55564dae4488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #252 spent 0.258 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.11 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.599268; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007598 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #10 | libevent_malloc: new ptr-libevent@0x55564dae4488 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 86 fa 37 02 5d 0a 8c 18 42 bd 69 09 77 c4 24 | 4a fe 0a 24 13 cc 50 e3 2c 35 eb 29 9b 6f 1b 15 | 42 2a 01 14 3e e6 07 b2 43 4c 92 2c 30 9f ee 46 | e2 8e b6 21 d4 71 61 45 34 f6 af d2 3c 5d 06 06 | 75 ee e1 2e 24 e0 ad 14 e8 2f e9 a8 c1 cd 8c f5 | b1 be e2 52 65 9a 38 bb 87 e5 e0 9c b8 1b 3e 6b | 13 37 bb ea 1a 7d f8 ac cb 48 e6 63 0c 08 ae ef | 44 19 00 36 a2 c7 05 c6 26 08 79 c9 9e 1f 31 b1 | 41 39 67 59 0c 18 71 83 b3 e6 8d 62 bb ab 35 c2 | fc 4b d7 b5 bc 1d 68 17 c9 76 6a 85 dd f7 d9 2f | 88 41 63 5a 21 f3 70 df 91 88 9b bc 02 46 73 f9 | 73 f7 cd d1 ad bd 65 5a ab 7a f4 9a 2f 90 80 c6 | 37 5a b0 00 31 77 13 ce d3 f5 f7 52 26 78 7e ca | 22 5f b2 02 79 88 41 e8 5f 93 13 11 27 23 0e 0e | e8 cd 75 3d c6 c1 d9 7d c0 2d 74 ff aa 8e 0d 5d | 03 ba fa 46 ae d8 93 ff 5e b0 a2 cd 61 d4 59 93 | 29 00 00 24 d6 88 03 ec b5 b0 45 47 2e 11 bd 3d | f9 6d 69 a4 fe 88 0b fa f4 56 4b ee dc f4 56 25 | 9e d8 bf 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 1b 08 d7 42 23 87 5c 84 35 89 f0 | ee 0b 6a f8 c9 85 ae e1 00 00 00 1c 00 00 40 05 | 9a 66 e9 18 59 ae 94 c5 0a 64 7d bc be fd bc c8 | 2b 9b 6f ef | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #10 spent 0.249 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 30 fe d5 ce 66 c7 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 4b 30 fe d5 ce 66 c7 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.109 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.660805; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #11 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 47 f2 f7 17 b4 a2 6c 80 af 7a f7 1b 3c 0e bb | 9e a1 f7 44 02 58 61 c2 5a 53 67 30 96 84 82 9c | cc e4 d9 a2 b8 4f a8 69 fe b0 26 da a9 9e f8 c3 | 76 ff ee 2a c3 c6 46 9c e3 71 28 06 b8 45 8a 57 | 04 2c 14 2c 45 97 30 01 c9 9e 18 13 49 c4 12 fd | ea 02 b4 94 0a 12 cb 54 8c 53 97 a4 fd b3 96 92 | 38 b2 fe 32 36 dd 73 0d 1e e8 f1 19 4e 0e 77 21 | a8 b3 f0 f5 7f ed 7c 6b b0 98 0f 5b 57 95 4a d8 | 58 14 48 43 4f e8 4b cc 6c 58 7e 31 2f c3 7a 8e | 81 65 17 8c 38 25 51 fd 5a 09 09 3b c8 c9 60 83 | 12 97 b7 71 48 f9 a6 f8 91 58 ff c8 2e 8d 5c 19 | 68 aa 16 96 df 05 41 52 c4 c7 56 3e ee d9 a6 e8 | 1b 93 fb ee a1 c3 ce ab bc 93 45 03 24 50 fd fa | 55 34 de 2e 15 a5 34 7c 6a f3 0e ca 2d 32 4d a7 | 9b 78 37 59 d4 7b f8 85 96 bd aa 51 82 b8 d9 7f | d4 a6 06 7f ed dc fd e8 b8 35 dd ec fb 81 98 44 | 29 00 00 24 7a f3 75 60 66 56 71 a7 70 d7 5a 89 | 75 ee 92 7f 8e 1d 3a 50 cb 85 47 49 78 54 90 ba | 66 22 fa 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 57 db d5 0d 9a 00 00 82 d9 0b 3e | 64 31 13 43 2a 69 0c 49 00 00 00 1c 00 00 40 05 | d5 62 6a 9a 95 1a 3a 32 ed f0 36 3d b7 a0 87 99 | 2f d0 27 26 | libevent_free: release ptr-libevent@0x55564daabb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #11 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 44 09 cd 4c e3 4e b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | 2c 44 09 cd 4c e3 4e b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.717128; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #12 | libevent_malloc: new ptr-libevent@0x55564daabb08 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae c1 f4 70 1c 8e 34 a1 17 aa f7 55 29 ac 73 63 | 26 ed 0d 4b f4 19 bd 3b ff ed 7b 7b d3 f0 78 6b | a2 f7 fd 26 bf bc b5 ef 3a 32 45 3b 41 56 45 f5 | 9f 03 af 40 76 a3 37 bd 79 4b 23 6d 07 63 e8 ad | ee 07 d8 56 89 c3 85 bd b1 26 f6 73 88 c2 a8 bf | b8 b7 de ef cc 80 b3 16 f8 af 71 7d 74 30 84 13 | 76 c3 19 3e 16 6f 53 93 72 a2 5e a9 d4 64 8c 0f | 35 4c e5 8c f9 04 fb 21 f8 1a d9 f1 44 11 97 de | 5a cb b1 31 16 fb d5 0a 4c 04 33 02 f1 a2 51 0c | d4 ec af fc cc 81 06 77 6c 23 e7 e7 cc ed 22 77 | c3 85 e8 83 b5 51 8e 66 26 3f ce 2d ce 71 34 34 | 0f 0b 2c c7 aa 1f af fe c3 2f 52 9c 2b 65 2f c3 | c6 cb 68 7e 37 5d 4e a9 17 21 a1 4d 5d e9 73 cb | 68 51 03 66 cb d6 f9 5b 47 cc 3f 2c 46 6d 85 13 | 0a 0e e6 fa d5 f9 2c 9d 21 b2 d4 c7 84 8a 89 a2 | 27 8d 88 dc 4e 6c a8 95 f4 7f 4b 27 f4 59 e7 f9 | 29 00 00 24 9d 83 b2 bf 51 36 eb d3 f9 62 39 c9 | 18 72 d4 58 63 dc a1 84 f1 52 4a 7c fa 81 c1 f8 | 00 a5 9f 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 db 5f 1d c1 e9 73 c1 83 a8 70 2a | a8 1c 5b 75 8e e0 fa 5f 00 00 00 1c 00 00 40 05 | 0b 70 b0 49 93 97 ff 36 6d 98 58 e5 dc 9f ac cf | f1 0d df 32 | libevent_free: release ptr-libevent@0x55564dabe898 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #12 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 b1 94 f0 05 96 29 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e4 b1 94 f0 05 96 29 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.77743; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005745 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #13 | libevent_malloc: new ptr-libevent@0x55564dabe898 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 34 21 60 f7 2a 43 8b 8f f3 49 78 2f e1 e8 25 | 77 4b 24 37 8c f9 7d 6a 11 4c 36 ee 8a a0 6b 78 | a1 16 d2 bb 48 0f ac 0f 74 7f 33 8f f3 e1 89 8e | e3 73 ad 4b 6c e7 ae 43 21 1d d3 35 0a 9a cb 0c | 02 1b 15 7b b9 2e 07 73 d3 1c e4 3b 0a 82 3e da | ff 29 0f 2d 65 a4 7a af 20 ac 58 e4 5f 7a d7 70 | e8 fc 6d 81 87 ab b7 5c d6 d0 b3 3a 33 ff b1 85 | cd ec b9 e2 65 03 77 9c 4a c1 47 06 7f 96 ea 18 | 4c e3 f9 c8 5d 49 5f b6 15 e6 fb 07 77 21 e5 a4 | 2b 96 ed 9d b2 b0 95 0f e2 8d b0 22 b5 82 e1 28 | bf 7b 07 28 9b 25 8c 4a 97 77 52 5b 68 0d 65 f9 | 59 c6 6f af fd 7b cf 3f 3c 98 66 57 90 2e 15 0b | f5 7c 4f 44 ef a4 16 49 c8 99 71 ec 1c 7e 77 87 | ff 9b fb be c0 92 16 9b a0 d7 0d 35 67 5a c4 46 | bb 1f d1 88 c9 24 c0 7e db 50 97 c1 b9 4f e5 88 | f9 92 ba aa eb 40 f1 7f c2 d0 4f d5 d2 db df 11 | 29 00 00 24 08 93 01 0f a3 59 2c 4d 78 d3 13 f6 | 7d 75 79 b5 fc 1c 1e 62 31 2d 27 60 46 ee fa be | 98 ef b7 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b fb 29 31 96 cf 0e d6 4f 05 01 91 | df e5 ef 5f ed 14 6b d5 00 00 00 1c 00 00 40 05 | 52 dc 35 c0 d9 d0 f8 2e 10 ae 5d be 9b 1b 9e 7c | 6a 65 67 4c | libevent_free: release ptr-libevent@0x55564dabffa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #13 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 87 d8 e1 56 1c 03 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 3b 87 d8 e1 56 1c 03 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.837744; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #14 | libevent_malloc: new ptr-libevent@0x55564dabffa8 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 13 40 34 fc 7e 0c 91 e6 46 fe 18 5d 29 b3 79 | 58 5b 45 5c 92 f6 15 1c fd a8 11 14 26 0c ac 84 | e4 0b 8f 1f 76 28 a9 85 25 43 8b 09 f2 a7 3a 21 | 6f b4 b3 75 63 de 07 a0 6e 93 85 74 e5 06 1c b4 | 39 4b f9 60 a2 b5 0a aa 40 99 17 09 5a 19 b9 4f | bb ea 7f ab 17 ae 50 10 72 25 f6 2d 93 8a f9 0a | aa 95 31 91 69 32 75 21 e0 3e 34 b0 37 a5 e1 0e | 24 62 df c3 96 8e 90 44 42 c7 56 de 45 fe 81 de | 86 45 32 0c f1 09 b1 c1 28 65 3f 68 20 2f 71 da | c1 29 b9 64 75 5b 1a a5 9a bb 14 94 1e 76 27 37 | f2 ee 5b 14 97 4a 79 fa 6f 9b 0f c5 88 6c fb 04 | f3 a0 0c c2 44 32 68 59 fb d3 ff 35 d2 8f 3d e9 | 86 c9 05 ac ef 42 2b ea 5f a7 52 45 8e 96 87 31 | fe 42 93 88 8e 3c d5 b3 71 e6 f8 da 35 dc 5e 1f | 53 ef ee 50 23 87 db 68 50 7f 4a 64 54 f3 b2 89 | 53 e9 15 fe 94 98 cd a1 0a e3 66 54 b9 b4 5b d5 | 29 00 00 24 23 e5 7c d2 c0 19 e0 e6 56 51 6c 16 | 10 c5 f1 59 39 51 01 db 67 77 e3 72 3e 6c e5 c6 | 16 64 51 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 3e f9 1d a1 f2 64 c8 f4 99 2a 60 | 0f 85 6f 8d 86 30 bf 9d 00 00 00 1c 00 00 40 05 | e8 9b 84 d5 f3 96 76 d0 94 a5 38 0c 50 c3 b3 e3 | 51 aa 07 18 | libevent_free: release ptr-libevent@0x55564daeb848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #14 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c fa 82 69 07 f2 3c 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | 5c fa 82 69 07 f2 3c 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.897112; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #15 | libevent_malloc: new ptr-libevent@0x55564daeb848 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 27 20 ea 92 1b cb dd 9a 86 e7 a5 f2 b3 62 4e | ef 0f 14 eb 79 e9 ef 03 82 da e5 08 5e cf f4 23 | 40 99 b1 bc 37 06 78 26 5b 01 9e 4e 09 de 3e 54 | 81 16 f4 00 a7 5a 18 e3 df 30 54 75 d7 75 60 b7 | cd 84 d2 26 f6 2b 67 cc 2d 4e e4 32 31 c6 c2 17 | 8d 4d a8 7d 2b 1e 84 5d 67 0c c9 46 e4 0d 87 4a | 47 bb 4c 31 2c b0 19 19 d5 33 93 80 6c 81 98 4c | 0c ea f2 44 f3 84 99 2f cc b6 f1 94 4a bd 94 50 | 17 ce 13 c4 74 5e 90 e8 69 6e af 47 8e 5d f3 4c | c7 5c 0a 63 12 23 73 78 df 56 37 30 cd f0 23 cd | 8a 41 05 b6 5c 3a 68 4b cf 27 81 ba 7c 93 61 ae | 43 ff 25 ca ad da 54 ac 8b b6 5e 81 93 57 db 75 | 76 3b 43 46 f8 e1 e4 4a 8a 81 31 2c 5d 43 2b 61 | 93 ed d1 5d f2 71 56 7c e9 cb 57 31 f8 62 6b 6c | 48 d3 42 fb 4f 61 ce 99 ca 71 e3 c7 12 3b 0a fd | 75 13 b4 cb 7f e2 4b cb 99 e6 2c 0e 9b f2 53 be | 29 00 00 24 4d d5 10 40 9f c5 bd d2 d1 79 06 72 | d7 9c 6e 96 38 3c b6 10 08 c0 44 3f c8 b1 bd 5b | 57 af 88 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 77 e2 4b be a5 b5 e9 1a 66 ed 83 | f1 57 73 fe 68 39 22 44 00 00 00 1c 00 00 40 05 | 2a 51 9b 1b f8 ad 76 fe 53 ea 14 c9 e8 0a 8e bf | 58 f9 15 e6 | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #15 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 cd 5d cd fc ed 37 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 70 cd 5d cd fc ed 37 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0809 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10608.958514; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #16 | libevent_malloc: new ptr-libevent@0x7f49bc01fe28 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 08 d5 69 6d b3 bf de 36 85 ae 75 55 67 1e 3f | a1 a5 f1 c4 1d d9 31 5e 31 3e 6a 8d 18 92 0b 43 | 9d fb 56 75 f8 63 99 1a bb 16 54 c0 08 2d fa 5f | cd 0e ae c2 7f 7d 9f 54 16 a3 eb 92 d7 d5 6a 70 | 69 38 0b e5 14 33 13 af 00 67 80 b3 85 0b de 51 | 4d 76 c1 4b 45 f4 55 e5 5d 1e 14 a8 4e f4 ef 36 | d2 6a b4 0a 6a e5 87 2e 8c cf f1 9c bc 6c 1d 59 | 83 d3 53 21 cf 6d 5c 0f 92 39 23 bd ad 17 ea d8 | 4e 6c 26 b3 48 ad 46 dd 33 e6 38 2a cb db 65 c3 | fe aa 79 bb a7 ef 2d 67 98 cf 70 6f 4e 19 9e 1f | a9 fc 7f 9b e2 6c d3 24 77 a3 23 84 3d 7e 73 2f | 48 f9 9a e3 d0 03 79 73 ae 7e 89 a1 a9 a3 49 59 | 35 fd 13 8b 61 19 cf e3 7c 49 14 f1 92 cd 06 c3 | c3 f4 db 8d 9e a6 3f 2c 3c 4e 17 65 0b c8 07 1c | fb 82 24 a3 9a dd f5 f0 8d 52 59 9e 65 f9 c8 82 | 28 6b c3 c1 b5 44 1e bc c8 8b 83 f3 56 bb bb fb | 29 00 00 24 8f 99 ab 7c 4b c4 40 ef ea 88 5f 6c | fe f4 b9 dc f2 cf c5 1c 44 b6 00 8f 16 ab 65 0a | 92 3b 43 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 32 f5 70 09 d5 6a f2 18 51 bf ae | 5a 95 ad 9d 1c 60 2d 8f 00 00 00 1c 00 00 40 05 | 2e 07 a4 60 e1 52 4f 6d bc b5 57 b6 2d 84 99 7b | 95 88 b4 b1 | libevent_free: release ptr-libevent@0x55564daee6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #16 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 e1 db 38 c3 a4 b9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 61 e1 db 38 c3 a4 b9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0718 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.023929; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #17 | libevent_malloc: new ptr-libevent@0x55564daee6d8 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 0f 3a c7 cc e8 f9 af b9 2c 20 6a bf ce 5e bb | 73 66 d8 0e 2b bb 41 7e 90 6c 5a b0 bf 19 d5 56 | 31 a3 ad c5 29 db fd 46 08 a4 58 68 cc bc c8 3b | 12 ff ae d5 49 9d 64 51 35 ff c8 b4 4c 0e fe b7 | a2 f2 6c 0a 41 e7 27 13 ad 91 1e 7d e8 f7 13 e6 | ee 64 97 e2 93 9b ad d6 db b2 a3 56 b3 3d fd b9 | c2 6a 0a e5 57 12 7c 5e ac e7 e1 4b 14 06 e6 85 | c8 e7 fe fe 0d ab 91 87 11 85 ee 48 11 60 30 fe | 7c cc 33 aa 9c 1f d5 7d 9d b2 70 d1 8c ad a4 9f | 68 8b 46 85 0f da 04 99 12 93 23 f3 b5 75 5d ec | 0c 40 cd 8b ed 89 67 08 29 7d af 35 76 9e 22 97 | 42 fb 37 18 ab 8a e7 c9 e5 8b 2a 80 5e 6e e6 e8 | e7 b9 91 ff 49 2e a5 86 ab 01 50 4c 16 3a de 21 | 8e d4 33 2d d0 1d 37 1e 4b 25 79 4e 15 9c 39 73 | bf 71 4a 49 02 a1 c5 f3 32 08 2c 3d c1 bc 40 e2 | 23 ea 7a 06 6d a6 d9 a0 ca ca ec 91 7c fc 26 be | 29 00 00 24 e1 33 7c b0 03 98 2b 4b e2 41 00 41 | a5 e6 69 9c 9d 16 9e 66 b7 1b 7e 42 f3 65 2d cb | c8 01 9b 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 ad 66 63 18 9a 60 d1 7e 8e 31 62 | 04 92 86 bf 8e 32 b4 fe 00 00 00 1c 00 00 40 05 | 19 3a a8 37 04 b6 1a 03 e8 df 9d 28 27 e5 90 4c | 09 01 e8 cc | libevent_free: release ptr-libevent@0x55564daefe58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #17 spent 0.343 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 c1 45 e7 2d 85 b7 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 89 c1 45 e7 2d 85 b7 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.096489; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #18 | libevent_malloc: new ptr-libevent@0x55564daefe58 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 79 41 27 12 42 05 2a a4 88 38 08 14 86 9c 21 | bc a8 ad 95 82 c4 d4 6f 91 41 b2 1f 61 81 d9 c5 | 34 f3 4e e6 c9 88 f5 64 6f d1 a0 ee ed 6a 12 cc | b6 bf f8 ac 65 52 c9 5b 65 c2 53 26 9d a4 b9 ea | 0e 34 c5 a0 73 d3 ac c8 ad d7 ef cb bd 24 3a 4b | 35 65 a1 31 1f f7 26 b1 fe 7f ed 22 35 22 42 95 | 01 f7 46 ce cf 5a 5f 54 dc 0b f3 e8 6b 9e 5f f0 | a3 aa 34 06 80 83 82 6a 09 d0 54 8e a4 91 56 6b | 0a d0 7c b3 91 69 8d ac 98 d9 58 45 a9 23 9f cc | 28 c5 32 f7 44 39 c2 64 54 23 b6 3e 6b 1c 5f ed | f1 f5 e5 2c 36 2a 2d 78 15 83 1a 8b 4b 26 d3 c6 | 5e e8 8a 4e 23 27 6c fa 10 1d 02 19 b9 96 24 16 | a8 96 bc 82 8e c1 ea f0 23 ff f9 75 9e 00 d6 e8 | e6 c0 0a 37 0d a7 3e 86 08 ec 46 03 a8 bc 89 f6 | 4c 7b b5 c4 a4 4a 06 23 80 06 f6 ec 32 fa e3 ad | 67 98 6f d7 d3 7e ed 6f 6d 8b 44 e5 6f 0b c6 7b | 29 00 00 24 3a ca ba 81 fb 30 53 75 fe 42 3b 4b | 83 62 b2 63 a2 a9 57 25 39 fb 71 93 e7 79 1e 42 | ff 7e f1 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 6d a7 eb 79 b2 4a 12 34 db ce dc | d9 0f 2e 07 c0 60 07 c1 00 00 00 1c 00 00 40 05 | 85 6f 2e 63 9c bd f9 ea 20 79 c1 42 8b cb 50 1f | 7f b8 e5 9a | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #18 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 0b 6e cb e6 25 9c 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | a1 0b 6e cb e6 25 9c 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.162798; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #19 | libevent_malloc: new ptr-libevent@0x55564d9e98a8 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 ff 02 43 e4 6c fc 0f aa 5a d0 92 87 24 6e 1c | a3 85 20 26 12 c9 6c e4 0e 9c aa 96 d8 8c 0b 79 | a4 f4 85 7f 5f 9f 5c 55 93 86 64 ab c8 dd 98 06 | d7 19 4c 77 73 71 2d 48 2a c8 ca 5e b1 11 56 11 | 41 f3 53 0c e8 59 5d 25 22 be 0a af 48 54 02 0d | 58 28 fe 1c 5e 65 1a ed 42 bc cb dd 7f 1e 0d 57 | 0f a4 67 fa 38 f3 37 51 70 61 3f f8 21 e2 fa 67 | f2 31 54 9b 9e 2e 75 3c 09 d8 c3 84 79 bf d9 52 | 98 70 bd e7 f0 58 94 3e 91 54 48 fc d8 7a f3 95 | 38 5d 24 e0 91 1e c4 ed a5 32 95 b9 62 67 11 9b | c8 dd f5 3d e1 69 a3 54 e0 09 f9 89 f9 c3 56 de | dd 8a af 4f 85 41 5a 3b 72 fa bb a9 c8 02 27 f1 | 0a 06 34 eb d4 63 44 b7 b6 8f 83 8a 77 d5 60 bb | 96 9c 7b 99 ef 04 e6 c7 da a7 dd 25 6a db 44 e7 | 9a 4a 06 8e 8a dc a6 7c 86 63 26 6d 79 43 a0 a1 | 8e bf 4e c4 6b ae 6d 17 b3 c1 bd 72 20 91 56 45 | 29 00 00 24 aa df 3b da 94 8f 4a 0c 84 fa 5a d2 | bc 94 37 a7 25 ce 3b d3 f3 07 52 d5 2a f2 d9 9e | 46 95 b7 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 2f ec ca 28 1e b1 51 5b 2e cf 95 | 64 8e 32 8c 18 3c 18 be 00 00 00 1c 00 00 40 05 | 61 44 89 a3 4a e2 91 bc 07 a2 c6 a0 7c 14 e6 b5 | fb 40 cd 1c | libevent_free: release ptr-libevent@0x55564dac5c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #19 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 46 44 e6 ba 70 e0 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 46 46 44 e6 ba 70 e0 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.230193; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #20 | libevent_malloc: new ptr-libevent@0x55564dac5c48 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d d8 00 86 ec 4c 9a 11 6e cb e3 9d 66 71 46 08 | a7 b9 ef f7 80 09 58 ad 83 92 dc 59 5e 23 90 f3 | c9 5a e3 22 2e b9 68 34 5a f2 dd 4b cf 91 58 1c | 92 83 10 0f 7a d9 36 f0 9a 7f 59 d7 80 0c 4a b6 | 4a 9e 0e aa 3c 60 40 4c bf e4 73 9f b3 e4 c0 fb | 28 cb bd 4b 5c da ff 82 0e 65 5b 85 09 ca c9 81 | 79 1d e7 2a 76 23 05 e1 63 10 46 5c 94 34 5c 7d | 95 28 e2 1a da 81 b3 bd 5d f5 d5 06 10 4c 8e 1d | 85 fb 14 a2 ff 98 2f e7 d5 f1 c1 ad 53 75 6e f8 | a8 34 3c c7 4a af 49 96 6f aa 9b 3e 24 d9 cd 9a | 3e 58 e1 7d 6e 6a 68 ee 37 80 4f d4 fe 83 a1 f1 | 09 79 0c 5b 0a 4e 3c 4a ba 43 b7 68 3d a9 cb 23 | 7c e5 8f a9 fa 5d d5 6d 27 6b 52 ed b5 83 4e 5c | 9e a7 d8 85 95 71 cd a7 0b ab 68 e0 8d ff 88 4e | ce 71 36 ab d1 e1 6a 6f e4 76 d6 c2 bb 93 ab 73 | 72 52 20 bb c4 50 72 7d 47 af ca ea 62 b9 1e ae | 29 00 00 24 d6 00 e0 79 8e 04 9d 2c f1 7c 94 30 | 02 f1 72 d0 c7 0d 9d 8e 9f bb 9d 61 fa 48 01 e6 | fb 70 68 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 7a 6d 4b 1c 29 e0 68 94 be 72 07 | 58 83 20 5b 84 37 c4 b4 00 00 00 1c 00 00 40 05 | e1 05 bd 1b 3e 74 8b 29 4d 58 b3 9e f4 49 f4 89 | 85 6f 1d fb | libevent_free: release ptr-libevent@0x7f49bc00f598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #20 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 1b d9 cc b5 21 9f 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 29 1b d9 cc b5 21 9f 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.323593; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #21 | libevent_malloc: new ptr-libevent@0x7f49bc00f598 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 e9 f6 16 c5 35 ff 82 13 6f 3b 47 42 cf 8b a4 | 7e 9b be 7f 75 1e 0a c6 79 b0 88 79 bb cc 78 7a | ed 2c 25 c6 b4 35 55 47 73 f8 e4 ae 6f df 19 75 | a1 7c 18 3d a9 da 60 d3 9a 89 9f 76 37 59 6b 93 | 0c 03 f0 dd 74 49 0a 5e 75 7b 12 6e b3 05 80 41 | 29 97 96 7d 3f 06 de f9 10 54 2b 7b 97 f2 30 78 | 4a 12 31 a7 12 f2 c1 f8 89 87 1a 3d 5e 49 34 8b | 22 d1 04 55 54 08 be 30 15 62 81 a5 08 08 83 10 | 44 39 c8 fe 05 e7 8d 82 0b f4 5a 9f f3 db 53 81 | 4f a5 5d 85 31 46 7c a3 8f 93 b5 a9 6d f9 8d 5c | ec 57 a0 d1 79 8f 81 a4 bc d1 e1 7c 65 8e a2 be | 9c b3 8e c5 7b 63 c6 4c 8e aa 3a 23 46 42 92 b5 | c9 ee 97 a4 f7 91 25 4d 14 d1 8e 40 50 79 cd 7f | f0 2b bc 9c 17 85 67 9e e2 c8 8a 03 06 93 3e 8a | ea e1 bb c1 fc 03 b9 52 ce 85 fe 8f a1 b5 36 91 | 6e 99 0d 0f 20 26 33 26 50 d8 fa 35 8e 3a 5f 39 | 29 00 00 24 e6 b8 9a 5b 25 3b 6a 65 32 fb 46 8b | f6 a5 f6 39 e4 2f 3a 63 cd 20 cc db f5 76 cb 59 | 8c 38 eb 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 00 7e 60 09 ee d7 4a b0 a8 53 68 | 51 23 eb fd eb 72 d4 94 00 00 00 1c 00 00 40 05 | 2a 38 c9 56 d2 0c 89 a3 b8 f8 1c dc 50 c3 ec 06 | b2 96 59 14 | libevent_free: release ptr-libevent@0x7f49b0043ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #21 spent 0.192 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 dc 4e d0 67 2c b5 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | e0 dc 4e d0 67 2c b5 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0795 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.381041; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #22 | libevent_malloc: new ptr-libevent@0x7f49b0043ac8 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e e5 e1 a2 88 d8 1e 30 ac 41 16 b4 4c a3 90 c5 | 81 a8 d3 27 61 58 cc fa 6c 8a 1b 49 64 54 01 2b | 9d 20 af b1 cb 26 32 fc 3a 4a 3b 3d a5 de 29 bc | 60 0f c8 e9 3b a2 11 5b be 31 a0 14 10 06 93 e8 | 89 6d 4e f9 f7 12 0b 89 6f 83 c2 03 a4 d4 f6 71 | b4 66 cd d4 7d ee f0 d1 aa e3 d6 8e 83 d5 d8 5a | 30 57 ab 0a 41 c4 e2 46 4d 4d 08 d1 5d 3c bf 0e | 8a 37 d7 c4 aa a9 eb e4 51 a1 6c 54 73 3a a6 a7 | 27 77 de 7f 62 61 8c 98 e2 ca 52 9d 4b bf 6f f8 | bb c9 1c df 7a 53 26 c2 ca 92 43 3d d0 eb 60 2f | 45 3f 8d 52 6d df eb 6d 44 b9 ee eb 78 d4 c5 e4 | 92 ef e0 36 2d c6 22 d9 7f 57 bd bb 2f 05 7c c5 | f7 0e 10 1b c1 41 09 2c 14 24 4f d3 6a b5 fc 42 | 81 7b 42 7a 62 9c 9a 22 f9 8d 40 6a c3 bb 6d 96 | 84 74 69 d7 b8 bb 7c 73 d1 6b 3c f7 a1 81 7c b7 | 47 f3 5d c6 4a ac 07 51 ed 78 b6 07 af 19 d4 68 | 29 00 00 24 19 6c a8 0f 7d 9b 59 cc 2e 5b 78 7c | 7d e1 33 0b f9 7b ae e1 ae 7a d5 8a a8 79 cd a1 | 87 2e b7 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 7d b8 ab c1 25 8f 90 c4 51 bb 8e | ab 70 e7 a7 c9 c5 16 5f 00 00 00 1c 00 00 40 05 | 5d 9b 37 8b 5c 20 0e fc ef 72 3b 83 ce 45 7e 20 | dd bf fe 9d | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #22 spent 0.315 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 10 b1 e6 69 51 b2 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | 10 10 b1 e6 69 51 b2 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.441556; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #23 | libevent_malloc: new ptr-libevent@0x7f4978012288 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 25 f1 3c a6 43 ef 3b a0 b4 b6 2e 06 fd 8d 20 | d1 65 99 6f 18 83 71 a4 0c fb fb e3 d6 7d 9f fc | 12 11 e5 5d 3a fd 9d 56 60 df f6 a1 65 2e 18 67 | 26 99 55 f3 c3 97 81 82 13 0c d5 ac b2 04 32 2d | c7 40 3d c0 c5 5d 2c 66 17 ee b5 64 55 6a cf 18 | c4 9e 74 f3 e4 f1 20 c5 c1 6f 3d 97 32 48 ce 0c | 9f 05 9b 7d ff 9a 94 e1 ab 1a 87 68 f3 47 1a b0 | 7f 4a d0 17 f2 45 d6 bd a9 6d 9b 65 b3 4b a1 00 | 76 7e 88 01 31 6d 59 d6 c8 a1 ff 4f f2 1a dd 4f | ed a4 90 88 ba 43 7b 4b 88 2d 38 5c 23 12 36 78 | 8c c7 e2 2d 6d d1 c4 db a3 ec 10 31 d0 65 4e c8 | a9 bd dc 10 20 6f 47 10 39 f4 2b 98 0a 97 e1 4c | 2d 32 17 9b 78 49 50 51 65 13 3a 19 4f c7 f8 20 | 8c c3 3b 93 b3 1a f1 8b 8b fe 09 1d c0 92 2f 93 | cf a6 f9 8e 3c 56 c3 d3 d2 ef e7 c5 67 98 a3 25 | 3e 5f 24 c8 20 2f d6 86 a7 72 4e c9 91 d6 48 c5 | 29 00 00 24 6d 0e 25 20 e5 ce 07 35 91 90 35 01 | 05 cf c3 5b f1 8b e1 a7 98 9a 4a 8d 54 2f c0 9f | 61 85 e0 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb e0 a4 57 d6 88 ed a6 8a 8f 1b fa | 63 e8 24 d9 dc d9 6c 8e 00 00 00 1c 00 00 40 05 | 2e 52 c4 4c 24 f3 bd 86 f4 ae 03 d5 19 ec b3 22 | a9 78 ea 1f | libevent_free: release ptr-libevent@0x55564da067a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #23 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 93 5c 09 02 02 35 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | d3 93 5c 09 02 02 35 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.499854; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #24 | libevent_malloc: new ptr-libevent@0x55564da067a8 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 3c 0b 90 06 8f ad 94 77 26 e1 2f 3b 86 b7 ae | 06 52 ad c1 9e 02 da 9f 85 7e f9 92 5c 27 4b 77 | 0d 68 34 fc 62 ce 8d c5 68 2c 42 63 25 b5 f7 f1 | e9 68 c8 e1 03 3c 8d 06 7a a1 8b 15 d6 c1 ff 9e | 6d 07 32 c2 0a f5 7e eb 79 e6 b4 ec d9 79 d5 1a | a5 dd 2f 83 79 71 1f 93 86 9c a0 93 64 e8 a9 53 | 47 65 37 b1 05 af a7 dc cb 23 87 96 2d 74 ce 2d | 1f 96 bc 90 b9 ac 84 88 fc c5 16 1c 9f 25 0d b7 | 64 0e 38 c5 67 82 ff cd 6c 35 de c7 f2 d3 e9 e0 | 7e 23 87 f5 20 98 cd a3 ed 87 22 69 50 9b b4 ec | f1 9b c5 d6 30 fb 8c e2 56 31 cd 22 bd 79 f7 17 | 88 e8 97 bd e4 25 6f 0f 05 9b 59 05 49 12 9b ab | 35 65 db 95 d8 98 a5 0a a3 25 48 d9 1d 87 e2 c6 | 85 46 9b 28 54 5d 81 45 9d 9b 97 0c df c7 c4 c1 | 02 45 07 29 b4 d2 b3 7e ad 74 63 1d 92 e6 18 39 | 5f 83 28 77 fc da 97 80 0a 6e 44 43 63 da d5 07 | 29 00 00 24 54 d1 03 a6 e9 ae 5e ff b7 a9 54 19 | 34 0f 34 d4 1b eb ba 5d 1f 65 4a de 8b 8c 3f 55 | a4 b2 4d 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 92 b6 82 c7 dd 4f 4b 7c c3 f8 7b | 31 d5 69 dd 90 db d5 f0 00 00 00 1c 00 00 40 05 | fb 8d 15 f4 aa ce 4f 02 ce be 15 28 8a df 4e ce | af 3e ec 33 | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #24 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 04 80 19 c9 5d 89 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | bc 04 80 19 c9 5d 89 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.557156; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #25 | libevent_malloc: new ptr-libevent@0x7f497c017a48 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 81 10 0b 6d f9 18 1b 5a 54 61 30 b7 e1 c2 3a | 08 3b b3 d8 e5 f1 a0 16 a6 42 15 0c c0 e3 de a2 | 93 b9 ad 15 54 1e 9d 5e f8 4a 82 1a f3 7f e0 68 | 04 12 2e 93 92 2e b2 e8 17 00 77 5b 69 6c 0e ae | 6a bc 06 16 8d 9a b0 c6 78 18 0b 73 b9 30 10 58 | 45 27 56 76 33 78 57 08 cf 98 b2 c6 f6 5b 21 26 | 84 34 5a d8 e7 5a a0 e6 2e 69 6f ad 44 6b ad 2e | 6f 68 0c 4f de ca ba 16 c4 07 8d 54 b8 f2 d5 01 | b0 eb 17 07 c4 cd c1 37 b3 eb 4b 65 de 68 d1 f1 | 3b b3 d3 89 3a 4d 2f f3 a2 81 cd 06 ac 4a 3a 93 | 45 c5 ef c6 ef 84 ec da c8 d9 17 dd 30 62 82 63 | a4 7a 20 cc 7f f6 ba e4 4f 6d a9 e6 53 2b b2 13 | ba 91 86 c5 c5 22 05 fd 32 5c fd 76 e7 b5 c2 f2 | 47 e1 62 72 c9 f8 e7 50 89 5c ab 5e 35 72 ef ef | 18 64 39 b6 4d 4f 84 9e 2b 22 10 25 79 6c b5 24 | 78 d8 35 f5 5a b6 1e 4d 37 c1 2e a2 f7 72 fa 0d | 29 00 00 24 64 07 79 ee 6d 7d 58 56 66 b2 cc db | a8 e0 d4 99 09 7c 12 1c 23 26 fd ba a8 5f 2c 22 | 31 76 9e 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 90 af 34 9c 9f fa 1b 6d ae c3 e4 | bd 33 ba 20 ef c8 ea 0a 00 00 00 1c 00 00 40 05 | d9 94 23 85 0a 0d 85 a8 d8 b5 d8 44 6c 50 55 47 | 47 6c 16 33 | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #25 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 ec ed 98 11 3f e3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | d6 ec ed 98 11 3f e3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.631448; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #26 | libevent_malloc: new ptr-libevent@0x7f499400cd68 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 79 02 85 dc 0e 85 f6 cc 6c 6a 07 d4 7d 97 9f | 7a a3 69 a7 e4 9b f6 1f 75 60 00 cc d3 b0 49 af | 8a a1 85 2a 4b 67 aa a6 34 cd a4 8c cd 57 60 c0 | d8 22 fa bc fc ea 57 35 dd c5 12 f8 f9 d3 4a b8 | 72 ad c3 fe 2c 1e 3c be 10 58 90 db d3 07 a2 35 | 85 e7 a6 10 5a b0 49 36 c0 54 ba 92 e9 6d f6 96 | 42 f8 16 ed 47 de 4e 56 a7 0f 10 cf 17 eb 6d 41 | 52 fe 8f 09 d2 35 7f 12 b5 b6 fc a4 fa e3 30 74 | 7a cd 5d 75 9d 1c 53 e3 eb 81 7e 40 5b 57 3f df | 44 a1 c4 97 48 99 1b 0b 5d 45 ee ba 78 b7 98 b3 | a7 f4 15 bc 15 2f d6 f6 32 be 73 60 b0 19 79 da | 0b 8a 5c dd be 59 d7 1c 72 7b 03 f6 df 2d 31 e1 | 62 70 03 50 4b 51 ab 84 11 14 99 79 f5 7f 08 90 | 5d 98 a5 e1 44 f8 17 0f d0 76 0b d5 0d e9 b4 37 | 6c c7 82 40 8f 94 c2 76 6e e1 34 db f6 ef c1 07 | 81 0f d0 1a 5e c0 d6 61 64 a8 b1 a3 f2 cd 9b 8c | 29 00 00 24 1a 2e 72 ae f8 6c a2 fc 23 8b b4 61 | ab 6e c7 48 00 b7 af 81 9f e8 74 ee ce a5 97 e0 | 99 81 b7 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 f1 37 de f9 3a 87 3b 7d 30 af 17 | 64 7f d2 15 ce 3b 35 28 00 00 00 1c 00 00 40 05 | 45 3f 3f 46 2e bc a7 73 58 ea 0b 89 6f 05 7a 61 | 16 4c c4 42 | libevent_free: release ptr-libevent@0x7f4978038be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #26 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 91 2a 4e 19 93 b2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | 2a 91 2a 4e 19 93 b2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.691738; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #27 | libevent_malloc: new ptr-libevent@0x7f4978038be8 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 00 ca 66 f7 e2 4b 6d 8f ba 61 2d 35 9d 6a 5e | 66 35 8f b6 2e 8c ca f5 5c 60 05 16 28 ec 73 e5 | d9 d4 52 41 b9 8b 68 c6 90 80 9a 98 08 cb 66 9c | 6a 16 dd 6d 98 01 62 21 4a d9 cb 43 2d 67 d2 d3 | e2 45 b0 40 ad 50 64 57 b9 9d 81 f5 75 bc 91 7c | dc 2a 8f b1 69 1f 89 79 69 dc 04 01 29 19 79 71 | 80 8e 5c 3c 7a cb 28 45 3a 40 f6 22 5b cb 0f 30 | fb b1 a1 f1 7b 6f e5 6e e9 f7 80 b2 50 cf 16 28 | 8e 26 33 46 c8 63 d7 b4 1b 6b d3 5e 35 f0 16 1c | be d9 26 f1 79 8e 36 cc 70 68 17 59 6a c9 ba d7 | 6f 8e 34 a9 f9 d2 ec 40 81 83 9d 3a e8 ef ba c0 | c1 16 76 a9 68 bc 6a 7a 23 8e 44 0a 3f 5e fd c6 | ed 97 7d 57 5b 20 37 56 e4 ff eb 3e 04 c5 5c 39 | 76 f4 94 36 d4 5f f2 d8 63 a5 c6 a9 4f f6 fc 42 | f4 2c 3e cb 59 e3 16 ba 14 5a 64 26 5e 08 c7 f8 | d7 8c 95 0b f3 11 7e 48 62 d4 a3 23 b5 25 9d e0 | 29 00 00 24 40 30 a9 42 10 b8 b2 49 ea c8 c3 97 | eb 67 60 5f 78 a8 a3 49 0d 16 c9 c3 33 37 a9 8a | 1c 5c b1 b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 01 98 f0 26 45 4a 1b 0d 76 bd f5 | 80 85 e1 b1 c5 dc ef e6 00 00 00 1c 00 00 40 05 | 38 3d 4a 2d 78 85 c8 10 1e 1f 60 e4 39 1f a3 87 | 03 3f b5 32 | libevent_free: release ptr-libevent@0x7f4974043c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #27 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce e5 e4 69 4e a0 09 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | ce e5 e4 69 4e a0 09 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.75214; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #28 | libevent_malloc: new ptr-libevent@0x7f4974043c48 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 1a ee bd c1 38 7f 75 0a dd a8 90 21 d8 38 04 | 54 e2 ea 01 27 34 c2 35 4d da a5 02 9c 00 68 f7 | 79 90 43 70 d4 fc 45 d9 46 91 41 e2 49 a0 13 bc | 64 52 19 4b e9 c9 e0 4c f3 9a df 6b 1d 83 fd 0d | ca 9d c4 85 6b f1 d1 8e 0e c8 54 8b fb 9d 33 80 | 09 7a ff 0e be a2 4d e7 42 84 fb d5 ca a8 a7 dd | 43 41 a9 2d e1 39 57 51 f2 63 ac a2 45 4e bd c5 | a6 a7 c3 47 f1 d4 2e a8 be 54 3c 54 54 0f c3 df | ea 53 80 f2 71 83 ef be d7 83 d0 7e 28 5a 1d 2a | b5 20 4d 79 d8 ef bc af e2 ce 49 cd f4 8f e1 a9 | d7 d5 33 44 6e f1 e2 f4 c4 e7 4f e2 d3 51 ed 8e | 65 98 4e 34 2e 54 4c 3c 36 b4 37 4a ee ad 46 65 | c8 ce 4f 3c 9c b2 02 e3 b1 0c b1 9f f4 ae 20 e5 | 23 ac fc ae 5f cc 71 73 c0 69 0a e6 ca 40 58 4c | 9b ec cb e9 ea 23 89 fe 6f af 68 df a1 98 a0 d1 | da f0 ed fb b3 db 4f 2f db 80 bf d8 25 10 da 64 | 29 00 00 24 0e d6 d3 aa 22 1c c0 e7 a4 fc b3 38 | 66 55 aa a2 ef a3 1d dc 9b ac dd df e6 8e af 33 | eb 72 67 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a a9 75 f0 1e fb aa d8 2a 2d c1 13 | e4 8a 22 83 c9 b8 03 e7 00 00 00 1c 00 00 40 05 | 4c 8f 60 00 00 dc fe 53 aa a3 65 98 83 6f 27 10 | 87 58 c4 51 | libevent_free: release ptr-libevent@0x7f4978043bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #28 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 5e 2d 53 42 c2 93 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 89 5e 2d 53 42 c2 93 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.828548; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #29 | libevent_malloc: new ptr-libevent@0x7f4978043bb8 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 bf 2f 0d a2 68 93 28 e3 45 b4 de fe 04 b9 cd | 56 57 3b 18 ef ba 4d 0d fe 5e 2f 59 86 a7 b2 83 | 01 dc 70 39 64 56 7d a1 39 f0 e8 8a 62 0a 05 b9 | 23 65 3d cf 9b fc 52 15 4b 6f 5a 41 e4 06 ce f3 | ec 7c 1e c2 44 9a f8 57 6c e4 8f e6 e4 d1 77 0a | cb d1 77 b0 a9 3d 4f e8 05 83 43 46 33 93 8a b2 | f1 ba 76 c1 0d fd 83 8c e2 33 ee fe ca 15 88 e3 | 21 93 2d 79 e5 4b 5f d4 ad 9f 73 84 fe c2 e5 76 | b4 65 26 20 6d 1b 01 9b c2 98 33 2d bc e0 f3 aa | d3 33 e9 b2 57 15 c6 28 eb eb a9 15 37 5d 0e 63 | 16 b2 af bf ae 09 c8 76 86 ba 36 5b da 30 a2 e6 | 49 dc fa 90 9f 4e bc b6 5e 10 b4 82 48 4c 35 ab | c6 1e f3 34 0d 72 ca a2 ff 9d 73 33 5b 23 77 50 | f5 30 54 75 9a 7a 80 b0 42 f7 49 42 7f 7e b9 3b | 1a 42 47 56 0b d1 50 57 df 36 09 66 15 98 db ba | 8a ae 15 eb 77 0d a7 9c fa d7 71 cf ee 69 d9 6b | 29 00 00 24 98 ee 4a 21 8e 1b 31 6e 4f 84 8f b4 | 87 23 c8 a3 ee d5 3c 73 4e a7 e9 c3 33 47 9a c0 | b4 db f6 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 3d 4b dd ec b2 8e 98 ab d1 62 97 | 39 de d7 0c 78 b2 24 0d 00 00 00 1c 00 00 40 05 | 49 30 f8 03 97 63 d3 05 b1 25 96 52 34 87 92 72 | ea c1 64 58 | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #29 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 42 fa c3 e1 51 6d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 48 42 fa c3 e1 51 6d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0822 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.905949; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #30 | libevent_malloc: new ptr-libevent@0x7f4984022a68 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0f eb d4 13 ea f9 7a 90 c9 5d 94 45 7c 5a 73 05 | f0 90 8b 36 dc 2f 85 61 7d b6 f7 3c d5 11 44 d5 | af dd c0 4e e4 6f 3a b0 d5 f1 c0 b8 1a 2a ed db | b7 ba bf de 47 3d d1 33 af 49 02 e9 ea 2a d5 ee | 18 a9 a1 eb e9 0b be 80 8e 3c b7 6e ca 32 e8 e2 | ad 63 8c 72 17 18 0b d7 f1 97 18 dd a1 e1 b9 44 | f7 53 68 c2 20 9e bd e5 00 00 4f d2 15 89 b2 f8 | 81 12 65 df ae 58 af 81 73 1c f9 50 4e 4c fa fb | 43 fb b5 93 70 dd 53 24 4b a1 25 a4 34 27 16 3b | eb 95 60 26 91 64 11 42 65 97 f2 a9 ad e9 82 e4 | f0 c9 db 1f d5 48 c4 a2 ee 58 be 6f 12 d9 cd fa | 9f a5 96 f3 31 a4 56 0b f1 ad 0a 1d 90 b3 4a 6a | a2 65 83 57 8f 0f a2 e8 8a 71 f9 7f 46 66 cf b9 | 13 a0 b1 f8 c8 28 f0 61 4c 47 cd 87 72 8d 1e 28 | 1e 6f 30 c6 3e d1 f7 00 95 7a f3 c8 d8 76 2e af | 8d 49 93 ef 81 e7 79 84 5e d0 b9 a1 cb 66 f8 b8 | 29 00 00 24 47 c7 fe 64 31 34 f6 ae 57 bb 20 b1 | 68 61 29 8a d1 5b 96 b8 64 e3 70 bb 74 ec 03 79 | ff 50 e5 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 e8 5b 2e f8 52 d4 d4 7f 75 50 e2 | bc e0 3e da 6e 9d 5c 85 00 00 00 1c 00 00 40 05 | f4 c4 8e 5c 46 01 55 2c 73 a8 57 73 ce 54 74 66 | b4 97 7a 16 | libevent_free: release ptr-libevent@0x7f49880282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #30 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db e0 97 2c 06 21 0b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | db e0 97 2c 06 21 0b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10609.978339; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #31 | libevent_malloc: new ptr-libevent@0x7f49880282d8 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ed 6e e9 ad 64 f8 25 62 05 b0 8c d4 7a e7 e9 | 05 15 14 c9 23 fb ee bc d3 6c 52 07 46 a1 38 04 | 10 af f6 f5 99 88 b7 be 2f 99 83 db 0c 16 77 88 | c1 54 4f fa 58 5b c1 0f 1d b3 14 93 1f fe 2d af | 04 49 63 c2 f0 2a 4b 70 4c 00 89 18 56 9f 5c 3d | ed ba 42 24 64 22 75 31 8c a8 0a 1d 0e 8f 92 fa | 7d e1 49 95 e2 c5 15 7f be e3 52 b0 37 e0 8c 28 | a8 f9 98 8f 05 9a b3 d1 80 70 07 17 6d 31 7a 43 | 49 ae 22 d0 e7 f4 93 5f 19 14 bc 60 59 b1 c0 36 | 55 f0 f9 72 c0 9e 0b 9a 42 c5 49 00 f2 8a b0 3f | af cb 9a af 31 47 a6 02 a7 a2 3c e7 f8 24 a4 f1 | 9d 86 1c 51 e4 8e c9 7a d2 83 c9 f5 d6 0c 58 65 | 49 c5 a5 cd 33 13 86 6d 81 9f b2 7f 17 67 df 43 | 3f 0e 0b d6 d6 f9 94 d1 56 75 5f 1d 80 e6 c1 f3 | fc 44 ef 8c 96 4d 0b 9b 76 35 e7 a9 28 c5 8b 66 | aa f1 47 7f 16 8b cd ee b6 b8 5b 05 46 f5 b6 9a | 29 00 00 24 b4 f0 46 85 5f d3 f4 dd f4 7e 41 0a | 6f 01 66 a4 f0 17 d1 5a f6 7d 2d 64 01 b6 2d c0 | dd 8b 88 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 79 93 fa 88 87 a7 d3 2c d5 cf b6 | fb be 36 5e ed c0 31 7a 00 00 00 1c 00 00 40 05 | 58 e8 3f d8 be fd 8e fc 8d 74 98 f7 ea e4 2d d3 | 91 c5 eb a7 | libevent_free: release ptr-libevent@0x55564daae928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #31 spent 0.517 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d fa 67 a6 72 0d e2 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | 0d fa 67 a6 72 0d e2 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.049088; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #32 | libevent_malloc: new ptr-libevent@0x55564daae928 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 18 a4 75 7b 1b 7b 67 4a 2b a6 3d 47 e4 ba 59 | 65 47 a9 d0 fe f4 c0 2e 48 16 4b 75 5f ad 8e 3a | 1c d3 4d 66 f9 e4 1c e8 62 10 dd db 52 76 62 cb | b3 8c 2c 8a 02 12 8c ed e2 46 0c 63 8f 40 f4 8b | df 4e 8f 47 5d 74 3a d2 c2 33 b1 ac ed 30 09 cc | b3 51 a7 0e b8 09 5c 41 06 cd dd 75 75 fd fa 31 | 9c cc 26 e6 b6 20 03 8c 98 31 02 08 89 d8 cd ca | 2d e9 6e 23 36 1d 99 20 a2 3a 90 fd 54 ed e2 39 | 25 05 8a 41 00 ae 39 91 e8 be d1 3a 82 97 09 15 | 67 a8 0b 46 44 7c 1c ce 69 48 aa d8 f0 10 90 f2 | 27 bb 97 8e 05 e1 69 ae ba c1 da c2 e8 82 12 d1 | 72 ac be 71 d0 c9 b4 a2 ba fa 5a 2f 47 75 1c d7 | e9 f1 61 69 bd 6d 87 bc 29 96 ab b5 45 94 87 4b | 9f a6 5e 52 8b 68 b9 57 b8 41 5b 3b 07 b2 00 c4 | 15 be 39 89 09 7f aa ae 24 ba 66 10 e1 be ab fd | 74 18 a0 b3 ef 97 23 47 d5 aa e0 a5 9c 12 5e 74 | 29 00 00 24 f8 e3 09 18 df 33 0b 79 76 31 cb f1 | 48 f0 a3 18 ec 19 d5 8f 50 b2 31 97 a8 b6 8c 38 | 82 a8 ab c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 91 27 e0 35 3d da f1 49 a7 45 84 | 7b 7b 9d 30 94 60 d4 4e 00 00 00 1c 00 00 40 05 | 4a da 07 d6 00 e2 1d ac e8 8c 3f ba 82 ba 41 ce | 3e 67 54 60 | libevent_free: release ptr-libevent@0x7f49b80367d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #32 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 06 91 29 d4 76 fb a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 8b 06 91 29 d4 76 fb a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.123464; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #33 | libevent_malloc: new ptr-libevent@0x7f49b80367d8 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 c0 fe e5 01 df bd bf 8b 7a 2e b1 0d 68 02 93 | 9f ec ae 46 32 f8 3f 4f ab 1a 95 11 75 df 48 76 | 3a dc e7 e0 72 fe ee b5 de ce f6 71 09 d6 5e 0d | 7c 03 c4 ca f7 65 62 d5 99 ac f4 68 d0 4a ca 1d | af 4d 0b 4b 40 28 67 ea 00 07 80 6a 23 41 2e 95 | c7 9e 00 c5 36 d4 85 5f b2 57 a9 29 6e f4 a6 25 | da 5a 31 6e 73 06 9f 88 4b a7 8a c7 58 f0 f7 42 | 08 45 de ae 1b ec e9 b8 01 f3 ae 53 7e 74 cd 4b | c2 86 2e a2 57 06 b6 8d 46 c2 30 32 6f eb 18 80 | 73 7d ad 18 dd 20 fb 2c 0e a5 82 ae 1e f4 57 61 | 04 41 d7 f5 51 f5 66 ac a2 7c 32 70 9c 89 bf 7e | 78 ca 4e e7 ca e9 ac cf ba d5 4e 37 73 cd 9f 6f | 07 d3 fe bb 19 af aa 02 eb fe 8e 5f 4c 80 03 84 | 46 2b ad f6 24 42 e9 96 b2 5f 1b 73 40 24 2a 3a | 24 3e ec ce a5 87 00 8b fb ea 72 2a ce 19 c4 e4 | 77 eb 7b e3 0c a1 a5 4f c5 b7 27 06 b6 4b b6 1c | 29 00 00 24 16 4d 9d 64 38 cf ca 10 f4 e5 df 20 | 09 be 8a 7d 64 f1 22 03 a9 98 19 aa 7b e1 02 01 | 69 ae ea 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 3c 16 cc 90 f3 66 5f 90 f1 01 63 | 38 2a d4 6c 75 24 8c df 00 00 00 1c 00 00 40 05 | 75 4a e8 ea 15 c6 7b c8 fa bd 0d 79 ab cb 54 69 | e0 36 d8 bb | libevent_free: release ptr-libevent@0x7f49ac038b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #33 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 ef b5 f2 75 93 2d e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | 63 ef b5 f2 75 93 2d e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.19483; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #34 | libevent_malloc: new ptr-libevent@0x7f49ac038b78 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 00 1b 59 1f 7c 72 25 0c 44 8f c6 f9 63 53 94 | 79 74 67 21 4d 24 c8 ea e7 fc 84 eb c2 3f 65 ce | 41 e3 90 8a 7e 15 5e 91 b9 64 a3 b4 76 e4 6c be | 6a fa f9 1d 7e b2 aa a3 c8 9b 2c de 55 3f ae 74 | c4 55 43 9c 60 a3 5a 5a 86 88 ed c8 d5 f7 1f 8f | 36 6d 79 4d 68 6b 62 05 47 27 a4 45 e6 a7 59 7e | da f9 cc 0f 4b a3 d8 7e 87 fd 57 32 f5 6a 11 61 | 5d 60 3e 76 a6 0d 5f c3 c6 92 de e2 fb 6c 68 48 | 52 ec 5f 2d 0f 8a 76 58 32 d3 be bc 44 16 fa 03 | cd 01 81 e8 76 60 a4 21 93 a1 76 f3 4c 25 c3 79 | f3 41 dd df 16 90 d9 e0 7c 6e 2d ef 91 e0 a9 ca | b1 ad c0 d6 8e 66 aa e9 59 52 9d 05 55 6a f9 34 | a3 a9 88 01 81 6e 53 4f 76 9d ac 84 b5 1e 0c 28 | a0 15 c8 3d b3 e0 26 90 ce 32 bc c2 fc 21 d5 60 | 6a b0 24 54 8a 3a 02 fe dc 39 31 46 68 32 a1 a3 | 3d c1 04 9e 02 5a 16 12 fc f4 9c 41 34 48 1d f9 | 29 00 00 24 2f e9 82 b9 2f 8b d3 af b9 7a 39 dc | 3d 0c 9a ae 8a 3f 65 5e 23 47 81 df bb 46 8f 40 | bf 3a 5a cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 38 2d 71 63 a6 00 2e 49 2f 99 4b | b4 0b f7 88 48 ad db a3 00 00 00 1c 00 00 40 05 | 76 9c 7d 9a c3 5d 29 62 77 b9 89 0d 8f 31 e0 d2 | f7 d6 2a 97 | libevent_free: release ptr-libevent@0x7f49b403b588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #34 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a6 cc 08 1a b6 7f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 9e a6 cc 08 1a b6 7f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0783 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.255206; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005947 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #35 | libevent_malloc: new ptr-libevent@0x7f49b403b588 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 4e 62 f5 17 c3 62 eb 43 2d 64 f3 a1 10 59 03 | 23 4e a8 3b ab 16 60 55 06 37 05 27 bc ac e9 a3 | 33 1a be 03 0f 93 f2 20 61 a9 6d 74 9d 7c 97 a9 | ed 5d 83 3a 06 55 ca fc 4a a4 d6 88 50 b4 3d 85 | 93 74 36 e2 30 d1 da d4 3b f9 61 32 30 69 23 ae | e1 06 01 96 5f bd 77 60 dd 78 7e 6d 94 30 f0 5d | 09 50 18 5e 0b a5 b5 7a 79 21 b2 eb 78 06 6a 67 | 3e ee 61 cd 0b c6 9a f7 e1 e9 73 04 f7 c2 4b 34 | 94 f0 c6 48 f1 bd 8a e8 d2 90 ad dc c6 15 b2 c6 | 11 52 99 51 68 bc e4 ff 77 fd db 8f 47 54 64 9f | 38 8b 35 2d ce ff a9 90 00 09 d9 26 86 8d 5f 14 | 63 23 df 92 0e 3b 64 8a 50 0c 2e b1 5b a6 82 2a | 19 63 21 ad 7b 99 27 90 e3 4d 3c e7 c7 04 39 79 | f5 20 26 05 a0 a9 27 7c 43 ca f2 52 85 05 ac 11 | 42 c7 6f cb fa a9 5d f6 b7 dc 0e 74 cf c3 3e 33 | f7 50 c2 a1 bc 64 ea 7c 53 13 5c b3 4e 35 a6 b4 | 29 00 00 24 11 06 d5 a1 d0 4f 39 d8 e9 10 73 8a | 81 d6 26 96 cf d2 f8 4c 97 09 48 74 b9 c8 83 80 | bb 7f 64 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 03 92 87 8e c0 ae 85 91 1e 62 29 | b8 de c4 f4 1a 08 b3 6b 00 00 00 1c 00 00 40 05 | ed f1 d3 94 3a e5 79 62 ff a7 87 9c 32 0e 53 72 | 56 7f 86 0f | libevent_free: release ptr-libevent@0x7f49a8049598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #35 spent 0.0966 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 ad 85 74 da de ea 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | 55 ad 85 74 da de ea 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.317485; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #36 | libevent_malloc: new ptr-libevent@0x7f49a8049598 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 28 d3 77 8a b3 6f 10 5a 4b ce e6 cf 2c 25 60 | 4b b3 b7 ed 0c 2f b8 39 54 97 48 68 0c de 56 55 | 54 9f 07 10 e9 75 c7 78 39 b2 44 34 51 54 9d ac | ca 0b 19 99 d3 54 9c 12 c0 0e 5a 23 e1 05 77 d1 | 59 eb ad b0 28 93 56 1b 07 8b 9e c7 12 b1 2d a8 | eb 54 94 4a 71 a4 eb b0 c2 6e 6b d6 06 5d c7 19 | b5 41 8c ac 6a f3 7a 69 df f9 80 2a 04 27 e7 1b | 2a fa 96 99 a0 36 d3 3f ee f1 c4 81 15 a4 15 ac | f2 04 8f b9 ac e6 b8 40 49 91 45 eb 7b 94 86 58 | 1f 9f 72 99 cb ef 8d 3a d5 bd 57 67 3d bb 1b 10 | 37 bd 45 c1 8c b2 4e 50 f9 4b 7d 0c 08 54 f5 04 | 81 76 83 4f 32 45 87 46 7f 98 b5 02 6d 0f d4 27 | e4 f0 3b f0 a4 a0 b6 a5 8c 07 88 b2 56 db 29 76 | 2e a9 30 fc c2 31 11 eb 11 c6 4d 84 e4 87 ad 85 | fc 2d b3 4c 1c ed 75 52 1f 8a db 2f 65 f3 a0 d6 | 64 47 5e 11 84 41 7a 5b 9a fc f3 e5 d9 df 71 43 | 29 00 00 24 23 48 78 a5 fa 3a 35 e7 82 04 51 bd | 2f ed b6 a3 f5 a2 e2 98 37 10 4e bf 54 d8 1d 7a | fd e5 a3 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7e a1 d3 66 3f 69 9d 61 d9 23 21 | 9b 03 f2 e1 c7 d2 32 43 00 00 00 1c 00 00 40 05 | 98 50 7b 8b ee d4 20 6b 6f 51 d6 b1 9d fb bf 78 | 83 48 be 07 | libevent_free: release ptr-libevent@0x7f497803e348 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #36 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 fc cf fa 98 f9 af 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | 00 fc cf fa 98 f9 af 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.377822; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #37 | libevent_malloc: new ptr-libevent@0x7f497803e348 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 c6 a6 e2 1d f9 db 2a 8b 5f be 42 1b 9d 06 18 | 58 0c f6 62 c5 68 c8 7c 90 e6 0f 75 cb f9 e5 21 | ec 90 bc 38 3d a6 98 4a d1 fa fd d0 39 03 bf a3 | cb 13 8a 46 8e e5 3f 09 4d fa 88 03 8a 2d 9c 9d | e7 f4 11 70 a4 2e cb 10 6d 1c 4d 9c 08 67 dd 1f | ef b2 f6 fa 42 38 1f 4a d2 05 17 0c 89 1c 2f bc | 30 d0 03 6a aa 5d 2a 35 d5 7c af 2d bf 7a 59 ba | 0c 3c d0 a8 ac 85 99 06 0c f4 63 31 29 a6 40 3c | 50 04 2d cd ad bb 93 d0 61 7f 09 db ff da c8 f2 | 35 fb e8 d3 34 fe 5a 75 26 5d a1 b3 51 90 b0 de | 57 3c f7 9b 5d 9f d0 ac d1 75 19 00 67 9e 98 c5 | 72 8f 0f ea 5b 98 45 85 6c 87 9d 05 77 7d e6 d4 | aa 91 e2 76 8b e3 3e 3b d5 03 5f 81 f3 61 e7 3e | bf c8 93 f5 e3 32 9c 6c b2 b8 a6 bc f8 5a 9a e3 | ed 72 46 e2 7f 4c 06 95 3e f6 1d f5 e0 4b 03 cc | e8 45 5e ea 40 b6 48 b0 2b 07 57 04 52 42 97 c5 | 29 00 00 24 a0 a0 43 4c 2b 3d 84 bf be 7c 84 d5 | 61 7d 03 32 e9 07 ca 0c c8 1c 98 79 e4 9d ed b8 | 1f 17 fc c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 a4 bb 76 d0 28 fc 07 7a 04 7e eb | 1d b6 10 54 d0 f7 19 f3 00 00 00 1c 00 00 40 05 | ff db 08 fd 06 ad bb 1d f5 85 79 dc d5 5b a7 17 | 26 69 8b 5f | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #37 spent 0.568 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 fa eb 00 2f 48 32 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 42 fa eb 00 2f 48 32 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8b78 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.437592; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #38 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 28 25 17 bf 88 ba 9a 1f d1 3c e2 a3 aa 7d 41 | eb ea e5 b5 84 62 41 09 cc 11 65 6e 22 22 21 8d | dd a1 9a e8 a5 ad d6 fe 2d a4 97 42 c4 d4 5e f7 | 41 8b 65 d2 17 a5 f2 14 7d 10 c1 0f b2 3e bc 0c | 19 24 8e 89 05 9b 61 8a 7f 53 6c f2 62 32 a6 2f | 0b 76 25 32 31 d9 2d 1a 6f c4 b9 a1 09 04 fd d8 | 7d 61 b6 86 4d 16 44 50 c0 66 d6 ce 90 b5 32 0d | 88 6f c9 e6 50 68 1e 79 1f e8 ec 56 4b 5a 30 4b | f4 d2 9f 00 19 4a c6 e7 cc 98 ec 74 09 df a6 3d | 52 98 f7 b0 5c 35 ea ee d6 be aa 00 c4 07 cf d9 | 4c 88 bf 81 52 42 2d 43 f6 0d 09 8b da 01 eb a3 | d5 38 73 a1 80 6f c0 dd 52 12 4f de 24 bc 0a 35 | 19 9d 9a d6 ec 6b a5 9d 50 8d c8 44 59 94 66 00 | d3 a6 e5 b7 2f b0 6d 78 93 19 e4 16 9b 89 51 c2 | b6 ae 82 a7 d6 e3 41 1c c1 51 5c 7e cf ef be ed | 0f 50 7b 5e 94 f6 85 f8 8d 08 85 fe b0 f6 ad cf | 29 00 00 24 d3 18 fa 05 53 63 fb c2 6b dd 1d e6 | 84 3a 07 b9 ab 6b 87 61 bd 86 8d a8 dc f0 ba 9f | f1 2a a5 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 ec fe 5e 18 e6 d3 83 b6 88 db 13 | 94 21 d1 eb ba fa e2 ae 00 00 00 1c 00 00 40 05 | cf c4 20 01 ec cc 5c 9e 4a f8 16 c4 5b 1a 48 ef | 38 42 d2 c7 | libevent_free: release ptr-libevent@0x55564dae2d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8b78 | #38 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 90 50 fd ba a6 71 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | e2 90 50 fd ba a6 71 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0509 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.499891; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8b78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #39 | libevent_malloc: new ptr-libevent@0x55564dae2d08 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 6e be 22 98 25 58 7a 3c f2 8c 1e 65 8a a9 1a | 21 1c c2 76 a2 a7 70 2a 72 6a ad 32 77 3f 28 8f | 4a a4 70 d5 fb a6 a5 85 c5 4d b2 35 07 58 e5 7f | d6 bb 87 c0 16 35 d9 7e 58 69 78 c3 07 5a b4 6a | 47 b1 36 92 ff 0c 83 fd 78 aa 08 07 9e 64 0f 47 | 09 9f ac 37 1a ed 8c c6 6a 0d ac 66 cf be cd 6f | bb 2d e6 a0 3d 08 57 f2 80 77 b2 0e 52 c5 53 14 | 29 38 ab 5d 73 8f 14 b0 ae f9 d1 53 78 d7 60 e1 | 4f 0f 67 db 0d 88 98 af f2 c4 39 9b 87 eb 47 87 | ed 1d 31 8d 88 2f 29 c5 27 44 5f 4f ef 25 60 54 | 6e 9d 1e 13 33 e9 d6 fd f5 b7 5d a2 c3 fd c7 e7 | c0 43 db d5 f1 3d 86 94 46 79 cc c0 66 38 36 8d | e4 1c b1 a3 6f e5 80 4f 09 2f 7c 55 80 38 6b 59 | 52 19 c2 c3 7e f9 14 3e 2b a0 0a c1 aa c2 1a af | f3 89 75 0d 3c c8 98 fb 5b c9 8e ca de c9 bc a5 | ec 4f 1e 5f 4c bf 33 70 21 7b 30 8a 44 60 53 f2 | 29 00 00 24 19 4d c9 72 94 38 78 d1 87 c9 e8 72 | 46 55 73 f4 fc ad e9 38 b1 68 e3 e0 c1 47 89 5f | f9 ef cf bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7b 63 9e ec c3 3e 1d 3a c5 c9 cc | d7 65 4c a0 33 2f 80 6b 00 00 00 1c 00 00 40 05 | 41 60 1f 6f 8e 37 45 07 e8 cd b5 01 6c 25 2c 0e | 00 c0 e6 e8 | libevent_free: release ptr-libevent@0x7f4988033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #39 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 31 49 75 31 b3 64 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | e7 31 49 75 31 b3 64 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.561218; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #40 | libevent_malloc: new ptr-libevent@0x7f4988033358 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 3f bf a8 1f 61 38 23 59 35 46 95 65 ce fc ed | cc 0d 8c c1 6a 79 71 10 bc 54 50 7b a0 7c 0b 78 | 73 5b 6f 1d 28 cb aa ef 2b 3a 90 2b c4 72 34 67 | 28 a8 e1 d8 9e 87 1b 78 56 9e 88 ae 60 06 c6 6e | fa d3 ab 93 d2 23 53 e0 d8 f0 bf 97 0b 26 09 bf | c2 ed 54 f7 d5 72 eb bb 98 6c 50 21 e3 9c d3 8e | 79 45 bd 56 9c 51 3f 68 9d 9e 98 de d9 12 02 c9 | 49 0a 68 4d 4b 4f 6e 62 39 7e 8f 38 c6 b2 a0 42 | 85 df 66 98 e2 a4 63 87 b8 a9 4e ca 87 55 4b 1e | 87 75 ed ce 0e b5 78 05 da 28 37 2f 67 22 8d d2 | c1 9b bf 9b 73 dd d5 59 53 d3 e3 89 6f 54 0a 1d | 00 a5 aa 8e 76 1b 3c 07 61 e8 a4 27 f3 03 43 b5 | 04 e2 6a a2 28 4c 90 ca 89 14 22 55 5a a4 d5 5e | aa 11 e8 68 5e 0d 6a 58 ef f3 bd d1 c2 c6 62 d6 | 6a 7c b4 09 5e 1d d9 54 38 e8 e9 db 2f f7 b2 e6 | ce 82 ec b9 01 e7 65 83 8c 1e ca e7 79 92 73 3b | 29 00 00 24 b4 4c bf b2 7d 34 69 35 86 c2 8a 5d | 90 b0 c7 51 ab ea 34 52 80 2b 3b 09 e7 3f d8 bd | 32 07 c2 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 10 98 ea bd 03 7f a5 e1 f0 bf 7e | 30 73 31 d0 e4 51 d7 0f 00 00 00 1c 00 00 40 05 | 8e 9e c3 ed bb e2 5c 1b fc 14 64 43 9d e6 b9 01 | 36 c4 02 72 | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #40 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6a a1 8b 34 ef 63 32 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | 6a a1 8b 34 ef 63 32 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.625528; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #41 | libevent_malloc: new ptr-libevent@0x7f499802db48 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 fc 30 bf 27 6a ad 70 a1 a1 73 b9 ae 8e b8 7c | c6 6e cf 37 37 66 ea f8 1d 02 ef 2a 16 6e 8a fd | ee eb b0 50 ca b5 f6 89 42 7a 79 02 57 08 b0 0f | 37 f3 ec bf 8c 44 c6 1d 62 20 8b d9 18 8f af 63 | 75 4c 73 27 5f 9e b7 a5 d9 b3 30 d0 bf 37 80 7a | 14 01 83 0d 3c 8b 6b 2b 22 98 54 55 54 04 ba 13 | e5 9e 8a 93 5e 68 68 03 ad 43 bd 38 a7 75 46 4d | 1a 12 a0 27 a2 44 c6 14 16 48 6f e2 96 d9 2d 7b | 61 43 11 15 74 a0 5e 6d 6a 47 51 b2 3e 4b 71 ee | a7 84 d8 6e 3e 06 d5 1a 67 c1 f1 9d ee 3f 67 cd | 1b 57 c0 18 ff 3f 38 fe c5 9d 3a 46 fb 75 b7 47 | 6c f1 83 d8 37 07 91 46 98 e0 30 ed cd 41 bd cd | ce 19 3d eb 23 c4 c5 85 15 3d 16 0f 27 c3 4f 29 | 72 68 69 24 43 c6 d8 6b 47 50 22 a6 7a d0 9f 4b | 5a 17 a4 9e a1 59 b1 6d f5 4a f2 84 26 04 dd ba | 53 0e 23 0f b0 45 dd c3 09 50 79 fe 69 2b 08 7c | 29 00 00 24 9a f8 f5 bc 40 cd 69 5f 26 35 0c 0c | a4 70 86 1e 75 79 14 3a 29 b8 c1 9e d8 b4 97 bf | 9b 6d ea d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 08 ab f6 41 27 3e 7e cb aa 8d 94 | f5 26 79 02 39 80 05 6a 00 00 00 1c 00 00 40 05 | 76 bf a9 f4 c4 14 eb 02 8c 1b 0f 8b 14 d5 1a 0e | 0b 01 1e 7b | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #41 spent 0.0973 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 c4 c7 81 8e fb d1 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 61 c4 c7 81 8e fb d1 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.690815; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #42 | libevent_malloc: new ptr-libevent@0x55564d9a6d28 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 67 4a 1f 7e de a7 14 bf 04 91 f3 56 6b f4 88 | ea 8f 2d 17 f2 b6 77 fb f7 9d bd 90 27 b7 e7 74 | 08 9c 7f 58 53 89 bf 1e a8 07 00 e8 5c 07 f9 19 | 3b c8 bb a3 1e cf 71 7b db 4b 7a 90 a6 56 4c eb | ed 33 44 2a d1 07 aa e8 07 32 92 a2 7b 9c fb da | 59 71 55 e3 df c2 85 1f 5c ae b7 39 21 b4 88 46 | d1 88 78 97 1c bd 78 10 c5 9f f3 12 2e 31 cc 19 | ad d4 cb 62 5f 1f 8e 8a 24 2a ab 58 9b cb a6 94 | 3d 27 16 9c d9 b8 94 70 15 84 35 89 ac a7 c6 b8 | 12 48 67 93 35 af 06 98 98 36 f7 0c d8 e7 fb 53 | 33 b2 5e d5 70 16 c9 c5 7e d6 22 16 30 8e 2b 45 | af a2 1c 3a 0c 26 d0 e4 63 e8 e0 33 63 c2 f9 a7 | 38 0d cd 55 55 12 ce b7 21 e1 61 c0 6e 90 12 ca | f0 7d f1 8c 67 fa 2f d9 71 5b 18 81 3f 55 ba fb | 45 5b 46 08 77 5d 2f b1 99 1f 08 51 eb 4c 0f 72 | a8 30 37 d4 e0 93 14 c9 30 d7 bb 42 f6 b8 c8 30 | 29 00 00 24 05 da 3b 09 ca 8d 7d 34 83 9f 78 eb | df 61 a7 a2 5c cf ab bd 9f ec 1f c5 28 21 62 1d | 76 6b 4d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 8c 39 b5 9e 7d c4 72 ad 0b 65 e5 | 90 9a 94 bf d7 bb 5c 4c 00 00 00 1c 00 00 40 05 | 4a fa f1 ac c7 6a 79 6b db 84 18 9d a6 a5 47 6f | 77 35 f4 f3 | libevent_free: release ptr-libevent@0x7f4974033468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #42 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 b8 c0 c5 1e 14 06 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 94 b8 c0 c5 1e 14 06 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.751171; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #43 | libevent_malloc: new ptr-libevent@0x7f4974033468 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 16 47 9c fc c6 70 04 3b 9d 49 7e 1c 4d 26 31 | e0 e9 9e 78 4b 6d 90 c8 ae 82 29 e4 1f aa 2c b5 | c5 9f e6 6d 00 ad ad 9d 00 cb 10 41 57 51 0c da | fd 04 8b 62 87 c6 93 e5 15 a0 59 b4 6b 54 54 06 | cd 46 ad c9 fd d7 62 24 89 ef 1f 74 02 97 cb 2d | 9f f0 0f 9a b1 7c 11 be a4 ef 76 fe 18 40 dc 9a | 41 6f d5 3c 89 a7 fb 67 e9 bc 1a 5d f7 c1 f5 6f | e9 9b 20 95 d3 74 c0 b0 e4 df cf 99 1a 3e f8 19 | 8b b5 71 20 43 94 69 21 a6 e8 a4 64 0e 44 50 4b | 0e f4 75 d2 ec 66 cc 82 de e9 98 d7 2e 04 00 09 | 74 df 96 bb 72 a3 54 43 79 3c 8f cb 60 2d ec 68 | 13 99 8e b4 7f 20 71 57 16 43 65 86 82 0d 47 08 | 63 d3 69 43 bd 6f 84 fc 0f f6 9e 49 0e 6a f6 b1 | 0b 2b 64 5f 44 fb 41 2a 50 8c 54 a0 c1 e5 8b d7 | 95 ab fa 98 48 20 67 fe 30 02 83 d3 8a be dd f6 | 8f d5 57 b6 06 1d d8 75 60 37 e8 e4 cc 6b ee 03 | 29 00 00 24 d6 aa d7 33 79 89 fd 76 49 5d 1b b8 | 32 03 1f 8d c0 97 a2 45 b8 89 05 21 5b b9 0c b0 | a7 ef 8b b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 e9 c3 cf db da a2 d9 9e 70 a9 c9 | 14 e4 7f f7 b9 55 bb 88 00 00 00 1c 00 00 40 05 | 97 fe 37 7e 43 92 d2 5c 81 bc a6 cd c7 20 c4 0c | 30 28 1f 3d | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #43 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 8f 8b 0c fa 82 a9 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | 17 8f 8b 0c fa 82 a9 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.813487; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #44 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 4b eb 7f b8 fd 04 d0 b1 07 93 d3 f4 e7 82 e8 | 4c 8d cb ed 57 17 4e cd 98 fc 56 17 ed 47 4b bf | cc 8b 54 e2 79 01 55 7b 14 b8 fb d9 6d 0a b7 61 | 47 a5 cd 0a 28 b1 b7 ec f1 60 3e 5e c0 d9 66 e7 | 84 a5 9e be 97 3f 51 46 f9 1b 74 22 4d b9 db 85 | 77 b3 f4 d8 51 6b f8 86 a6 9b 3b 69 80 a8 a8 a8 | 6b 4d bb 5c bd d7 79 04 80 5b 81 c2 a3 27 68 44 | 72 e9 12 a9 b7 01 b1 b7 32 a1 22 35 38 e6 ae a3 | d2 78 9a cc e2 53 df 18 b1 d7 88 4d 03 4a 88 f6 | 52 fc fd 82 67 f5 b6 2d be 7f df 98 99 e9 e9 d3 | f4 af 7b ed 0f 99 44 eb 4c 06 d4 9d 76 69 0d b8 | c7 a7 f1 ba 25 e6 5e 10 0c f4 88 58 a8 39 81 95 | 1d 2f 2d c6 46 95 8a e9 1f 70 c3 4f 1c e8 91 7d | a6 5e fd 02 b2 ee 76 e4 f1 98 93 28 c3 f9 88 71 | 13 e2 c7 3e de 4d c5 54 1d 0d 77 5f 94 5e e3 35 | 04 aa d1 d9 71 ed 17 61 d5 2f 87 7f 9d 61 68 c1 | 29 00 00 24 25 de ee da d0 f3 bc a7 27 89 4e 00 | 48 cd 68 bb d8 12 c3 62 10 60 16 21 4c d8 37 83 | 8a 63 87 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 9c c2 e4 93 ad 94 1e a7 b0 b6 e8 | 6e 80 7b a0 31 9d 76 60 00 00 00 1c 00 00 40 05 | 3e a8 3d b7 da cd bb 9b 2a 59 7a 78 c9 cf ca 78 | 6f a1 f0 7c | libevent_free: release ptr-libevent@0x7f499803e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #44 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 48 16 6b 2b 8e 4c 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 16 48 16 6b 2b 8e 4c 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.874789; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007939 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #45 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 3e 0a 4a 26 f6 78 c8 70 fc 60 cb eb 90 88 06 | 80 74 f4 7f de 1a e4 e4 62 d9 f2 f1 64 16 cd 7c | 3c a4 19 61 ca aa c4 3d fe 06 bf 1f 8e 0c 3f f9 | ae ea f6 56 b5 29 3c 59 58 30 bd ed 7c 98 dc 62 | 9f fb 73 ee cc df d6 8e 6c b5 55 30 95 7c 0f a4 | 3d 53 2f 32 33 17 03 cb 56 d8 1f ca 4a 60 43 b2 | 91 51 f0 93 e4 b7 ea c1 82 c3 0e a4 4b 75 72 0b | 6f cc 9f 6d 80 87 47 59 ab e3 e9 89 2a 5f 4b b2 | 16 ea 06 c5 39 ac 7b 49 7d 25 ba 17 87 e4 3d e6 | c2 86 61 52 4c 15 5d 12 0a cf 2c 72 d4 29 16 fe | c1 20 c9 47 76 eb af df 1f a1 2e c8 3c 98 3a 3a | 70 d1 17 25 d9 5b 7b 62 9f 23 12 14 ac ea 5c 7a | 02 4c a3 ef 09 af 97 d6 5f 24 16 ec 72 e9 b3 23 | 08 a8 40 a1 35 a3 78 e2 fa 30 af be a5 df 72 bc | 3d 45 b3 aa d6 52 5d b2 e6 8e 72 05 e0 15 fa 3b | 4b ab c3 b9 58 2e de 81 a3 bf af fa 44 b7 be 63 | 29 00 00 24 41 fe b7 c6 1c 81 00 6f 4b c6 2d d2 | 57 23 24 9b b1 8b 17 d7 f1 ee 60 66 69 05 1d f7 | d3 52 3d 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b5 2f db 04 7f 95 86 e4 24 30 42 | 15 9a af 9d 0b 69 31 c5 00 00 00 1c 00 00 40 05 | dd 43 df 03 bc 7f a4 c8 85 5a f7 e7 b4 a5 e6 b9 | 1e 51 5a 2a | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #45 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 8f d3 6e 18 4c 95 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | 0e 8f d3 6e 18 4c 95 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.935151; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #46 | libevent_malloc: new ptr-libevent@0x7f49b4030508 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 1b d8 5a 82 95 49 fa 4e a1 c2 8c f0 ce f4 fa | 7c 66 e4 83 53 21 91 35 7e 54 8d 4a 15 18 13 41 | 23 40 eb 7f 09 7f 99 c3 14 81 eb 65 2d e9 ce cc | 40 91 cc 95 ba 54 e5 ea f1 ff 1f 74 7b 8f ca f0 | b5 e9 e6 b3 89 58 98 55 e7 15 9a 92 18 23 41 d1 | f2 ca 5d 8b 8e 02 e7 8c 05 8d bf 3f e2 5f bb 91 | fd e7 8b 46 4d 0e 26 69 b3 e3 67 18 b1 9f 5d fa | e1 0b 56 73 f8 2e 4d 9e 30 6e 58 45 22 ee f9 da | 3f 14 2e 8c ba cc 16 96 62 0e 19 08 1e a8 5f 6f | 79 54 38 9f dc 16 06 95 a7 b4 c4 83 e1 28 7d c6 | c9 da 1b 04 07 4a 67 9a 48 3f 9e 57 99 7d 5b 93 | d1 04 5d db 9a a7 5b 06 18 57 39 1a d1 13 37 a1 | 2d 95 7d c9 a4 d2 10 49 3d 90 10 a8 56 29 44 13 | a9 67 2e ef ca c6 d9 3f 75 a9 8a 93 0d 2b a3 6d | 3c a5 c7 25 f1 b1 4b 22 cc 05 a2 c8 f3 34 21 93 | 69 4c f8 6d 1b 74 e7 f6 09 39 50 17 52 51 81 aa | 29 00 00 24 b0 7c f7 3c 10 21 04 f9 c4 4c ed 40 | 83 7b ff 73 5a c6 4b 0e e7 01 b9 dd be f1 ce b4 | 2f 0d 00 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 48 00 30 70 b1 a8 fe ed 5a 7e c6 | 82 16 cc 9c 61 d3 1e 80 00 00 00 1c 00 00 40 05 | 1e 7b c3 5d 47 28 c6 ae 71 9a 5d 30 22 1d bc 99 | 76 77 59 43 | libevent_free: release ptr-libevent@0x7f49a4043ad8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #46 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 dd f0 2d 76 35 24 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | 46 dd f0 2d 76 35 24 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0525 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10610.993499; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #47 | libevent_malloc: new ptr-libevent@0x7f49a4043ad8 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 b8 70 23 54 f1 a5 f2 b5 c2 ef d3 19 d7 9e 75 | a9 16 c5 0d 79 6f 07 22 89 ed c9 67 0d 1b f9 bc | 25 9c 0a ab d4 46 d6 e3 7a cc 5b 55 d0 fe e3 63 | 66 b8 ee 0e cc c2 a2 4b e8 b3 79 6e 4e b2 65 17 | d6 eb 61 3d 86 b9 19 dd 11 b2 ab 5d 63 20 67 a9 | f9 9d 24 32 e1 29 99 ec 77 50 8c da 72 67 8b 3a | 88 a9 7d 1c f7 17 c7 eb 1f 95 52 2e 86 7a a1 50 | e9 3e ee 6e ee 9a 6e 8f 4f 9f df 8e 45 02 fb 7f | ec 1c 8d 57 a8 40 b2 51 77 0a cc 1e 81 95 76 37 | 28 bb b9 d2 d2 c8 0e 5e 5d 58 3e 6f e4 87 56 aa | 57 cf e1 e6 2f dc 16 f4 a0 74 c4 a8 de 14 20 d8 | 54 d3 4f 0e 9c f7 36 f9 55 74 e5 1a 89 2d df f0 | 0f 6d e6 00 23 ec 92 08 60 b3 8f 84 08 d0 f8 04 | 89 45 e0 03 75 13 92 a4 d7 ed 52 0d 29 c8 90 7f | a6 2d c8 2e d8 24 d2 f9 96 ab f9 d5 a5 55 97 af | f9 21 d7 00 dc d5 19 cf 81 f1 38 93 37 89 8d 8f | 29 00 00 24 b9 1b 6c 4e b7 44 7f 28 d1 0f 14 23 | 8a e4 f9 40 18 0d 08 d0 4b 50 5e fe 91 1b 96 0c | bf 80 73 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 35 d5 65 88 08 fd 24 33 9d ef 6b | b6 58 6b 1e cc 63 5c 98 00 00 00 1c 00 00 40 05 | e4 55 2d 7f b5 a5 72 d5 6e d1 4e ea 92 ba be 6d | fb 86 11 a1 | libevent_free: release ptr-libevent@0x7f49a0028218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #47 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 46 83 e0 c6 c8 6f 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | 06 46 83 e0 c6 c8 6f 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.055139; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #48 | libevent_malloc: new ptr-libevent@0x7f49a0028218 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 d3 5b ea b6 04 c6 c4 5f 9a 58 29 0a 71 f4 f4 | c0 cd f2 4f 7a fc df c7 fb 50 3b 30 85 73 5b 3f | 76 20 57 73 40 3f 6e c7 95 a2 de ee 08 4e fc 2b | b4 f8 cf 20 d7 a3 95 10 9c f1 7b 03 f7 b9 d5 ef | 8b 79 45 a8 61 dd 5f 11 46 b3 c6 bb 83 ab 49 c1 | ef 85 23 a7 a6 ef 64 88 b8 bd 87 03 f6 fc 35 9b | 62 d4 9f 33 2c 8d f2 ae 44 f2 e8 81 b0 d4 57 70 | 56 cc 06 93 67 f8 cc c3 2e f4 dc 95 8e a7 bb 1d | c2 a4 ce 21 45 27 34 1b 1a c9 33 e6 e1 f0 10 23 | a4 73 4b 63 fe a0 80 9f 3e af a5 1b d7 00 c7 ef | 0a 0e 0c 30 69 9b 6e 47 ef 85 f0 2d 4e 62 a5 a6 | d9 c8 87 a3 de 3a 51 27 80 e3 12 65 64 d2 d3 b1 | 11 cf 9c 69 54 f9 55 e7 5e 29 fb e4 95 f5 23 84 | fd 11 d1 bc b8 ee a9 2a b2 56 1e c6 46 c0 ac b4 | b1 29 4f 9c 37 f5 8d 03 27 61 27 1c 9c b7 c4 2b | ab 54 77 fc f2 37 1b 61 c1 ad 75 99 28 54 e8 46 | 29 00 00 24 64 cf 40 97 e4 b7 12 bb 7f 6b b0 1e | 74 46 66 03 e4 a6 a2 ba d4 d7 b2 8d 0b aa 6f 0c | 86 18 73 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 34 5c 33 f7 50 05 a4 61 cd 6b 83 | 90 b3 ed 76 91 35 85 bb 00 00 00 1c 00 00 40 05 | b9 fc d2 dc 89 66 9d 7a 89 8f a3 ce 3b 18 0d fb | 17 5e 03 5a | libevent_free: release ptr-libevent@0x55564dac4448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #48 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 d9 f0 f4 cf e4 0e 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | e9 d9 f0 f4 cf e4 0e 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.115481; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #49 | libevent_malloc: new ptr-libevent@0x55564dac4448 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 06 a5 83 e4 c7 58 c8 d7 e9 b9 f3 f1 23 6f ed | b4 83 a3 41 32 55 a5 d1 08 d9 44 1c 72 16 d7 dc | da 66 41 63 09 97 83 63 a6 d8 4d 4e 8c c8 2b 57 | fa 41 7d dd bb cd dc 51 83 9f 15 4a df 57 51 c1 | 8d d1 a5 82 fe cb df 55 91 e6 f4 ee 90 c7 e7 10 | dd 67 ee f5 af b0 e9 4b fd 01 b6 e2 4a 9f 9c 07 | 69 8d 6c c6 c0 a9 6e e9 8c 9b 2e 87 21 27 6b 5a | ae 59 2c a6 32 1f a1 e7 ab 75 a7 a2 d4 3f 39 b8 | e9 65 ee 2c 6a e7 0d a1 ed cd 48 43 c3 90 ae da | fa 47 71 41 34 88 31 3d 89 25 d8 a6 9d 4b f7 a6 | fd e4 5a e1 5b 0d 5f e6 d7 8c 68 1a 8b 0b 09 d2 | 78 b4 2e 41 c7 b0 0d f3 41 dd 1f db 48 dc 24 56 | b1 ce ef 5b c2 fa 17 ab a3 6b d0 5f 4a 61 e6 d0 | 96 ae 51 e4 45 9d e4 23 de b3 7e 53 92 bd 15 48 | 64 6c 40 18 80 b1 78 84 c5 3e a2 2b 96 f6 e0 7a | 02 71 31 1c f7 6e 31 20 32 3c b8 1c 00 d6 04 33 | 29 00 00 24 4f ac 57 ee b2 40 0b 63 7b 3e b2 54 | c6 4c 6e 12 22 d1 bc b4 49 1d 98 05 a2 65 92 d0 | 5a 66 a0 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 87 89 9c 3c e1 40 cc ed c3 b8 ae | 03 9d 32 80 8d e9 c0 70 00 00 00 1c 00 00 40 05 | da d1 5e d8 53 c2 92 78 56 6c 9b a2 e5 8d 65 62 | 2d e4 3d 7a | libevent_free: release ptr-libevent@0x7f49a0043be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #49 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 1f f7 55 27 80 62 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 75 1f f7 55 27 80 62 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.175805; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #50 | libevent_malloc: new ptr-libevent@0x7f49a0043be8 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 51 2d 11 66 4b 12 63 43 51 93 7d 0a e3 dc f6 | a8 0f 96 e2 41 7c a1 7b 2b 0d 93 07 7a 27 61 ea | ee 89 8a 3f 58 46 18 19 7d c3 f6 2f 66 a7 15 0b | 3b 19 fb 40 e3 b4 94 a0 f2 66 66 55 ef a7 b2 93 | e4 e9 e6 4a 64 8a cc f1 a9 86 f5 a8 d7 c9 c7 63 | 27 3a 03 af 25 cd 33 4c ff 81 fd dd 30 a4 57 66 | bb 4a 8f 9c 8c c1 ac 46 73 6f 54 d1 fb 88 29 22 | d2 e9 cc 6b 25 41 1d 6c 73 89 ee ba d7 cb 2c c9 | e1 c7 57 ce 56 f4 3d 79 56 1c 91 f2 5e 2d b0 75 | 2d 84 6b 85 4e 89 bd 21 ee 20 48 e7 79 e4 6e 0e | 56 41 51 3f 80 bd f3 73 91 56 0c ac 46 b3 0a 81 | 17 a3 e7 f4 dd 22 6d d1 11 f9 86 0f 43 1b 8b 33 | 4c b2 b9 a4 2a 86 a2 9e 95 3b c8 c6 78 a4 f4 0c | e2 9a f3 58 95 2a 70 05 42 5a ed 40 54 e1 01 50 | b1 f5 23 f2 a7 6a d8 1f d6 88 0c 9e d3 ae 7f 6a | 64 00 9a 45 4c 0e d5 28 81 c1 64 86 d4 af 80 79 | 29 00 00 24 8d 4f 00 39 d9 67 17 6f 6e a1 a2 fa | 78 a8 a1 35 38 6a 93 77 12 d4 61 5d 55 34 a5 b0 | 30 6d e9 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0d 03 14 6c 0c 82 31 76 27 78 bd | 3e 70 1b 39 7d cb 2c a8 00 00 00 1c 00 00 40 05 | 42 df 47 af e7 36 c1 c4 2c 86 29 2f 68 2b 4a 3c | 42 7a 76 67 | libevent_free: release ptr-libevent@0x7f499c01d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #50 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 91 78 40 40 d2 7e 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | db 91 78 40 40 d2 7e 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.234153; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #51 | libevent_malloc: new ptr-libevent@0x7f499c01d1f8 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 54 cd e6 1f 5d 41 3b 94 e7 4e cb 17 51 23 17 | a9 eb 4a 9f 24 b2 b8 74 aa c4 fe ba b9 b4 c2 0c | 72 94 47 7e a8 94 f6 ed b2 61 ba f8 47 97 8c 34 | 84 5e ff a8 03 88 f4 ba 96 36 25 b3 2f ad 6a 6b | 84 73 9e f6 be 63 4d d7 3a db e6 33 da 10 9c b4 | 7a b0 d4 9c c9 65 91 73 85 7e 05 c2 3b 9d 11 78 | 27 62 20 57 15 59 60 09 34 ac 7f 2b 1a 79 5d d8 | 12 df 0a 67 d5 d9 9d 0a 1c 9b 03 81 bb 57 be 1a | cd 0e f4 bb 02 54 17 e2 39 b2 e5 2d a8 87 7f 20 | 2f 1e 40 e1 00 74 5f bc 90 9b ab eb 30 19 5a 48 | 1e 71 b6 c3 40 90 c3 92 6c 8a b8 1c 4f e8 f9 69 | 5c a1 00 e7 05 9b 51 07 ab b9 92 8c 61 1f 69 6b | 15 ff 42 d4 75 5a 3b 4f 23 ac e0 d1 1a c0 89 75 | 6e b2 de 8f aa 6d b6 b4 d0 1e b9 17 12 12 63 af | f3 30 fe 49 73 71 26 9c d1 d2 f8 58 2f 9c 65 b6 | 77 b4 2b 8d 47 78 32 80 38 54 e0 0c 9f e9 73 77 | 29 00 00 24 33 01 f2 76 79 bd f6 bb 64 4a 03 8e | 79 3e d6 d4 fb 7b 22 c9 c0 14 a3 a7 30 87 a1 b5 | 97 a6 d8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f bb aa 36 96 ad 83 4b 5a b3 99 a6 | f8 ca e0 6e c8 85 b7 dc 00 00 00 1c 00 00 40 05 | d2 a2 9a 3d 66 08 bc f6 58 ac d4 7f 14 49 3a 3c | 44 af 6a f9 | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #51 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe cb 8c 8f 18 d2 f0 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | fe cb 8c 8f 18 d2 f0 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.295535; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #52 | libevent_malloc: new ptr-libevent@0x7f498802db48 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 69 86 e0 2b f8 20 75 0e 6c 25 98 e7 df df 76 | c3 4c 56 4d 24 29 0e f8 58 fb e5 bb 35 aa f1 df | 68 75 ff 11 b1 22 98 2f 45 24 1e 02 0b 88 3a d5 | 52 62 d3 03 78 69 a1 68 a4 f5 0f 13 82 d1 e4 f0 | 5c 51 b5 3c a5 e8 37 f8 a7 2b b4 5b bc e4 a0 c9 | 7d d2 de 68 07 38 ec d5 ee 2d 43 6e 03 78 0f 05 | 9b 49 6a 5a f3 d8 4e 41 d2 84 3d ea 80 69 89 a6 | ad 08 d0 c9 5e 5f 73 52 2e e3 ee fa d8 c2 ca 98 | 79 2d f5 fe 79 3b 46 28 a6 fd fd ee 77 19 bb 1e | c6 80 f5 03 be f3 6d 00 94 2d e5 0d 18 f0 7c 5b | 6a c0 40 36 b3 75 df a6 09 c9 7a 05 70 76 d7 e5 | f9 3d 78 97 f4 f4 c3 5c bc 88 c1 bf a2 01 f7 75 | 3d 5c 0a ee 1b 02 e0 b7 9b 09 4d 46 0c 2a 43 52 | 19 05 7c 46 cf 18 d6 43 42 89 c9 b9 c9 9c 4c 73 | 6e ba 36 55 25 34 24 f2 82 c6 7b 65 0e 28 00 51 | 37 ba b7 1f 31 20 7c 9c 97 ab 81 8e fd 98 c4 d2 | 29 00 00 24 03 c8 69 24 20 91 47 02 fb e0 80 78 | a3 b0 d4 f7 c4 b5 bf b5 86 10 76 74 58 07 f5 eb | 9b 0e 58 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 a3 fd 5c bd 4d 61 8b d4 92 65 6e | 48 d5 d7 b1 80 11 5d c2 00 00 00 1c 00 00 40 05 | 6a 44 cd da df 04 60 40 51 e0 18 cb ac ef 50 06 | bc 07 30 1e | libevent_free: release ptr-libevent@0x7f498c043b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #52 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ae a6 24 39 a6 0c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | db ae a6 24 39 a6 0c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.356844; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #53 | libevent_malloc: new ptr-libevent@0x7f498c043b98 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 13 16 ee b1 8c af ed f2 1b e8 9a 03 16 22 0e | 54 74 b7 43 96 bf 2c 45 79 04 97 c9 d2 15 31 25 | e3 40 9b cd fc 19 8b 93 aa 58 39 b2 da 16 cd ac | 32 5a c1 7d 79 4a 7f 8b 5a 4e 2d 5e cd 3e e5 52 | b5 ae c3 57 d9 56 7f f8 ee 5c a6 03 d7 54 6d cc | 91 37 f8 b6 b6 de 1c 26 54 cd 5e e8 17 4c b6 ed | 95 7b 4a cf 09 7e 31 81 b1 5f d0 75 48 72 5f c3 | 1a b3 74 bc f3 67 e7 0b d3 8c e0 9e a2 39 db 25 | 5d 13 f1 49 4d 1f 2c cd d9 0e af ac 7d 90 e5 d1 | 39 4f 71 d8 4b e7 1c 0e cb b3 cc 47 44 66 10 77 | 83 a7 fe 49 db 93 51 a4 1a 92 46 f0 53 11 04 3e | 22 5d ad d2 d6 fd 77 f5 23 1c 2f 52 0a 32 01 0e | 65 84 9b fa 29 dd e8 51 48 59 83 70 cb e0 80 c8 | a3 b3 0f 4e 02 92 45 02 04 e2 5e 1d 66 ab ef 41 | 10 29 d6 91 45 83 f7 a3 70 0c 10 91 19 9f 1b 46 | 2d 7c b9 18 a0 c7 a0 49 c6 29 10 48 1b bb 71 f7 | 29 00 00 24 4f 15 71 bd 96 71 48 3d a3 e5 1f 94 | 87 92 41 d1 f3 8c f2 20 8d 9e f3 cf 66 81 a1 b9 | 4e 18 e4 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 2f c3 97 67 08 79 30 2f 84 31 8c | b0 70 46 9b f8 12 7b 02 00 00 00 1c 00 00 40 05 | 4d 36 d3 5d 91 1b 9e 07 61 31 38 e3 80 6f 02 c7 | 4b c5 99 b4 | libevent_free: release ptr-libevent@0x7f49900332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #53 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 36 ba a1 0a 4d 3e 94 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 92 36 ba a1 0a 4d 3e 94 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0559 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.444219; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #54 | libevent_malloc: new ptr-libevent@0x7f49900332f8 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 40 67 fb 90 cb fd 1d 5c fd 7e a4 ac 66 6b e1 | 8a 24 0e c4 28 04 9e af 0e ba 39 8f b9 3e c9 1f | f3 2d 98 68 eb ec fa ea 32 e9 3c c0 23 29 5f 48 | 05 1d 2d e2 01 bf 82 40 d7 01 c1 c6 b6 15 d3 5f | 35 7e 51 c3 86 69 c0 c3 6b d1 7f ea 9b 77 49 55 | 72 a6 55 d5 bd 64 d2 71 c1 35 8c 3d 43 08 c4 6e | 53 07 43 71 9f 9d 93 df 0f 42 22 57 52 cf cf 7e | 92 a4 2c d4 89 27 40 af 03 15 5c ca f4 61 19 9d | bb 7f 0a 0e bf ec 82 ad f0 70 cf 20 d6 4d 9f d0 | 82 ea df 97 8c af 7f 8e b1 6a 8e 1f e5 33 ae 70 | 50 69 0f d2 21 f4 a0 7c 78 78 a9 17 83 56 10 6b | 87 4d 31 b9 b0 aa b6 e0 0b 7a ad a8 bc 91 30 64 | 56 95 db cd ed c0 41 94 1a 62 51 16 7c 81 af 03 | 8b 13 69 c1 2f ac e4 f4 7e a2 f1 cf d4 12 e2 7a | fa 85 85 eb ea 25 6e df fb cd 48 a4 bd 02 cd 76 | 8b a8 7b 10 3a 2e 51 4e e3 67 36 fa eb ef d7 f6 | 29 00 00 24 f2 73 17 5c 76 18 24 da c1 74 39 e5 | 2c 7b 97 e5 de 1e da c1 b2 15 d4 8a c0 2b ea 1b | 16 1b 2f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 8a fd ee 1d 2f c2 fa 1e c8 51 e1 | b0 24 0f 79 7f 72 85 6c 00 00 00 1c 00 00 40 05 | 8c 6f f4 ff de d6 8e a9 1a 0b 2d 6e c7 c0 dd 39 | ac 6f 25 17 | libevent_free: release ptr-libevent@0x7f49b003e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #54 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 de ce e9 5f c7 58 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 57 de ce e9 5f c7 58 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0684 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.507554; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #55 | libevent_malloc: new ptr-libevent@0x7f49b003e2b8 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 cb dd dc 95 79 57 f8 21 66 34 72 af a6 4f e9 | c4 f8 41 03 92 8a c0 d8 c2 53 2a 56 4d 63 47 20 | 59 9a a4 2a 5b 44 d4 3e 1b c4 aa 36 0c 30 c1 c2 | e8 7f 42 71 cd 11 af 39 30 14 a5 ca f5 0f d0 9f | 01 d7 11 60 a4 fa d0 69 db d9 fd 1f 63 74 8f 8b | fb 41 4c 51 c2 f9 7f a3 3b 11 ba 27 48 68 27 b2 | d2 5d 42 5b 31 4b e4 1b 02 92 9a 7f 69 29 0e 21 | ee cb 76 da fb 50 de 96 d0 b7 b1 f4 6e a4 6e 05 | cd fe 22 ec 08 cb 9e c9 cc c2 aa fc 34 f8 05 06 | 39 00 0f 06 32 87 db f0 b7 0b 18 e6 e4 84 d0 95 | bd b5 6e ff 16 35 05 c0 d4 69 6d 68 56 60 5a 6f | c0 8c bc 35 ac eb 7c 50 09 2d 63 d0 d9 33 7a 8b | 2e d8 28 ab d3 36 b4 d2 a4 64 e0 94 39 0e c5 f9 | f6 c8 a9 35 3a ae 0d 0a de 54 82 f8 cc bc 46 a4 | 46 7d 54 59 9a 95 91 c9 e4 f0 6f 96 11 73 56 a1 | 0f ac ae 26 8c 7c 21 94 04 32 15 b9 2e 4c e2 1f | 29 00 00 24 89 03 cb 05 ff 5e 57 cb cb e6 b6 86 | 2a cb b7 60 da e8 61 e2 f9 ec 1e f7 61 0e 16 fd | 37 26 da 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 65 ed 1b 29 65 6d 54 1c 96 26 f2 | 0c 81 c1 25 21 59 3e b9 00 00 00 1c 00 00 40 05 | cb df 9c f2 f5 94 f1 7d 04 c4 ba 68 e0 52 f9 9a | 23 e7 bb da | libevent_free: release ptr-libevent@0x55564dac4528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #55 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 50 a2 8f 31 56 2f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 94 50 a2 8f 31 56 2f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.564932; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #56 | libevent_malloc: new ptr-libevent@0x55564dac4528 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 57 92 aa 29 d5 3a 8a 5d e0 18 72 e9 51 66 88 | 75 1b 4c a1 75 85 97 c0 98 c0 82 40 10 02 d6 3f | 24 eb c2 bb da cb de 40 2c 3e bf ba 54 dc 4e e6 | a6 ef fa d3 9e c0 62 f6 b1 88 ac be 93 04 d1 4a | a3 4e d9 7d 0f 68 7e dc 71 ee 75 e2 fa 19 69 28 | 7d 5d 55 c7 12 bd 15 09 ca 8c f5 29 a0 cf 7b a1 | a6 3c 9a 38 c3 8e 04 97 cb 2a b5 86 1e a5 47 a2 | 6b e7 47 51 64 a0 c3 e3 f8 be 68 0a 83 a8 41 d8 | c8 5a f0 70 20 b8 aa 1f 93 c4 5f cc 2c f9 de d1 | b3 3a bd b8 02 6f 39 54 7f c5 48 f9 a9 7c f2 6b | 4e 33 31 2a ed 22 d9 a9 0b a7 31 47 00 59 ee 8a | 7f d1 12 ef f6 23 2d f3 51 35 68 9d 13 69 72 fc | e1 33 fb f3 30 96 a6 8c 89 14 72 25 26 06 c6 02 | 28 d3 73 6a 03 5a a3 8e ea 55 5c 8b fc 87 eb 8d | 75 af 0a 60 3b 0e ff 29 45 a0 cd 71 6d 7e 6e 8e | d7 3b 44 4e a4 68 9c ea 32 18 c4 76 35 18 dd f4 | 29 00 00 24 9f 45 46 b2 79 f1 76 78 f2 9f b1 ed | 98 c4 e7 73 99 6a 10 03 4c 05 d2 47 b7 63 01 df | 84 ab f5 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 e8 9a cd bb 9d c2 d8 91 32 10 f6 | 44 f3 0f 36 3f 0e fb 4f 00 00 00 1c 00 00 40 05 | dd 1b 4b 38 c8 b0 67 ca a5 06 b4 22 28 4b df bf | 48 7d 7d 53 | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #56 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 13 a0 a8 d4 bb cd 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | 7e 13 a0 a8 d4 bb cd 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.625285; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007379 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #57 | libevent_malloc: new ptr-libevent@0x7f498c02dae8 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 24 f5 63 34 80 fa 5d e2 db 33 6a 94 87 6d 2e | 72 e7 31 2f ce d3 c3 f6 b0 c1 5a e1 f9 ae 0d 1b | 1e 08 95 8f 21 f8 8c 96 bd c6 fd 1a 97 7d e4 98 | bb 2a 03 49 07 cc c5 dc 8c 6c a6 1b 3a b2 bb 23 | 67 72 01 5b dd 94 e7 b2 62 92 a3 c0 55 5f bf 53 | 15 63 7e 25 c3 23 a0 c2 c3 81 d5 89 f2 c6 30 54 | d0 f6 26 83 92 b9 b4 ec 4d 43 0b 7f 58 b6 83 31 | 05 32 d2 72 3d fd 38 b9 12 f9 fd 4e 15 95 eb 33 | a4 a5 cb 5c 97 0d ec c7 54 e3 1c 9e a8 47 34 be | f0 46 9d 4e 11 d9 df ab ff 13 6d 36 47 d9 54 0c | 2a cc 33 59 a8 f7 57 49 fa e2 12 e3 55 28 19 2f | 9e 56 81 dc 05 b9 0c 2a c5 82 2b 29 0b f5 d4 0e | be 3d d0 7a 13 1e 8e 04 20 65 11 6b 29 4b 0a bf | 1f 0d 9f 2d 65 4d fd 46 e3 e7 d0 74 b5 d5 8c d3 | 5a 6e 01 1d 08 51 3e 5a 84 ff 93 f4 0a 8c 63 f8 | 44 5b 9c 5f 99 52 c5 0c 5c 56 43 03 51 08 96 63 | 29 00 00 24 bf e5 5a 8e 9a c1 c6 c8 a1 77 8d 6a | 64 a1 20 61 d1 a1 a1 10 dd a3 29 91 37 6e 83 b8 | 0a 52 b5 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 1d 96 fb 1a 5e 9f 64 b7 4d 45 f2 | 83 be f4 f9 ff 1a 96 5d 00 00 00 1c 00 00 40 05 | 35 60 dd ec 79 fe 08 79 97 80 e0 19 2d 04 89 03 | 43 8d df d1 | libevent_free: release ptr-libevent@0x55564d9dc798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #57 spent 0.0923 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 89 eb 80 d6 38 b3 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | f4 89 eb 80 d6 38 b3 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.711583; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #58 | libevent_malloc: new ptr-libevent@0x55564d9dc798 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 91 37 34 fd 74 61 37 ea 3d e2 70 2c 69 7e ee | d2 82 74 8f aa f8 a0 4b 95 3e fd 47 e6 70 59 e5 | b6 0b fc a7 e5 3a 38 48 ef 6b ec 75 29 45 74 a1 | 18 15 d1 04 52 75 c2 e7 30 90 38 ac 90 6f 17 b6 | c0 d2 e2 cf 0b 21 0b f0 36 51 4e 17 47 29 dc b2 | 07 48 86 69 3c 77 24 63 7b 8b c4 9f 37 9c 1f 2e | cf d5 f3 99 e4 33 91 24 37 7c f8 b8 d3 67 07 d9 | df 1e 08 9c fc a3 3b 6d f6 7e 09 67 df a6 19 10 | 37 81 a8 5a 38 1f a0 b6 8b 8c bd 22 f6 ab 81 95 | 6b d6 e5 c6 3f f9 55 14 64 fc 31 38 9b 07 90 9d | 0c 8b 68 70 3d 12 1e d1 c1 f5 aa e7 57 ea bb 67 | ac 21 63 30 fd c5 eb f7 03 76 fa b0 37 62 97 6d | f6 2e 66 f0 25 a5 fa f4 69 69 23 22 86 31 f6 3f | e6 64 81 aa 6c 65 07 59 cb 72 a0 8e ae 9a 57 03 | 52 b4 f0 cc 5f e2 10 62 d6 62 94 68 c3 64 09 52 | 02 85 7e 1c 01 ad 25 0e cf 43 a3 47 74 03 cf 81 | 29 00 00 24 01 73 d4 28 da 8a 47 15 66 82 b5 f0 | 7a e0 2f 71 36 15 4a c2 56 cc 79 fb 08 1f 65 f7 | 06 51 e5 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 34 d1 80 a6 a3 01 ef ed 8b a8 eb | 79 63 8d 12 e8 e6 52 7f 00 00 00 1c 00 00 40 05 | 21 da 8a 5c 73 a1 e9 8e 95 6d 58 69 c2 cd 99 04 | b6 fa e2 27 | libevent_free: release ptr-libevent@0x55564da4c0a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #58 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe ea ef 64 44 40 e5 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | fe ea ef 64 44 40 e5 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.795965; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #59 | libevent_malloc: new ptr-libevent@0x55564da4c0a8 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 57 42 55 ec 9c 7b 3c 65 ac 95 5f 64 19 7b 8f | 87 cd e1 19 16 0a fa 28 3c cb 61 f2 e5 d7 df ea | 52 75 ca de e5 12 ae 07 b3 af af 2b c8 32 84 de | 78 71 cc 12 f1 eb 4a ae 59 6f 85 5a da 73 e3 75 | 10 e6 f2 24 47 48 28 7f dd eb 42 5d a6 7b 67 db | ad b4 7c 1b a9 0e 1b 1d 60 78 72 23 0e b3 89 7e | 14 c0 99 41 3e 25 c5 22 71 03 a6 19 14 79 0e 57 | ce 05 4b 5c c3 98 f6 d1 76 6f e3 95 24 71 7b c7 | 67 08 f7 0a fa 4d 36 96 b9 01 62 a0 42 bf c9 c1 | 94 43 fd c7 ee f8 fa e1 8f 8d 57 e0 64 e2 a9 5f | 15 98 c9 a9 27 63 1d fa bc 2d 65 4b b1 a3 f0 39 | 41 5d 45 c0 22 6a a6 55 72 ec e5 6c 93 a4 35 07 | 2a 3d a4 51 f2 80 dc 00 f8 fd 44 3d 34 57 6c 46 | 7e 40 ac 35 6c 7b 3d 10 04 27 84 55 44 08 a3 cb | d2 03 eb be 6b e9 41 d7 06 63 09 87 53 e3 3a d7 | 73 37 a4 f2 d1 f7 8e 7b 39 8c 32 9a 4e 88 c8 25 | 29 00 00 24 f8 b6 ee 23 29 22 f6 42 d9 f7 42 7a | 7f 56 89 4d 94 92 b6 f2 15 b0 b8 42 d0 8f c5 c6 | f2 0e 05 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 07 b1 84 0b 96 81 7c 6b b1 f8 ca | 30 e1 4b 88 38 f5 51 02 00 00 00 1c 00 00 40 05 | 01 b2 13 00 b5 2a ee 09 05 71 a3 19 af 56 c3 ea | 5f 79 63 08 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #59 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 9f f4 03 42 0d 48 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 56 9f f4 03 42 0d 48 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.852258; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #60 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 4d d6 82 5e 93 56 ad 68 f6 ff 37 b8 37 66 4b | 24 55 96 d7 99 d1 a9 59 d9 92 65 a3 6f 39 28 d9 | d5 34 a3 92 9d ec f1 af f1 f7 45 6e 1f 16 66 d3 | c9 e4 00 fb 38 17 67 8e 41 14 46 b1 4d a2 64 f6 | fd 34 6b 31 27 4a 84 48 50 16 8a f7 f6 54 f7 68 | 2a 5b d0 4e 16 53 29 88 c8 2b 2f 31 0f e3 bb 22 | 46 d5 b1 8a f7 ab 3c 2e 81 92 9e 5e 0c 33 b5 1d | 84 b1 c2 40 7a 2b 5d 47 93 4b f0 0d 4d bd a0 d1 | a6 32 6e 86 81 f1 e0 8b eb e3 72 c1 ee a5 50 1f | b7 e7 bc 33 64 95 62 95 d6 d6 2e 79 0f 8b d3 d9 | 39 37 98 29 25 bb 20 d1 13 25 61 57 96 8f 2f a5 | a0 37 af 1f 37 45 7d 82 9d e5 0f 72 c3 7f 4e 0a | 68 c9 3c a0 f3 40 7c e5 5a b8 e2 49 b6 d1 44 93 | 1d 58 cc 56 6a 27 03 f6 9e d4 e2 ab e5 df d2 7f | a8 f0 1f a3 26 5a 51 cb f5 9b 33 d2 e3 34 a8 2d | 68 ea c0 bc 63 15 21 90 07 97 6d 3c 95 71 c9 1e | 29 00 00 24 e5 a2 8e d0 55 22 3f f5 38 61 25 5b | 41 d4 36 6b 98 fd f5 69 d2 60 0a 2b 4e b8 db de | 2a 18 c0 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 89 01 aa 56 d0 2f df db 86 d7 09 | 92 98 b5 ab 53 a6 be eb 00 00 00 1c 00 00 40 05 | 9d d8 86 a8 13 73 d8 2e 0c aa 66 d8 df dd 07 88 | de d9 c4 40 | libevent_free: release ptr-libevent@0x55564daaa3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #60 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 ec 4a e5 91 2e e5 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | b9 ec 4a e5 91 2e e5 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10611.913632; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #61 | libevent_malloc: new ptr-libevent@0x55564daaa3f8 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 25 25 cb a6 6c 1d cb b8 cd 07 4b c9 5b a8 2a | 02 1c e9 96 21 a7 85 64 70 81 56 58 4b db e5 68 | 05 d8 7f aa a3 9c 35 a6 f8 0b 81 6e 65 ca 45 ac | 6e 21 16 76 7e da a1 63 e3 3c 27 fc 4f 33 e8 80 | be 7b f3 81 56 0e 5a 64 d4 7a f6 6e 5f 94 f9 2b | 81 be fc 1c ce 6b fb f8 77 67 f1 9b c3 8a a9 88 | 0e 2e d2 58 b6 af 86 77 8b 55 08 67 34 56 4c 50 | a3 b3 36 2c d0 c2 a4 ce 6d 59 66 c2 bf 50 98 f2 | e6 9e ed 7d d3 b1 52 b9 21 10 53 42 a5 ca f2 11 | 93 94 ce 96 2d f0 be 59 d0 4c 32 d7 e5 8e 34 51 | 82 1c 6c 9a f6 26 75 c1 e9 13 00 a3 f5 e3 ae e7 | ae 2a e8 dd 65 50 6e 8d f8 48 44 34 19 95 d4 6d | 41 3b 7c bf db 0d 88 f7 f7 e8 e8 3d 9d 69 f9 24 | 43 5a 8d eb e3 85 f9 91 be 32 75 5c 4a 0a b1 6b | 01 b1 f7 e2 19 b6 c5 4f 66 96 6a 23 a7 34 89 29 | 48 86 d1 aa 40 05 b4 e3 f7 3d 1d da 1b e4 2f ad | 29 00 00 24 18 84 ed 60 b0 44 f7 15 23 9d 77 2d | 45 88 d3 c5 1e 3d 1a 5d 4d aa c3 a6 05 57 b3 40 | 32 df 2a ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 6b 4a e1 35 bd 4e 98 3f 30 8f 4c | 6e 9e bb 3e 7f 56 6f 14 00 00 00 1c 00 00 40 05 | 40 8c b6 2a 9e 5b 38 99 f7 08 d0 c6 68 32 5b eb | 92 c8 3d bd | libevent_free: release ptr-libevent@0x7f496c033518 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #61 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 75 e2 bc 23 01 80 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | 97 75 e2 bc 23 01 80 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.00306; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #62 | libevent_malloc: new ptr-libevent@0x7f496c033518 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 83 a3 02 7f 68 12 90 8f 84 79 a3 57 c2 a5 40 | 64 ff c8 4f 5b 73 f5 f7 e1 bd 54 c0 6b 97 da d3 | 99 ca d2 45 a2 56 2b 81 36 c5 65 be 67 83 29 af | ff aa 4b 43 4f c1 75 b2 79 3b b9 1d 21 3d 3f c5 | ba f9 15 f2 a3 da 65 0c a7 57 73 e8 9a 32 f2 9d | bf 17 45 62 8f c3 b9 f5 21 bb d8 bb ec 81 10 47 | cc c1 21 b5 d5 d4 4b 9c 74 e8 ec 44 11 d5 5b 58 | 7d fc ee de 68 ac db 59 7e 9f 5a 5a c6 db 10 61 | 53 79 7f 26 19 a2 37 d3 e8 9f 44 9c c8 b0 89 f6 | cf 1e a4 bd 33 90 72 7e c6 fd 1a 57 20 a0 ac a3 | 94 15 09 81 38 25 f2 7a b5 ad 3d 88 f6 84 81 31 | 7c c6 7a 7a ac 5e 63 fe e4 8d 24 bd af 40 25 74 | 31 0c e6 b8 b4 87 8b 89 c5 ab 3a 66 9f 96 ff c1 | 4b 68 08 7d 26 bb be 77 ac fe e4 09 53 47 56 43 | a5 0a 8e 57 df 07 75 89 4d 18 a0 00 1a 41 12 44 | f3 fa bd c1 7a d1 6c 52 27 f1 1a f7 8d 26 87 85 | 29 00 00 24 cf ac 0e f6 77 95 81 42 bf a8 42 1e | e4 9d 56 7d b0 24 83 76 1a 60 d6 04 26 c3 2b b0 | 30 d2 ef b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 66 47 f4 0b 62 20 91 3d 53 b7 39 | 8e 7e 2e 85 2a 0e 2d b4 00 00 00 1c 00 00 40 05 | 35 20 91 84 0d a2 2a df f1 f1 20 60 00 de 05 56 | 2b 46 6e d6 | libevent_free: release ptr-libevent@0x55564da26698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #62 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 b5 0b 8d 2e f8 83 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | 84 b5 0b 8d 2e f8 83 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.090409; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #63 | libevent_malloc: new ptr-libevent@0x55564da26698 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d0 16 9c 0a fe 4e 9c 71 c0 d0 18 e5 a1 ad d7 | 0d d6 ed ff ca 27 69 37 9f 41 06 da 21 50 97 30 | 33 41 5d eb b6 0e 01 17 2a 28 82 58 15 d9 ff 39 | 53 4a 8d 80 e8 6d e6 2c 7a c5 83 b1 dd c7 a0 ad | 78 86 52 86 2a 75 f5 38 1e ad 61 82 90 25 30 d6 | 30 f3 68 ff 79 dc a0 43 5e 44 67 6a fa 21 81 98 | 6a fe b1 13 7f 9a 84 ee 73 a1 37 bd 37 45 93 f0 | 98 3d fe 8d 68 04 7d 71 02 25 6a 0b d6 ca 7e e3 | 17 a1 5c 70 ad 34 b7 14 a6 94 dc 2f cb 76 76 67 | 7b 9e 1a 30 e7 82 2c 5d 43 98 bc af b5 ee e5 1b | c8 dc 8b 4e 71 b5 82 75 06 01 7c 43 f3 26 30 74 | ec f1 ac 7f e7 5a 79 5e 08 9c 4f 61 e3 bf e9 c0 | ea 34 8a b1 01 df ce 4c 51 bc b7 a3 d5 d2 41 51 | a2 d4 85 e5 eb 13 00 da 9f d9 c5 56 98 45 84 cb | 7d f7 65 8b e3 f3 11 21 d5 eb 28 4e c0 b7 3a be | f5 91 f9 12 e4 69 8d f7 66 1f dd 1a 0b a9 57 dc | 29 00 00 24 2d 4e 3c 0f 0a 38 5d df 8f cf 1e 49 | 25 ff e6 a5 f3 88 1f f7 b5 7d 41 2e e6 59 92 90 | ef 08 75 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 14 ca a1 2a 7d bb 05 85 70 8e 7b | b7 09 ec 03 6d 03 e0 4c 00 00 00 1c 00 00 40 05 | 30 c8 9e e4 da 4d 54 78 d6 43 61 1b cd 8e 75 81 | cd a2 55 10 | libevent_free: release ptr-libevent@0x55564da54b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #63 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 40 af b8 b2 de 93 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 14 40 af b8 b2 de 93 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.156753; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #64 | libevent_malloc: new ptr-libevent@0x55564da54b18 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 6c 2c 25 c8 34 6c 52 50 6c 81 67 20 a9 f5 89 | ad 0c e5 a4 1a 61 06 4e e7 16 e4 de b2 f9 2b cc | 33 6d 12 ee 11 c9 6d c0 d6 b9 70 8a 84 41 6c 90 | 10 10 00 eb bd 75 64 1a d6 ce 32 70 aa 82 d3 d6 | 0e 1a cc 02 b5 e8 6a 96 db e6 bd 8f a8 2c 7a bd | 06 02 1f fc d6 fb a9 a7 1a 6a 28 ce 9b 22 01 60 | 43 b3 c2 8a 03 a3 d5 a7 57 15 9b 89 b5 e5 2d 07 | f0 76 74 69 1b 18 c5 f4 0b 0e 7a 2e 7f f2 74 b6 | 35 48 d1 a1 80 60 a2 ca 6d d4 a8 11 8a 38 a7 cc | 12 46 09 97 14 28 9b 65 6f 4d 8f 8a e6 45 5d 3e | 12 d3 9d 69 2e b7 29 da b0 8e 7b 54 76 9e 7a e5 | 37 34 de 77 25 2f 16 29 66 86 ec 90 43 50 b5 0e | 75 06 6d a8 18 13 bb 7b a8 b0 09 3d 00 b6 97 41 | 2e 5f e9 a2 fe 62 11 c2 d9 09 e7 36 e7 38 69 c8 | 13 aa 99 a1 1b b3 64 2b 74 48 82 2f ef 7d c8 2d | a7 44 c2 93 ef e5 ef 4a 30 3b 90 b3 cd ca dd 44 | 29 00 00 24 7f f2 2e 42 93 b6 91 9b b2 d0 42 6b | 51 44 18 9a 8b 9a 58 d1 d0 08 0a ea 0b 12 7c d4 | 24 cd 56 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a2 76 26 20 c0 94 19 01 d5 27 9c | af 81 dc 89 3a 15 b7 50 00 00 00 1c 00 00 40 05 | 7d fc 49 34 e0 4c 76 0c bd 68 fc 76 f6 80 80 5c | 81 97 24 39 | libevent_free: release ptr-libevent@0x7f49b8014d08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #64 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 4f 4b 15 71 bd 1d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | ad 4f 4b 15 71 bd 1d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.2161; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #65 | libevent_malloc: new ptr-libevent@0x7f49b8014d08 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 7a 50 5f 5d 77 b8 0a 9c 15 4e ef 79 90 10 cd | b1 0f 76 f9 6b df 7e 69 49 c4 4e 75 5a b8 cc 28 | 49 86 37 d3 ba 62 f4 ef 75 e9 e0 cd 83 cc fd e9 | d2 9c 44 53 e0 1b dd 1c 5c a6 96 bc 14 ed d1 ea | a8 0c b1 22 51 39 c1 cf ea 20 79 f1 d0 10 de fd | 4d 47 0c af c7 59 c7 09 c8 4d c3 0a 4b 2c 8e f2 | 25 44 9f 10 df 61 0e 50 0e fb 64 fe 81 c5 8f 71 | 42 2b 90 7d ff df db 27 4f 88 3e c2 ff bf 72 99 | 39 26 d0 04 e0 f1 6b 19 22 59 7e 6a bb a2 d7 bd | 2a 53 97 c5 5a 0c b0 a4 5b e4 a0 88 80 68 88 30 | 99 cf b7 15 3b 12 17 df 8c b6 c4 e1 cc 74 87 28 | 5c 1b b1 fd 89 c6 20 6f 28 28 0e 9d 3a db 68 aa | 01 49 37 99 59 37 f4 b9 c7 3a 6a 82 df 68 84 8a | 7a 23 5d 08 02 cc fe 67 d0 60 7f 35 00 e0 7c 6f | f7 35 1d ff b8 9a 80 64 60 ab e0 22 70 a7 62 0f | 91 f5 da 7b 73 58 0d ce 38 6e 5d a2 54 63 9b 23 | 29 00 00 24 b0 9e f5 6f 1f 74 ce 27 98 92 d9 2a | 0d 4a 48 31 d0 77 88 fd cb ce df 79 87 cc 9a 9a | bc a6 87 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 ec 8c 74 76 c9 0b 9c 95 38 28 53 | 78 e9 32 25 ff b5 f0 f7 00 00 00 1c 00 00 40 05 | 9b f2 0c c4 57 11 a5 4f ca 2e 95 90 cc 27 9f ad | 4e ac d9 cd | libevent_free: release ptr-libevent@0x7f49a40492e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #65 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 90 18 74 c9 34 56 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | 8a 90 18 74 c9 34 56 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.279424; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #66 | libevent_malloc: new ptr-libevent@0x7f49a40492e8 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 14 cb 2a 93 e1 f8 96 40 1c 76 b1 1e 2d 77 7e | ba a6 60 2a 60 23 39 35 e5 b5 72 94 7a c4 bb cd | b7 89 1a 11 be f2 ec 78 95 f8 99 68 fb b3 8c d1 | fe 75 51 f0 a8 6a f3 24 e8 23 e8 9e 04 05 72 83 | 05 0b 0f a6 ec 38 31 07 4e a1 06 28 bc 67 bb b0 | 05 89 6a eb ec aa 4b a8 da 15 fa e0 ef 3d 9a c6 | 2c d3 80 33 b6 ee 13 5e f9 9d 54 70 b6 51 36 60 | f4 13 ef cf 85 a5 f5 da 4e 28 82 ed f3 82 5a e3 | c6 70 31 83 ad f9 5f 5a ed b0 c0 54 30 14 a6 0e | 94 91 1d d3 67 93 21 02 90 c1 46 10 1a 5d 5a 97 | 8d e4 e6 f4 7a 0d bf d9 19 fc ac 7a ef 9d 9c 9f | af a6 dd ae 15 bf 8d 1d 6b 70 b9 7c 2c 01 42 04 | 75 e0 8d 43 58 c3 fc 91 0a 9b 03 a7 ea 50 8d 23 | 3d b5 65 78 90 9e 81 af b5 61 e9 b0 10 5a cd 44 | 60 7b 44 9c fe 27 6b 71 40 98 7b 9f a5 d1 9f a4 | cc aa 1c d3 63 58 21 fd 30 d2 f6 84 15 75 b9 71 | 29 00 00 24 aa f1 02 17 7a d2 79 f0 b3 91 08 2d | 7c 5c 1f 82 70 41 6b 2b e8 22 07 c7 18 37 b5 89 | ee 18 b9 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 d2 2e e1 4e d9 b8 d0 46 3a 75 b0 | fb f8 03 36 21 96 fb 93 00 00 00 1c 00 00 40 05 | 4a 7c ae 2b ea 66 f8 97 fb 37 cc 71 91 e5 93 d5 | 52 0c ca 8a | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #66 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 de 88 f6 25 39 76 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 02 de 88 f6 25 39 76 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.336739; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #67 | libevent_malloc: new ptr-libevent@0x55564da165d8 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 74 aa 4e 03 a0 c2 1a 67 d1 ad 2e 4a 5d e0 10 | fa 17 32 89 9f 39 94 69 b6 af 17 c1 8b 61 e1 fc | f4 d5 89 d9 f9 10 82 d6 28 bc 8a f6 54 2c 36 c5 | 41 71 85 1d 21 48 21 22 30 e8 06 44 a9 1d af 98 | 86 37 2d a2 97 dd a0 80 8c a4 ee 04 54 11 e5 82 | b3 f1 66 53 d0 88 f9 68 90 74 4b b6 9e 70 b9 e4 | 50 68 8c 2c 8c 07 a2 1f 8e d5 a5 c3 57 ab 4b 46 | cb 9d e7 7f 43 41 3a f6 aa 80 54 d9 9a cb d5 42 | 57 83 e0 da 46 e2 a3 c1 68 5f 1e 6b dd 4b 0e 02 | 82 3a 77 05 7f d2 9a 46 cc 88 a6 11 c5 96 a2 3a | 3d ff 69 dd 5f 45 8f 82 67 86 d3 07 0c d6 88 50 | 7e 25 4f 69 73 fc 2f 81 65 37 22 36 c8 4c 20 74 | ba c2 7b 80 98 f2 22 81 51 56 5e b4 0e 6c 28 22 | b0 45 71 e2 7f 42 e2 5c 76 6a f6 37 82 01 05 fa | a4 25 17 4e e0 d5 b5 0b 4a 24 c3 02 63 7a 6b 2a | 17 48 71 70 e2 62 98 92 93 65 0c f1 2f 1e cb 57 | 29 00 00 24 fa 88 56 20 4a 8c 4f a2 22 8f f4 54 | 44 a4 bb 65 9d d2 09 f8 a1 b3 f3 8d 99 d5 0a 69 | 01 84 96 e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 31 8d df c9 c8 4a d7 43 4c 5e 56 | a2 24 84 92 70 65 e4 1d 00 00 00 1c 00 00 40 05 | 12 4f 4f 07 ed b4 7a 88 26 f6 33 b2 c2 7e 1d dc | 3b f3 8c 08 | libevent_free: release ptr-libevent@0x7f499c0494b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #67 spent 0.376 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 8b 05 79 3d 0e 35 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | 0d 8b 05 79 3d 0e 35 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.401286; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008832 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #68 | libevent_malloc: new ptr-libevent@0x7f499c0494b8 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 11 fa 08 21 f2 9c 66 47 19 81 2c 10 c2 92 37 | 21 5f 87 db 09 06 86 f0 82 f9 fb 7f 31 32 7d b4 | d6 f8 08 29 f8 2c 56 73 38 55 6f c6 0d 98 3f 69 | 1e e4 4e a0 70 70 81 d8 e0 a6 d6 09 26 51 52 a5 | 51 83 f0 6f 02 dd 4f 63 1a 20 6f b2 b1 dd c5 2d | 4e 86 2d 36 e2 85 79 1d 4f 65 f4 cb 4a 2d 0c 27 | 50 83 e2 52 25 1f 64 82 bf 61 c4 ba 67 32 9c d1 | 5d d6 21 cb 8c 9f 43 5c 6a a0 49 40 dc 54 ce ce | 5c 30 8b 3a 67 5a e6 7e cd a1 5b 56 e5 17 79 bd | 36 1c 68 13 ca ae 72 45 47 6c 55 05 b1 c1 1f 41 | ac 6a ca b6 56 72 9d 39 4b 9c 04 f5 e5 a8 28 dd | 7e 36 34 d7 35 c9 aa a9 ca 1a 9b ca 65 57 2b 2e | 1c 62 de 79 70 70 cf 10 e1 24 14 de 70 9e bc 6d | bc 20 72 1b 4e 49 ba 95 94 6d 76 f1 c4 ee ba de | 4d 60 a8 b3 ef 39 38 f0 03 4a 38 1f 1a 4b e1 fb | f8 c0 5f 26 de a9 71 c0 68 8d 59 0f 85 1f 14 a4 | 29 00 00 24 ed d7 0b ff d6 0c 12 ea a1 a5 32 fa | b5 b9 89 bc 92 bf 90 b4 2a 42 1b 8d 80 ae eb 90 | 36 2a 26 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f1 d9 37 70 e4 59 c2 2d c7 43 37 | c4 99 21 56 27 89 e7 e4 00 00 00 1c 00 00 40 05 | 78 94 78 92 93 58 4d 13 8a 64 c3 e9 3b 2c 9c f6 | 56 28 d6 19 | libevent_free: release ptr-libevent@0x7f497802db68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #68 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 eb fb d5 64 69 17 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | b3 eb fb d5 64 69 17 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.457592; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #69 | libevent_malloc: new ptr-libevent@0x7f497802db68 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 f9 dd de 44 9e e2 56 a7 45 14 e7 56 bd f3 90 | c0 5b 54 4a 36 95 e2 91 62 f3 60 69 d7 44 d8 34 | 25 14 b2 b6 ec 6a ad d3 10 b8 8f 02 4b 4b 66 16 | 7d aa ad 4c e3 31 7c 04 dc 12 d8 d0 45 f0 ae 40 | 2e 86 2d d8 82 ef 76 90 ee 8e c9 a2 4b 4e 4a 29 | 15 4c ea 01 c5 ca b9 f5 b3 13 00 cd 19 42 88 66 | 7a b2 f6 71 fa cc e1 e7 55 fc b5 e8 e9 31 da 1a | 44 71 f9 0b 91 85 a5 3c 70 f6 b5 85 e6 28 3d 86 | 49 bc af a7 78 79 cf c7 4d 11 b4 7c 57 3d 92 02 | ae ff e1 7a c0 05 43 71 87 f1 79 d3 30 b1 93 30 | 9f e8 65 a2 ef 79 96 c1 4e 04 9a 0e c6 e0 43 68 | b2 41 e3 fd 4b ed bd 8d 85 ee 66 d9 a3 ea 48 30 | cc 08 7d 53 eb db 06 43 7b d2 67 33 ff b5 34 32 | 8b 85 76 c6 0d 41 2b 0b 29 9d 8f 45 f4 ae 26 c5 | 4c ae 02 0b a7 30 1e f4 5a 61 9a d1 41 d2 c5 29 | 43 14 c0 fa e4 8b e9 0e cc d8 76 3a cc 68 88 b8 | 29 00 00 24 77 d4 5d c8 7c ae 56 10 64 88 cf 82 | 06 44 1d 09 35 fb 3d 3f 20 66 c4 69 1f 34 14 27 | ac 05 9b 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 25 28 c2 57 de e0 38 77 dc c1 cf | 18 51 b8 bc 2c f9 5c e5 00 00 00 1c 00 00 40 05 | 1d 4a c3 61 97 42 34 53 5f 9c 6d 1f 05 a5 7c 82 | 84 95 e6 e2 | libevent_free: release ptr-libevent@0x7f49bc040dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #69 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e 0e 52 7e 44 75 60 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | 5e 0e 52 7e 44 75 60 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.519937; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #70 | libevent_malloc: new ptr-libevent@0x7f49bc040dd8 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 8b a1 61 5a 37 28 ee 66 fc 1c b5 be b6 97 29 | 67 d8 c5 00 7f 62 84 4e 06 6f 8f 69 79 ec 31 2a | 89 0a df a0 ae 11 ff 17 8b 10 45 c6 fa e1 17 87 | 0a f8 bb ba 66 af f5 3f a6 46 a1 39 11 ad b2 de | 9d 88 1f 76 70 3e 8c c6 fd 66 07 03 44 db 7d b0 | b9 e2 c1 ca a8 43 a7 54 e1 41 3e 28 58 45 95 8b | 02 cc de a4 f5 42 8e 83 f4 c5 cf 47 93 e6 31 8c | 4c d0 99 72 93 fc a3 ae 31 03 40 cf ee f8 3f e0 | 86 f5 5c ab 4e b7 a1 40 9f 71 31 26 9e d1 b4 16 | dd b0 3a e6 52 51 6f 4e 7c fb 0e 9d 7b 95 0f 35 | 08 aa a9 2f 5e 9c 9d fa 48 c3 24 0b 1d f1 41 84 | 3f 12 d1 3a f1 8c d4 ea a5 06 08 d1 d3 52 53 9e | 58 47 a4 eb 7e 45 09 46 36 a0 a6 50 3a 28 88 07 | c3 4a f2 87 b4 1e 4f 59 80 c5 59 a7 d1 08 dd 89 | b8 2f 60 6b 48 a7 53 e2 28 ea 93 ca 3f 53 80 e0 | 89 17 ee 78 8d e6 48 f3 31 ab 0a d3 f7 4c d1 9a | 29 00 00 24 f9 04 e7 f6 ef c4 0b bf 3a a6 0e e6 | ae 30 3e 73 0e 39 a5 d8 25 2c 29 cb 5a df 6a 09 | b0 99 fd 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 58 55 1c 75 bb 97 2b 9a bd b8 0b | 31 d4 8f 58 d3 22 99 03 00 00 00 1c 00 00 40 05 | cf c9 9a 20 3a 7e c6 7f 5a e2 c5 37 31 fe 5a 24 | dd f6 e1 02 | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #70 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f c5 a8 53 b1 c3 90 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 6f c5 a8 53 b1 c3 90 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.577317; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #71 | libevent_malloc: new ptr-libevent@0x55564d9f0cd8 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 22 b5 fe 73 79 cc 7f 22 e5 0d bc c9 9a c5 97 | e9 6b 2c 68 7a 53 b7 8f 76 48 66 b8 23 32 3f 90 | 99 48 ef 54 32 c3 13 29 61 1c b1 4b ae 45 a2 96 | 67 e9 23 53 1f 4c 09 06 bd 85 02 47 3a 1f fe 31 | c5 cf 0c 04 0a 43 80 1e 42 5d c0 7b fe 20 e8 19 | 6f 2c e4 9b 7f ae 22 8d 19 15 de d6 0e 52 eb bb | 5a 61 8c eb 58 b2 24 44 b3 24 2b 75 e4 ea 64 30 | d8 7b b9 3c 36 f8 73 76 a0 cc e7 b2 b8 66 97 5a | dd 54 43 44 d4 f1 79 27 2a 69 80 fe 73 12 b4 a0 | fa 53 b8 0c 70 74 49 7c b8 fa 72 1b 85 04 0e a5 | 01 92 54 42 68 71 58 eb ab ba 13 bb 16 96 06 2e | 13 4b dc 0d cb b2 45 56 3e cd c4 ad ce 73 be 70 | f1 cf dc b5 4b 69 cb 71 52 e2 1c e4 78 29 51 ad | 6b 1d a6 3c 5c 96 e1 81 6e 40 62 48 27 97 37 b2 | 6f 7d ea 77 ca 2e 63 f1 98 20 8c 01 0a ee 7a f3 | 17 36 57 c1 07 6b 5b 16 b8 09 44 9f 77 0c 8a b0 | 29 00 00 24 79 4c e4 be e7 f6 8c d2 25 59 bd 6f | d7 88 3d 8f 24 6f be 40 34 66 24 14 c6 5c 1d 2c | 3d d0 e4 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 fe ef f5 ea 71 eb 8f a0 75 f2 | 1b 5c 8f 60 1e a6 62 16 00 00 00 1c 00 00 40 05 | 65 45 89 16 60 22 92 42 81 23 3f 65 fd 52 b7 e5 | 01 67 e2 81 | libevent_free: release ptr-libevent@0x7f498c022ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #71 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 08 46 c9 59 b2 ee 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | d8 08 46 c9 59 b2 ee 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.635704; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #72 | libevent_malloc: new ptr-libevent@0x7f498c022ac8 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 0e 25 96 46 82 48 b2 6e 0c fc 0c b8 95 90 7d | 1e 84 8e 53 9e 0d 1c a4 87 58 90 96 e9 14 ad 41 | 9f 2e 1f c2 47 19 3e 60 6d dd cf f3 86 47 38 d0 | 7b 3a a4 64 e4 3c 17 5d c7 f2 da bd 65 54 93 6d | b4 3b f9 54 1a aa 56 a9 2f 2b 5c fc 73 28 8d 06 | dc 1a 02 f8 12 e1 f1 54 25 b2 ff 95 e1 72 8c 16 | be 60 3d f1 c0 45 5f f1 5a c0 0f 38 22 10 6f 2d | 57 5c aa 1c e7 a4 a1 ad 59 be e1 62 c8 d8 48 71 | 97 9e 0e 86 3f 87 34 d2 47 06 2a 3f ab 11 1f ba | 59 ad 84 64 f3 2e 0c 67 6f eb 28 36 c0 e8 82 24 | e1 f9 50 17 3b 4b 86 2a 15 f1 1d 36 4b f8 a1 5a | e4 fd 2e 88 18 2b 3b 8e f3 f7 ba 64 81 0b c7 39 | ad 3e e0 be e6 99 86 e2 ae 8f cf 5b c3 89 b1 dd | c9 48 9d cb 6f 71 25 97 30 0f a8 eb a5 78 80 e7 | 50 18 ec 12 71 2c 98 26 ad ec 5a ef 81 1b 53 ed | da d8 21 b8 cd 12 7b e8 bf c6 9d 5e 6a 7d 41 53 | 29 00 00 24 1d 12 12 09 36 17 f2 8d b1 cc 89 95 | 23 26 9a 60 3a c7 27 f1 c1 c4 6f 75 ca e8 3a 4e | cc fc 78 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 00 88 40 31 84 60 68 77 ee af 89 | 57 14 11 44 89 37 2f 18 00 00 00 1c 00 00 40 05 | 07 c1 d7 4d c9 2d b9 5d 8b c1 5e 1e 51 a3 e2 2c | c8 3b b5 6d | libevent_free: release ptr-libevent@0x7f498c038ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #72 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 3e 29 46 70 31 01 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 77 3e 29 46 70 31 01 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.69604; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00786 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #73 | libevent_malloc: new ptr-libevent@0x7f498c038ab8 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 73 dc 9c 93 c6 e3 61 da 83 ab 53 1b c1 33 a7 | e2 96 c8 a6 8e a9 1c 9a 8d 73 14 f8 9a a0 77 01 | 00 2a a5 43 5c 54 dc ac 10 1a be 53 37 10 8b 8f | 2d 3b 39 af 37 57 7b d0 3a c9 cb b7 05 cb e2 9d | 93 cb ef 94 1c 3e e8 21 38 f6 06 91 44 ab f1 6e | c2 10 50 19 b7 25 ef 35 e9 36 83 7e 17 d7 38 9c | 36 de 0a 02 10 55 00 9d 21 f4 b7 fe a3 c7 a7 fb | 5b 9d 64 60 84 a8 02 ee c1 0e 63 44 ed 18 58 9f | 29 57 49 dc 57 32 87 49 ef 81 a9 eb 80 ab 01 5f | 6b 36 54 47 05 68 2e c9 f2 fb 7e 27 0a 67 db 4c | 4a 67 a5 13 39 45 2e ac 53 af ad b9 3a f2 28 de | 6a ea cb ba be 88 11 d6 bf f9 89 09 06 99 18 cd | 8a 27 95 dd 18 6b 0c aa 7c d2 57 88 2e 7b ab 00 | 63 38 8e 27 b3 af ad a6 b6 bc 3e 75 cd c1 3e d2 | 12 2e aa 72 30 f9 a8 26 72 3a 50 fc d9 af 68 8d | 42 e0 b5 45 30 a5 79 70 26 df 6b 25 c8 8b 80 51 | 29 00 00 24 00 61 f2 7a b4 76 2b 39 29 30 25 1a | 30 db 3e 39 89 ba 7f 12 35 41 6f c1 14 5c 0a 99 | 0b ef 5b b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 27 1d 29 57 29 fa 4f 4d a2 b5 12 | 8e a2 c3 ff 57 26 5a df 00 00 00 1c 00 00 40 05 | 85 b7 40 6b ec 1f 00 52 83 6c 24 e0 45 64 78 88 | e1 d7 c6 52 | libevent_free: release ptr-libevent@0x55564dae89b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #73 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e8 4f fe 5a 00 15 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 72 e8 4f fe 5a 00 15 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.771552; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #74 | libevent_malloc: new ptr-libevent@0x55564dae89b8 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 44 92 c6 69 e1 da 33 0a 35 ca a9 f2 35 4e 74 | 56 b4 fe 0a 76 57 65 e9 26 7a a3 ec 07 33 7c cd | dc 67 d2 c8 fb 43 81 8e 30 7e 31 65 ad 87 08 73 | 55 19 b8 5c 76 0f 19 68 0e 0b 3f c6 c0 6b 7e 73 | ed b0 ae 2d 14 74 c5 7d b6 08 4c 75 ff eb cb c0 | 4c c6 f2 1a c7 83 ac c4 9a c7 34 c2 5c 2e 11 1d | 5f 39 dd f0 1f 3d 95 4e ba 5d b4 4d 3e 7d c1 3c | 22 0e a2 8d 77 b8 4f 11 0c 8b c0 6d e3 2b a7 4a | 80 81 a3 ea 4c 36 5d 85 e5 db 84 83 e2 b7 b7 dd | 96 22 43 bc f3 c5 1c 75 8e 23 68 30 09 9e 77 37 | 1b ff d0 fa 4d b2 7b 7d 85 30 3a 35 70 17 da bb | 85 52 ff 80 04 e1 f0 66 72 56 f5 a4 86 af 5b 9d | 85 a3 77 7f 22 be ed 19 38 b2 17 e9 32 74 91 d9 | af 52 9a 2f cf 24 ed 18 3d c3 e9 8d 84 c0 20 2f | c8 0f 4d 47 93 e6 c7 38 a5 a1 44 32 8d f0 26 6e | 8d ff 3b 16 6e 24 f0 94 8a 5a d0 73 ce 91 be 58 | 29 00 00 24 e6 d8 cf 22 5b 2a 8a 1d 4e 40 59 bf | 07 aa ae 2f e9 cc ae 5a cc be 5a 5a 5f 80 8a 05 | 5f 74 71 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 89 29 8e 70 88 96 c6 82 77 ae 47 | 32 e8 b9 cf a1 60 d1 22 00 00 00 1c 00 00 40 05 | 17 03 cb 15 10 ef cf 74 a2 71 b3 00 2e a5 ee 3f | 79 5d f5 2c | libevent_free: release ptr-libevent@0x55564daea0c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #74 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 1b 85 a3 09 0b 1d 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | b2 1b 85 a3 09 0b 1d 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.827878; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #75 | libevent_malloc: new ptr-libevent@0x55564daea0c8 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 1a 3b 6e 08 4a 89 a1 b4 94 be b1 b9 2a 7b 10 | a3 8f 8c 42 9e 7d 35 4a 45 13 29 7b 31 ab dc 38 | b9 a6 7e a9 38 5d 27 32 70 d7 1d 2b c4 67 fe fc | 58 df 34 30 47 95 20 79 18 21 71 b8 48 89 54 51 | 37 88 a9 42 68 cf b6 0b 71 b4 e4 39 a8 ed 35 40 | 73 c3 4e 0d 63 af d3 65 b0 35 16 e6 38 ab 20 3d | f0 c6 dd 18 6d 35 17 e2 65 78 48 85 31 fd 4b e7 | 93 c2 21 0f 1c 31 3e 42 1d 92 fa d9 1f 1b 53 af | 51 b5 9d 41 15 df 0e 6d 20 12 5d 1e 17 19 03 e4 | 99 84 d6 ed e2 bb 33 30 2e a1 62 bc 6c 92 88 52 | e4 d7 da 32 9e 10 1d 47 8d b9 d3 79 61 99 a6 50 | 8a bb c0 2e 46 be f0 1a 50 84 e4 04 d8 c4 22 46 | e9 00 ec c6 46 a5 f6 e8 fc a0 76 66 59 d5 fe fc | 23 d5 a6 c9 31 67 a0 4c a4 6e 63 29 b2 7a 6d d7 | a5 53 97 54 f3 0b 54 ce 18 c1 fe 04 dc 61 64 70 | 8a 8a cb 37 39 ec fe f0 de 02 9f b9 a2 29 64 cb | 29 00 00 24 18 98 72 13 93 ad 52 97 0b 53 ed 43 | 61 b8 ad 4c a3 b3 4a 30 89 e8 09 cd 1f 65 ae e7 | 7d b9 25 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 04 08 1d 84 eb fc 49 29 3e a8 48 | b7 97 d0 90 5f f5 53 0a 00 00 00 1c 00 00 40 05 | 88 04 9e 90 d3 de 81 fb ef e4 5e 3c 7a 49 c2 1b | de a6 5d 90 | libevent_free: release ptr-libevent@0x7f496c043d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #75 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 5b 3c 62 46 5a f4 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | 44 5b 3c 62 46 5a f4 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.911284; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #76 | libevent_malloc: new ptr-libevent@0x7f496c043d48 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 b2 09 5d 6d fc c5 d9 e3 60 c7 05 93 d1 a0 ba | db 4c b4 b1 7f 49 ca 4d 14 72 93 e3 fd 9a 3a d3 | a1 8f 46 2e 9f 8b df 4b bb 69 22 4b c1 d2 b9 48 | 68 32 3e d4 36 e8 e9 18 d7 96 d8 c9 89 05 9a 6f | 90 62 9c 1a 1c 58 89 43 c1 2f cc 8e f2 b6 02 26 | d4 dd 33 e4 1c 55 a6 ca c1 8e af 1c 7f 3f 09 8b | f0 cd 3d 0a 04 ac 5d 08 c5 41 03 97 b0 3c a9 fc | 82 9e 02 1f f5 5c f0 78 ef 34 aa 49 3a db 86 f2 | e2 54 db 24 a2 92 e3 07 4d e7 e5 72 cf bb 0b 53 | d3 58 9b 27 02 64 75 28 76 8c eb 29 39 32 98 ce | cc 27 aa 02 f2 4d 21 e2 0d 27 f4 1d b6 f2 8e b6 | 0d 33 49 21 46 12 9d 2a 5e 05 42 9c ae 9f d8 dc | 67 13 43 83 87 cd 80 75 27 83 80 ee 37 5e 26 6a | 0e 0c f0 c5 47 d3 ba 6b 97 4b 36 cc ca b1 9e a0 | 7a 6a 5d 56 0e 86 b4 e8 cb 48 7d 9b 5a 85 fa 04 | 2e e9 25 d6 e6 f2 5b 50 c5 ef 59 60 fc 23 47 2a | 29 00 00 24 d7 fc 0f 81 c0 e2 a1 7f 43 59 71 01 | d3 d7 79 07 bc 61 f4 d3 dd 41 96 ad f2 fd 5c 06 | b5 95 d3 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 68 cb 34 a7 70 39 e7 8d 6e cc f5 | 88 3a 71 aa e3 e2 ff c1 00 00 00 1c 00 00 40 05 | db da 63 0e b9 a1 a3 50 e8 a3 52 75 2f e2 e3 52 | c9 5a d8 d7 | libevent_free: release ptr-libevent@0x55564da8a4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #76 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 ca 9f 26 b7 88 be fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 90 ca 9f 26 b7 88 be fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10612.973603; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #77 | libevent_malloc: new ptr-libevent@0x55564da8a4f8 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 02 73 45 81 e6 a6 79 e0 c8 c1 39 15 5b e8 68 | 69 cd dd 41 ac 2a a5 04 76 a9 20 d9 12 f2 32 79 | 62 69 ed 4e ab 28 93 05 af 02 e8 7a c5 cf 1c 15 | ca bd 28 2f ba 6b 7f 9b cf a9 ef 5e 8b 65 27 27 | 1d f4 48 3f a3 10 9e bb f2 c2 e3 ee 94 ee 17 d4 | 9c 51 1b d3 5d b2 eb 14 35 ab f8 39 c9 1f 7d 65 | 95 58 7c 8c 5e 12 b3 ac 93 8c 82 79 58 5d a3 93 | 7b 74 91 4b 16 48 9b 75 02 6e c8 88 f0 e3 93 c5 | 7b 4f fe bf d3 ce ae e2 6c f8 4c b8 82 4e 35 f2 | 3a 12 b9 2d e9 68 bf 09 99 b3 cc 79 51 51 dc 36 | b1 2f fe 0f 49 fb 6d a7 2f 1f ad 3f 51 a8 6f 5c | 3d 42 19 3d c8 cb fe 94 66 db ea aa 83 b0 02 95 | f2 f0 03 e8 25 b4 e2 f7 dd 7d d2 6b 75 12 15 ce | 0f ab 55 9a cb ee 85 ff b3 70 76 32 5e 06 04 57 | 17 56 0e ca d3 51 3b 5a 38 a9 8f fc a2 1a b5 e7 | b7 3c c0 57 6a 07 d8 e3 fd 23 02 ca 7b ac 84 03 | 29 00 00 24 c8 f9 36 61 9b 8b b0 31 94 b4 dd 7d | 90 ab 03 06 97 96 59 e2 1a bb a2 81 38 0f 57 49 | c2 69 c1 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 35 de 0a f4 01 e7 da f8 58 ee e0 | 1e 74 0c 27 5a 76 f8 ac 00 00 00 1c 00 00 40 05 | 23 39 29 0e 59 88 bd b3 e0 1d c2 a0 aa fc f1 63 | 02 d9 25 e8 | libevent_free: release ptr-libevent@0x55564da8bc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #77 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 74 d7 42 6f f6 28 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 66 74 d7 42 6f f6 28 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.031939; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #78 | libevent_malloc: new ptr-libevent@0x55564da8bc08 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 4f 72 83 f0 c5 11 e0 e4 6c 9f 00 f4 6a a1 90 | 41 59 26 e7 af b2 d4 0e 30 49 a4 66 de 17 14 dc | f9 0d b9 89 03 fa 7f b6 3c b8 bd 66 48 4d 21 3a | a9 43 2a e2 9e 22 4b 16 c4 d3 ee 78 70 6d 5a 4b | c8 be ad 60 0d 76 b9 c2 e4 6d 24 62 72 21 35 85 | d0 21 be c3 39 54 33 4e b0 42 2f aa 26 08 79 59 | 2a 8a b2 13 85 61 81 4d 9d cd 4a 20 44 de 88 8e | 3b 96 15 1a d4 d7 2b b0 f2 fd 2a dc 84 55 10 15 | db 9d 88 f9 6a a6 0b 76 71 62 c3 d0 79 0a d8 cf | 95 8b b4 f8 5a ba cb 69 8f 95 67 d3 b4 96 a8 c8 | c7 9b 14 38 3f 99 a1 6a b7 88 e9 9b 89 3c fb 6e | c8 fd 3c 44 b0 56 6a 84 1a 72 3e d0 48 1d 6e 32 | f3 15 bf ec 0a d1 5c 2f b6 77 ba 65 db 55 c2 d7 | ae 57 47 bc 25 5b be 4c 02 1b 6b c1 d0 8b 5f 57 | fd 06 f9 21 07 ae 5d 9c 04 a5 07 23 12 84 b2 06 | fd 05 42 94 78 d7 39 94 ce bf bd 93 32 a5 f3 d5 | 29 00 00 24 60 25 c9 82 fd 86 c1 87 19 16 9f 2a | 01 d4 81 b4 06 5b ab cf 20 bd 7f a5 8b ed 28 1f | 8d b9 5c fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da ce 07 3d 1c f1 28 94 25 96 78 02 | bd bc bc 39 b8 14 46 84 00 00 00 1c 00 00 40 05 | 1e e2 88 50 2f 1f be b1 12 a3 c3 4b e9 50 2b 4b | 67 a0 c0 d3 | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #78 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf a0 d7 be c2 44 33 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | bf a0 d7 be c2 44 33 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.092248; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008503 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #79 | libevent_malloc: new ptr-libevent@0x7f497400cd68 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 33 dc ba 97 ae 29 0b b2 6a 89 e1 d1 62 b0 99 | 77 7e a5 e5 27 45 b4 77 c1 67 89 48 7e 03 64 c3 | 2b d0 0f af 16 43 97 a6 0d d7 d4 12 01 5a 5f 19 | fa 1b 73 64 1c 3e 1a ae af 87 b4 98 c0 27 0f 3c | e5 d7 1f a6 fe 4d 42 38 66 2e 61 70 af b4 3e 1c | ac 66 9e bb d6 69 19 23 2e 8c ca 24 7e 1c 3e a5 | 7e 75 58 80 ee ec 73 b0 8c aa 05 2c 96 38 26 79 | c5 68 94 e8 32 59 13 c0 97 2b 00 a4 cf f8 71 e2 | dc c9 ef d4 25 35 eb 27 5e 38 5b 2e c8 6b 92 3d | b6 06 ba fe 71 6d d0 06 b9 fe ac 66 2b 3d f7 55 | 8f c0 17 98 a8 15 0f d2 96 85 84 d7 85 6a 5d 9a | 4b 38 d0 80 a4 01 20 11 2b a8 94 c3 6a e1 53 6c | 9c 64 c5 d1 ba 34 fb 39 4a 8d 18 06 cf 90 27 a3 | d6 a4 56 1f 24 61 85 a6 93 4d 0d df a0 49 a6 ed | af 3a 5e dc 96 d2 d0 37 ca dc 42 3c 16 67 51 c2 | 6d f7 17 0d c2 aa 3e 94 39 a1 96 75 18 a6 34 07 | 29 00 00 24 17 26 76 a4 00 97 bb 1f cd 1c 61 6b | 51 c5 ee 61 7c e1 53 4f 83 d6 8f f9 b4 ad a3 9e | 57 95 b6 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 01 07 9c d8 aa e3 0d a9 08 1c 4c | 12 eb 98 ce e2 2f b3 0b 00 00 00 1c 00 00 40 05 | f2 5f 44 e3 28 e9 b5 cc 73 b9 ce f3 00 71 91 c7 | e1 2a 4c d7 | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #79 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae cb 7b fa aa 8b 17 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | ae cb 7b fa aa 8b 17 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.155583; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #80 | libevent_malloc: new ptr-libevent@0x55564da27e18 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f1 e2 09 38 68 86 4e 22 fb 6f d2 5c 49 7a de | c4 66 a4 61 c3 21 da f6 cf 87 ae d4 df e0 ad b3 | 0e 39 a3 f8 98 19 2d 05 ee 19 77 87 a0 2e dd 65 | 15 3a 2a 62 93 31 1a 16 5f a9 ad f5 db b4 25 73 | eb 54 84 8d 8b aa ab 98 25 84 f5 bd b8 33 1e 7b | 4e ed 30 83 df bf a7 56 f4 11 d6 0a bc 14 42 58 | 3e fc f9 46 f0 91 f5 55 e8 89 79 43 56 66 d8 f2 | 75 90 37 dc aa 1b 01 2c 94 70 4c 00 98 ff af 86 | 5c e6 3a b9 c9 b9 33 3f 04 d8 9f e4 e9 d0 b0 00 | e2 b4 a2 ff 11 bc 37 ae 17 1a 18 a5 99 55 e1 43 | ea bf c5 d0 a7 b1 a3 84 f5 85 4f 6c c1 0b 58 64 | 6d 6d 21 19 24 5a a2 4b 24 db fe bb 10 05 1a a3 | 9b 4e 0e 46 11 75 6e f2 c5 61 62 66 a5 fe dd 45 | 95 69 34 d6 59 f7 29 a1 c1 e4 8f ab b7 71 e6 6e | 14 b3 68 1c c8 e9 4f cb 16 13 c2 fc 3e 83 c5 4f | c3 f2 bd fc fd 04 a2 73 87 8a e7 52 56 2f 2a db | 29 00 00 24 68 64 cc 03 74 db 65 21 e3 4b b8 7a | 6f 5c 7e 2b 05 07 6a 3a 8f f8 c0 26 9a f9 61 af | c4 13 5a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 0f e4 a5 52 0b ca 7b 8b db 09 a6 | bf 5d 92 f7 0b 07 fb ac 00 00 00 1c 00 00 40 05 | 11 78 6b eb 95 1b 36 e8 b8 63 68 39 e3 4c f1 58 | 55 02 fd 87 | libevent_free: release ptr-libevent@0x55564da137b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #80 spent 0.396 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 2f 60 88 b2 6e 8e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | bd 2f 60 88 b2 6e 8e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.244244; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #81 | libevent_malloc: new ptr-libevent@0x55564da137b8 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 e6 9e 2a 7d b0 8d 72 2d 37 86 b9 5a 51 f2 f2 | b3 17 4d 9a 64 d5 d6 d8 2c 48 1b 12 37 34 55 07 | 79 dd 12 88 eb 57 cb 38 17 0e 4f 5b b0 c0 a9 ad | d6 c3 c9 b2 dd d7 2e 88 c8 4b 51 9d ec b6 75 44 | 44 b9 cd e8 f9 8a ba 7b fe 14 d7 27 82 51 eb 7e | e3 c5 ee 04 bb 74 d3 e3 f3 4b 4a 4b 8c 50 84 ef | 4e 08 bc fb aa 1b fa 1e 8a 02 e7 a5 fb ae 6b cd | dd 0b 7b 11 1a b7 2d 00 f8 94 db 25 28 42 b3 7f | f7 b6 7d 57 82 24 74 a7 38 f2 6b 00 98 53 01 79 | 0f 43 63 e0 71 6e 78 a9 13 14 83 91 dd d3 b6 c3 | 77 75 7d c8 41 5e 48 7c 67 43 eb ae c4 c0 bc a3 | c7 c4 4f d1 c6 65 ca b9 8f 6e 99 be 9f 0a a7 c8 | ab f2 3e e2 81 d2 15 c7 99 53 bd 56 0a 79 20 bf | bd 73 73 b3 9b f0 1c e4 55 91 a9 88 f5 19 32 00 | 7b 0b 71 b5 35 92 65 bd 01 dc 62 1e 08 1f b9 53 | c1 c2 0f 2c 30 10 5d 97 a5 65 4e 09 66 f8 2a 26 | 29 00 00 24 90 27 62 de b1 e4 9a ea b8 f4 ab 7e | 97 55 a6 fb ba 49 67 5d 21 3f ac f9 1a b6 b6 a9 | 8e db a4 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 06 04 2f 98 da 36 1f 3a 0b 8d d9 | 6a b2 92 36 f4 66 bb f3 00 00 00 1c 00 00 40 05 | f3 d8 7f a9 e2 c4 f2 7a 81 a8 83 92 29 16 42 df | 76 f5 f8 61 | libevent_free: release ptr-libevent@0x55564d99b3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #81 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 34 fd 30 b8 77 ef f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 64 34 fd 30 b8 77 ef f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.302543; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #82 | libevent_malloc: new ptr-libevent@0x55564d99b3b8 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 ae bb 0c 8f 0b ba 74 5b aa 9e 3b 49 2f 05 56 | be 2d e0 6f 80 ca 07 74 b3 76 09 ff 28 ed f2 a7 | 95 f2 5e 34 08 c1 06 73 6b eb 64 53 e5 22 95 57 | be 27 80 4b 3a 97 ce 8e 51 fe 97 21 23 b0 b4 4f | d5 a0 96 a1 8a 3f aa 3f 88 c6 57 6e 97 84 f0 ad | 12 b2 d9 90 86 0c f0 17 e1 df 7e 66 40 63 da 70 | c5 9d f1 12 ab ae 17 d3 a5 08 41 4b 7e fd 30 92 | 8a 9c 20 77 56 f6 da f8 54 26 24 1a 35 ef d5 70 | 78 9c 7f f5 df 32 27 26 ab cb e0 69 66 d4 7e b8 | b7 b9 dd 4f 53 29 22 f1 4a 4f 9b a4 1f 53 18 8f | 4f bf 20 59 f0 38 e5 80 c5 7a b4 11 b7 7d 77 43 | 05 d0 38 1c 29 88 6d 89 ea ab 12 49 44 2d 13 7f | 58 8f 85 1c 10 50 4e 84 c9 e6 ff d0 2f 91 f3 f1 | ab 31 da d6 fd 7b ca 12 e9 5f 18 3c 24 ec 5b 1f | b1 c8 34 20 c6 a6 42 c6 70 d3 78 88 8e d2 62 6b | 59 f6 fe 07 5a 0c b3 a3 d8 60 ae 3c 27 a5 34 b7 | 29 00 00 24 73 0b 30 00 50 ca 2d 8b 08 84 cf ee | 17 e4 a3 18 c5 7d 05 1c ad 97 e4 8b b0 29 fe 0a | 50 60 5e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb ef 6c 80 e4 3d f9 6a c9 99 d8 11 | 0a c0 20 a8 8d 42 af 18 00 00 00 1c 00 00 40 05 | 93 e1 e6 74 a7 74 a0 d4 9f 12 75 ef 54 37 07 c3 | af 2b b8 02 | libevent_free: release ptr-libevent@0x55564da9e8d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #82 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 8d 55 05 59 06 64 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | a6 8d 55 05 59 06 64 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.364829; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #83 | libevent_malloc: new ptr-libevent@0x55564da9e8d8 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 5f 5b 75 14 1e e2 1f 6a 6d 9a 8d 92 7f c4 80 | 04 8f d6 ad 74 27 eb fc 51 25 de 3a 78 61 9e ff | 3e 4d 93 03 53 2b 48 25 66 05 a5 84 78 3e 1f d0 | 16 88 e1 d1 9f b5 1b 1e 41 5e b7 fd 27 7a 47 fa | b0 80 e1 cd 2f aa 8d e2 3d 4e 10 b4 fd ba 25 29 | 44 23 b9 bd 3b db bc c9 4b 77 0e a4 c3 ac c1 c0 | ee 7f d3 64 d8 e4 e8 6a 3e 77 3b 42 f5 80 29 21 | e7 69 20 2d cd fb 71 46 17 7c e7 e9 e6 15 4d f6 | 45 47 8a e1 80 3c ce 61 33 bd d4 e7 86 f9 f6 87 | 23 bd 54 8e 55 06 cd 0e 67 05 76 7e 6e 45 c1 fc | 9a c9 a1 d8 da fe 85 23 f6 7c 08 b3 42 84 6b a2 | 11 e1 1a 16 ac 0d 33 16 b9 48 c1 a1 f0 7c a0 3b | 9d 2e 9a 0a 9f 79 cc cb 13 7a 8b d5 10 ee fc a6 | 7a 0d 34 43 16 e6 07 08 e3 86 0b c4 b9 63 f2 06 | e3 e0 51 81 7d 16 81 4d 26 dc 91 ad 4b 9c 03 47 | 6c 63 14 5a aa 5e ad ec 2f 35 2a a9 41 09 71 af | 29 00 00 24 0a 52 d7 57 b5 97 3b 52 7f f9 f6 28 | 3f 13 29 05 7d b5 42 9a 7b 4e 72 7b 0d 68 c8 3c | 9d 55 31 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 5f 03 54 3c 04 e7 c3 3d 10 a1 88 | 3f 34 3f 6f 59 78 77 d3 00 00 00 1c 00 00 40 05 | 20 92 25 08 35 80 43 e3 e6 28 bd 37 70 d4 a0 44 | ba 6c 7f 1d | libevent_free: release ptr-libevent@0x7f49ac03e388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #83 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 44 ad d7 dd 5a 47 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | ad 44 ad d7 dd 5a 47 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.453167; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #84 | libevent_malloc: new ptr-libevent@0x7f49ac03e388 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 c3 87 3b 6c 01 3a ff f5 17 35 0b 14 18 d1 e1 | 60 eb e0 ed ea 1f de 3f e7 62 ef eb af 65 d1 e6 | 9d 1a 06 3f 5a 59 ea ba d2 79 81 4f 04 16 6c 30 | 3a 10 f1 a1 6e 72 62 f9 0a d4 70 11 f1 29 1c 79 | a0 b8 49 3a 72 12 4c 4c 0a 72 b4 8c d4 4b 88 13 | bb 5a 2f 82 5a 35 f0 3d 28 b7 c2 e3 37 5b 26 88 | 48 c7 c3 85 b4 a7 dd b3 e4 08 65 f2 ba 54 47 77 | 76 5e 10 4d 16 5a 2d e6 f4 ad fb 44 f8 d8 11 75 | 2d 3c 81 e3 56 6a 2d d0 4b 6f c6 63 e3 9c b7 c9 | 56 89 4e 20 9d 1d 06 68 6f 94 59 0d 3b 28 c6 15 | c3 6b b2 a4 a0 43 b6 12 f7 af 48 06 2a 7d b5 05 | c9 b6 2c 69 62 c0 47 92 f4 31 81 08 6c ca 38 1e | 6c 9f b2 84 e8 88 89 92 e1 e7 98 bd 36 3c 54 0a | 11 42 54 d8 52 01 8b 9c 3a b2 a5 57 97 3d 1c 41 | 81 e8 8e 39 8b 82 79 ff 51 b4 06 2b ec d3 d9 80 | b9 0d f9 d1 ea 3f 9d 80 93 e4 17 44 eb 8a 52 fc | 29 00 00 24 b0 3a 02 7c 2b 69 2b b9 ea 5d 65 fb | 39 5b 2f 96 02 55 7e 79 22 a5 1d 0c eb 78 a8 a5 | 6a 79 97 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 64 b0 bd fd 06 2d ff 86 8a 40 1f | 7b b0 16 43 29 ee 00 b2 00 00 00 1c 00 00 40 05 | 14 e9 b8 16 c9 76 3c a2 6f 38 90 93 7e 3d 24 1c | aa f1 a9 18 | libevent_free: release ptr-libevent@0x7f49a4038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #84 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a af 15 16 83 9b 55 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 2a af 15 16 83 9b 55 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.536491; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #85 | libevent_malloc: new ptr-libevent@0x7f49a4038c28 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 79 80 9e c8 84 6c e0 6c 26 2c 9e 0b 1e 26 fc | 30 29 d7 ed b1 1c 91 f3 d7 e8 a0 d4 5c da 4b 28 | 27 b1 e5 3d a9 22 16 d9 33 4f 54 aa bb 6a 37 05 | 1e a4 7c 63 80 17 6f 11 6a b0 a3 06 19 23 5a 98 | ed e6 3e 1d 26 84 6a b6 9b ae 42 15 a4 32 65 b5 | a1 a7 a5 e1 86 1c b5 ad 9b 0c 86 3e 05 cd e3 ee | 65 5a 2f c4 2f a6 a6 7b 00 54 b6 fe 41 ff 31 75 | 54 4e d4 fd ff c0 b5 23 5c 7e 6e 3d ab d8 c3 3e | 94 19 22 89 24 a3 11 dc 8f c6 87 a7 eb f8 8e c1 | 5e 9b 28 c7 b4 62 60 03 e0 be 65 53 cd a2 e4 ea | 71 d4 ad ae bf 7f ec 56 0f 8a 2b 92 ca 42 7f 23 | f3 7a a5 fd 00 96 79 0f 47 9e ad 32 f5 8f 03 85 | af 47 38 df e1 34 e1 9b 75 e7 53 2a 73 bb 9a ba | 1c c0 4e 92 46 ac 38 12 d9 0c 69 ad cd 54 3d fb | 2f ec 84 9a d7 c4 1c c5 09 cf f1 88 25 62 60 71 | 91 45 21 33 b4 1a de 0a b2 ba f5 c8 df 1a 99 a6 | 29 00 00 24 97 55 92 74 23 e4 c5 e9 1a 9b 27 9b | 4b 40 d4 8d f5 a2 ce 7a c3 01 0f 92 a0 94 17 32 | 90 26 85 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 93 1e 8f 17 d9 5f 37 bb b9 4e e5 | eb 3a ae 3c f6 70 9e 03 00 00 00 1c 00 00 40 05 | a0 47 ce 9b 25 4a 34 78 7e 4d d1 8e 3a 47 1e 7b | ba 63 68 05 | libevent_free: release ptr-libevent@0x55564da34f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #85 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 2f dc 68 f3 d9 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | af 13 2f dc 68 f3 d9 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.596827; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006379 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #86 | libevent_malloc: new ptr-libevent@0x55564da34f78 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 4e b5 f1 6b f5 e5 9e a6 0a 33 01 32 09 ad a2 | b2 87 99 39 9c 70 b3 f4 bb 64 c0 9f a3 35 74 25 | 1c f3 4e e4 02 21 a1 fd 1f 0a 94 ff ef 07 d8 2e | 93 bd 70 d5 de dd eb 01 19 7f 72 d5 03 f6 36 c0 | da 4d e8 3d 6c d3 44 69 86 8f dd 32 3f 8e 36 06 | 14 8f b5 57 a3 d3 9d 97 cd b4 f8 8e c2 df 93 09 | 5b 58 d8 51 b7 df 6a b9 94 02 67 14 ef ec 8f 77 | 39 8b 07 ba fe ca b0 a8 86 f5 81 35 e7 78 79 2c | 33 23 d5 c9 46 8a 35 51 21 53 24 73 cf 77 96 38 | 13 0a fb e4 dc 2f 90 95 f1 0f a3 4b 8d 55 a9 86 | 2c 48 2e c4 d8 0f 9b 3e f3 05 25 d7 8c 9a 00 54 | 05 66 82 1a 8a 79 a0 a1 db 1f b7 64 6c c8 ae 2f | c8 66 29 8d bd c0 cf 2e 19 d5 a7 3b 99 22 ef e5 | af b3 2f 28 68 33 0a fd 75 25 a4 fa 46 3e 29 36 | c1 2e a7 ae a2 a9 af f4 86 5c 3e 75 72 b2 66 78 | c6 c6 49 b5 59 66 0d 93 45 9e 6f 32 28 66 1c de | 29 00 00 24 0b d1 2a ea 84 81 de 39 fe a6 c2 08 | d7 e4 43 c2 e5 ad 30 1f 17 2d d3 b2 df 09 2c c5 | 09 a4 a3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 ad 4c a9 22 a7 12 1b b7 93 99 f7 | 45 ca ae d0 98 b3 b1 3b 00 00 00 1c 00 00 40 05 | e7 78 47 a8 a4 39 49 d6 05 e5 93 f0 41 c8 25 3a | c7 78 41 ad | libevent_free: release ptr-libevent@0x7f4994017af8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #86 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c b2 ee 4b 2c a6 80 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | 8c b2 ee 4b 2c a6 80 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.658219; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00904 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #87 | libevent_malloc: new ptr-libevent@0x7f4994017af8 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 a1 1f 4b 47 db 8c c0 99 ff f3 a5 26 03 e0 94 | bd 75 04 ab 42 ff e7 16 9d fc 0f 13 d2 3b b1 83 | 94 3c 68 9f 76 95 56 f8 23 9e 3e 6b c0 08 b6 1c | 1b a2 3c e1 3d bb e8 75 ed 48 9b fe a0 f7 83 52 | c2 cc 94 66 11 f5 88 1c e1 e4 00 2a 2f c9 e7 b4 | 68 f8 5e 8e 7f e4 10 f6 eb 39 3c 3d 22 5b 70 85 | 43 41 67 3f f6 eb a6 1e 8f 46 25 8e ee 6b 94 6a | f7 83 4b 1c e6 9b ad 6b 85 ba 63 53 30 fa ba 5e | 54 73 06 15 57 80 3b 6a 90 c9 84 9e af 48 ac 04 | 48 c4 d2 7d aa c4 85 a6 76 bc bc 7b 6c 92 af 48 | c1 b8 bd 43 ac 09 88 29 b2 72 89 94 26 ad 5c e6 | 64 c6 21 2b 8d f8 6d 46 39 bb 82 50 2f a8 ea 53 | d9 e6 77 ef 83 b7 22 d3 60 5b 33 23 d5 d9 01 1a | 18 d9 73 ea 09 5e ac 46 45 b3 d8 8a 55 55 ea 2c | 23 dc b0 68 dd 09 cf 8c ec 65 21 2a 51 ff 89 2b | cb c0 f7 6e d9 1e 79 bf 16 2f d3 56 ed 47 af 71 | 29 00 00 24 a2 99 f5 7a 3d db 73 03 2d c7 50 e7 | 9c 88 18 99 ce 68 26 97 1b f1 7e 53 eb 6c 45 79 | 95 eb c7 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 4d 4d 2a 02 bf 0a 4b 56 bc b2 8e | 12 02 9d 64 ec d3 a6 57 00 00 00 1c 00 00 40 05 | fb 9c 1a 7c c1 8e f1 6f b3 5c d8 36 93 ef 60 3a | 90 e7 61 b9 | libevent_free: release ptr-libevent@0x7f49a003e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #87 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 23 d8 63 5c 4f ff a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | f4 23 d8 63 5c 4f ff a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.723568; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006677 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #88 | libevent_malloc: new ptr-libevent@0x7f49a003e3d8 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 89 fe ba f2 db 25 42 27 8d f2 39 3a 02 39 87 | 41 5e a9 2b cd 75 ce 1e c5 0b e6 66 26 88 67 c4 | 65 27 21 fe 38 03 62 1c 86 83 fd ef b0 8d fd cc | 59 a7 97 a8 e6 a5 4c 24 83 f8 d3 ce 3b fd 42 05 | 28 29 52 30 2a 35 4c 49 8f 47 f9 66 f1 0f 13 b5 | 57 10 0d 8f 4f 35 3a 4d 7b b5 86 91 fc 62 19 b0 | 4a f6 47 32 f3 92 2d 36 6f 34 e4 0a 39 51 44 1a | c2 3b 91 fc 67 0d 37 f7 2f 1f bf 44 ae 74 6c b1 | e5 26 a9 e6 03 a9 5e a0 57 e1 86 11 33 29 6b 6e | 91 8c ae 02 10 3e 93 c4 87 6b 2f 46 3a 3d 16 b0 | 31 65 44 7b 72 ea 07 38 fa 63 1a c5 2d 8b f0 a9 | 97 50 57 4c b6 8d f7 52 aa 0e cd 40 68 b9 a5 3c | a0 60 8b fb 10 3c d1 f2 ff fe 68 e7 a0 77 68 8d | 57 42 d2 69 06 47 ac 40 b8 e0 04 cb c8 f6 4f 1d | 03 54 85 51 66 3a 5d a4 50 77 be d8 da d0 2d 83 | ec fc 40 51 40 fb 42 ac d0 7b 6a bb da bc 70 8a | 29 00 00 24 68 5b cc 69 fb d0 13 3b e8 08 a4 7f | 64 dd 90 05 87 d0 ef 71 6b e1 05 c1 5b 79 8d ae | ad 0f 65 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c0 76 e1 0d 6c b9 42 c8 33 bc 53 | ff 32 29 9e 1f 22 19 37 00 00 00 1c 00 00 40 05 | 55 af f1 7d 61 b1 bc ab 4a c0 77 54 16 9f 5e ae | 09 2b b0 20 | libevent_free: release ptr-libevent@0x55564d9bc908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #88 spent 0.354 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df a9 ce c3 5d 1d d4 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | df a9 ce c3 5d 1d d4 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.814147; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #89 | libevent_malloc: new ptr-libevent@0x55564d9bc908 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 21 bb 6b c2 cf ca 17 99 30 83 05 11 3a c8 1a | 12 8d 00 8b a9 30 3e 5c 65 24 e8 2f 4a 39 66 b8 | 8f 0e fa be e3 fa b1 85 df 0f b9 47 32 ca b2 46 | f5 14 5e de af fc 6d 19 fa f9 68 c0 0a 4f 66 a7 | 15 85 17 a6 69 8c 0b bd 96 18 94 dc da 53 c9 bf | d2 ff c3 84 9c 84 19 e5 2e 11 c8 f1 c3 6e 22 d7 | 88 16 70 cf 08 e9 a0 ad 17 b5 21 ad bf cc 88 fa | 27 6d 39 bd 5a 17 ea d7 62 a4 a8 d0 60 43 ac ce | eb b9 28 88 e2 98 a2 12 1a 2e e1 ae 36 56 c8 75 | 7f e1 0b 2a f9 c7 28 99 ff 92 8a 53 44 ee 65 bc | dc f0 b9 9a 04 93 83 89 9f a4 4b 20 af 5e ca 72 | fe 8f 3b 22 13 52 f3 d2 c6 ef 87 2b c3 47 77 e2 | af f3 04 9b 49 c8 8a 97 5c e4 5c 4d 9d 00 e6 09 | c2 79 c4 d3 1d 94 4e b0 72 c4 4d a6 52 fc da 23 | 70 64 93 1c 4e ac 18 7f af f7 b7 84 72 61 3d b8 | ae 52 88 c7 02 14 4b 0c 2a 15 c4 fb 78 8a 68 ae | 29 00 00 24 c5 aa c0 cd a2 f0 1e 9e d3 c4 7f 86 | b5 6e 88 9a 36 71 5e 28 57 07 2c 17 63 fe 00 64 | 85 64 e4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 8e 06 eb 62 29 ac 94 0f 78 de 59 | a0 ee c3 20 ce c8 f2 d4 00 00 00 1c 00 00 40 05 | 9f a9 88 29 b1 d3 6b 4f 50 93 26 6d 3d 19 ae 6a | 60 22 bd 55 | libevent_free: release ptr-libevent@0x55564da022b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #89 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 4f cc 5e f9 a5 eb 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 5a 4f cc 5e f9 a5 eb 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.892564; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #90 | libevent_malloc: new ptr-libevent@0x55564da022b8 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 d0 1a ca bb de 2b 24 bc 94 e4 1d 83 02 f8 3a | fd 8d 71 0b 08 a5 12 47 ec 94 73 01 13 bd 90 33 | 2a 12 84 24 64 3f 85 d7 c5 50 2b 4c 01 d2 95 0b | 9a e3 a4 5d 91 fd 83 e9 17 60 c8 09 ff 66 6a e0 | 26 bd 89 16 04 24 82 ef 47 04 4d 45 60 9d 14 8f | 70 5e d1 19 eb a9 bd 64 dc f6 51 c8 9b c3 8d 94 | 95 eb e0 4f 37 c9 00 3a 45 7c 67 98 7a f4 22 56 | 51 a0 27 1d bf 2c 41 b4 10 4b 9d 6c 84 f8 49 a4 | 4c b5 5d 08 78 09 72 3e 3f 0d 82 43 53 51 8e d8 | 91 5e 1f 44 22 2f 4f 75 80 26 3d b0 8d e0 25 31 | 72 cf e1 73 9a 06 e3 0b 42 d6 80 23 f4 d0 d3 11 | 22 57 93 18 da 67 97 c9 c9 f8 74 fa df 79 76 c2 | 8a 49 f7 28 13 12 cd dc 3a 9a 1b 58 4a d3 6d d9 | d0 fc 8f 77 8c b8 7f 4b f1 05 e6 66 90 a6 87 51 | 3f 32 86 fc a9 f6 9a e7 8b ad 45 8e fe ed 61 c6 | e8 81 86 3f b9 6f 49 5c 3f 0d d5 a8 d5 13 53 6b | 29 00 00 24 96 8a 69 76 7b 11 dd b5 3c 09 e4 f1 | 29 78 89 e6 0c 77 38 a8 1c 11 37 a7 fa bd 5a 4f | 86 88 b2 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 ce c4 98 23 d2 ea a4 59 9e 32 5c | 8d 58 d2 c7 65 d6 46 56 00 00 00 1c 00 00 40 05 | 3c 2f 76 b4 1c 5c a8 8b 46 b0 f2 f7 81 01 f7 4e | 5c 0e 37 01 | libevent_free: release ptr-libevent@0x55564da51dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #90 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 8b a2 03 f7 e1 87 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | cc 8b a2 03 f7 e1 87 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10613.976006; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #91 | libevent_malloc: new ptr-libevent@0x55564da51dd8 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 01 f5 da 3d 7e 65 d3 85 dc e1 54 4e bc 8b | 90 2c 30 67 3f 28 61 04 a1 0f cc 60 e5 b7 08 ac | 55 19 2a 32 f3 3e 2a 05 fc f6 24 08 9d b7 e0 3a | ee 8c eb 55 58 6e 07 86 46 7b 12 7d 7e b9 35 ab | 00 7d 2d fc 02 26 ac b9 14 f0 7c 04 46 a9 4b 86 | bc 49 cc 59 94 21 e4 0e fd 72 7a 62 74 f0 06 13 | 4f b4 9c 7d 62 f1 e8 d4 4e c2 97 78 30 0a 15 f5 | e6 3e 7b 4f 6e b5 60 60 36 d9 9b ff c5 c6 c4 cd | 2a 7d 8b 77 d5 7f 49 94 4f 6c 6d 66 aa aa 0a c9 | b3 cb 46 d1 00 95 e4 6d d0 15 25 c5 94 3e 3a 6c | 52 84 f7 59 83 cc 4a 61 b9 a4 f5 1c 42 e1 39 58 | 30 d6 bc 96 4a 4b 3a 87 3e b1 cd 0b 0a 59 67 b7 | 33 c3 f8 4c 58 b3 e5 05 31 2f 20 23 93 00 84 ec | 7e 1a ba 1b 01 1b 2b c3 1d 87 d4 c7 4c 72 ba 2a | 56 79 ab 9d 5e e2 46 ba 11 fe 83 7f c6 2d f4 6a | 1f ca b9 7c 7d 97 13 6a e4 8c 86 a3 9a 8c 28 74 | 29 00 00 24 54 3b ae 25 1d c4 b4 e8 0f 12 6e 0e | 27 cd 67 20 ff 91 ca 91 16 2b 4c 9f ff 6b d2 cf | 7c 2c f1 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 55 ef 46 92 32 47 f6 f8 30 5a db | 76 93 b6 47 ef 3d 05 d8 00 00 00 1c 00 00 40 05 | f0 15 d4 29 95 43 bc 0e 6d 3a ac 15 e3 35 06 92 | fd 4a 08 fd | libevent_free: release ptr-libevent@0x55564da26778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #91 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 55 07 64 21 cd 61 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | 83 55 07 64 21 cd 61 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.058353; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005486 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #92 | libevent_malloc: new ptr-libevent@0x55564da26778 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 32 59 dc e3 60 1b 7a cf 5b 03 90 ec 31 d7 7d | ba 88 48 62 99 8c 66 52 09 9f 42 3b ce 5d d0 15 | 9b 08 ef 74 7f 13 4d ae 09 ee c4 43 0a da cd be | 5d 60 04 37 ae c1 46 dc 7c 1c d8 6a ca 65 83 b3 | 46 ba 10 3d cc cc c8 5e 06 bd 0b c2 1b c9 da b1 | 07 80 93 23 ba 87 65 27 4f e4 ff 7d ba f8 ea 8e | 4e 41 a9 ee ee a8 4c ca 56 43 45 60 1e 50 30 62 | 67 2d cb c6 95 75 dc 9e 7a e5 e5 99 f0 fb 9d 7c | f8 55 ec 4b 5a 26 02 63 fc d8 ca e5 9f fa 0b 18 | 84 fa 00 96 bc f2 a8 12 e1 ab 25 80 fa ce da b0 | c6 09 33 de 40 b9 08 94 42 34 6f 1e 90 31 de 15 | 82 58 9f 5b 11 ac 57 ab 5a f3 55 52 35 92 b2 e1 | 7d cf 1b 93 42 aa fc 58 ca 02 48 71 7c 8e 55 4d | 54 cd 25 cc 98 42 6c d3 c3 4a de f9 d4 03 a0 1e | 05 da c4 e9 21 eb 89 9c 64 de 74 dd 10 9a e5 d0 | 91 13 da d6 aa 88 ba 71 cd a4 c0 6f ed 7b 8c 00 | 29 00 00 24 ff 5c 18 54 1c 0b aa cc 4d 42 86 40 | 27 20 cb 18 2d 75 28 47 45 dd 37 69 5e a7 2b 6f | 80 46 ef 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 5c 60 40 61 a0 ce 5a 54 0c f6 f9 | 24 45 aa 09 d6 4f 8a f9 00 00 00 1c 00 00 40 05 | c0 1d 60 9d 68 fb c3 86 9a 14 c6 b9 a3 28 fe 28 | bf d7 f9 12 | libevent_free: release ptr-libevent@0x55564dab00a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #92 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 4e 1d cc f8 5e a6 ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | dc 4e 1d cc f8 5e a6 ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.150716; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #93 | libevent_malloc: new ptr-libevent@0x55564dab00a8 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 86 f8 66 59 2e 39 09 3b 2b df 20 17 c0 8f f8 | 09 ee 06 fe ed a9 bc 69 d0 b8 00 82 1f 84 8d ed | 7f 01 a7 c9 7c 14 50 7d 82 d7 1f 2b 92 2d 41 b2 | 5d e7 d6 18 cc 3f 80 19 d6 30 a5 04 45 7b 85 ae | 5b 66 be 14 e7 a1 19 87 4f bb 1a 32 c1 78 f0 3d | aa 20 0c d5 b6 d6 34 13 55 cf 39 2a 68 c9 71 c0 | 44 b5 a8 09 1f c0 22 6c ce 30 de c3 1f b5 8e 30 | 44 d0 e9 b5 7f d6 7f f0 b4 04 51 f4 9c 82 42 70 | e6 fa e5 dc b1 3b e4 13 2b 63 c3 e1 54 32 f6 aa | 29 dc 87 ae 43 9a c2 3e 28 81 80 e2 9b c4 5d b2 | c1 b4 b4 3b a9 43 11 08 18 18 f4 66 08 9f e7 d1 | c0 12 fb b3 0b 0b 25 6a 3e 3f 87 28 9c d6 8d 82 | b7 da 22 b2 d0 1d 31 52 0a 06 34 53 2c 37 7a cf | 29 43 d5 7b 77 2e a8 de ed 9a 4b e6 67 f4 82 20 | 22 67 a0 0a ef 9f ad f2 a3 01 af 8d 65 77 c8 a3 | 5d 06 9b c4 56 63 60 2d 2c 7b 85 0d cf b7 27 8f | 29 00 00 24 cb c0 ab ef ab 09 68 3d 33 64 44 8e | bf 81 75 40 43 51 55 ea fd 8d 3b 27 dd d4 dc bb | b5 57 ef d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 b9 1d a2 15 63 cb a0 41 b2 d1 4d | 6b 1e e6 6f 69 cc 74 2c 00 00 00 1c 00 00 40 05 | d4 41 2c b2 70 43 99 a6 d6 d0 98 2b 85 95 15 db | 8c b2 dc e9 | libevent_free: release ptr-libevent@0x7f49940334c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #93 spent 0.565 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 60 c3 6f fa 22 40 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 54 60 c3 6f fa 22 40 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0516 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.242514; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #94 | libevent_malloc: new ptr-libevent@0x7f49940334c8 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef f6 96 ea e9 3c e6 36 0e 5d 27 75 51 a0 e5 65 | b8 45 15 5b 61 8b 89 67 c6 9b 96 0b 0c ba 4f 4f | c0 11 da d8 a6 4a eb 51 cd cd 37 44 8b 38 d7 76 | e1 8d da e0 c4 18 75 cb e9 e9 15 2c 9d 8c ee bd | 04 14 a2 10 d9 6d 55 6f 40 67 28 00 1a a7 c6 dc | 84 28 02 f1 f4 cb 67 8c 3d 31 74 0c 2f 20 52 d6 | 6b 5f f7 ac d3 db 33 73 85 bb 71 88 a5 a7 15 1e | 8a 21 3a 4e cf 0f 29 1b 76 40 7b 18 66 11 48 79 | f4 bd c6 92 bb c2 1e f7 c8 ce 43 6a 76 37 81 23 | c7 c8 c4 57 e2 57 54 3b b8 18 ff 50 5c 6d 8f ff | 35 f9 5b 7a a4 90 77 59 af 7f 83 74 87 13 9e 8e | 26 e6 e2 93 1f cf a0 f3 ff 50 4b 14 fa 08 27 3b | 36 fc fc 83 20 66 e8 2f 02 90 f1 e0 28 53 87 2d | b2 47 66 93 50 f9 4d 79 6c 71 fc fa 54 47 bb 05 | e8 f0 34 39 47 ea 28 dd 89 88 a8 33 47 f0 43 0a | 2d 97 71 e0 56 9a ac 03 ef 10 46 7f 74 98 e1 9a | 29 00 00 24 75 f3 87 c2 49 ee 7b a4 c9 4b 83 78 | f1 06 6c 70 f0 bb 4f 56 ec ef ac 97 13 5c 27 a9 | 75 d1 99 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 0a b9 b3 eb 6c ec 2c 17 e8 b5 19 | 0b a1 ca ee a2 11 61 69 00 00 00 1c 00 00 40 05 | e4 4d 13 03 28 76 0d aa f5 55 83 34 54 6f 35 f1 | 23 b5 99 46 | libevent_free: release ptr-libevent@0x7f497c03e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #94 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df d7 ad f8 cf 16 bf cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | df d7 ad f8 cf 16 bf cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.321813; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #95 | libevent_malloc: new ptr-libevent@0x7f497c03e3d8 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 8a 0c 16 b8 b6 e8 3a b3 12 7c 98 a8 cb c1 1c | 4c 36 25 46 14 57 a3 d2 d6 4d 47 f5 c8 6e 08 79 | e0 6f f3 c2 44 0e 46 9b 14 5f 6f 77 bb e8 98 51 | 0c 62 ed 51 e5 b5 27 0f 86 2c d4 f5 ef 7b f3 ea | 7f ac 6c 3a 23 d8 59 04 18 8c d3 11 35 84 2a 6e | 42 68 2e 54 d1 26 f7 ad 7e 66 bd 51 ef 7c 74 14 | 6d dd 27 be f6 25 4d ac 54 a0 0b 76 f8 f3 28 7f | e3 10 c3 94 37 9f 17 65 89 20 ee 21 6e c4 2a 86 | b2 c8 bd 40 d6 9d 85 3a 59 62 18 33 0f d8 f3 1a | 11 b7 3b ad d4 5f 53 ea da 95 b8 7e e7 e3 f3 d5 | be b9 66 bf ad c9 00 cd 89 2b c2 bd f3 1d 52 c5 | bb 19 37 74 30 fb 9f b0 91 b4 41 8c 0e f4 f2 f3 | ae a0 40 eb 0e a5 9c f6 56 50 d5 bb 9a bf 43 a3 | 78 f0 d2 cd ea fb 90 97 b4 c8 82 45 f2 8b 40 7e | a8 c0 0b fb 5b 5e 65 28 e8 dd de 3f c4 d9 0e 34 | d8 da 10 ed c8 74 b6 f2 df df 2d ef 2e 18 85 be | 29 00 00 24 aa cf 2a 5a cd 25 ef de 09 6f 7d 10 | 8c 85 90 63 75 f0 a0 52 51 ce b7 86 c1 80 07 40 | 12 73 a8 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 64 be f6 0b b1 88 c6 d8 ec e4 6b | 8b 22 d9 43 b7 98 57 d1 00 00 00 1c 00 00 40 05 | c5 6e bb ef 11 b9 4f bb 90 7c ab c8 2a 7f f0 9d | 93 4d 35 9d | libevent_free: release ptr-libevent@0x7f497403e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #95 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b 54 f0 26 ed 26 22 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 4b 54 f0 26 ed 26 22 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.381122; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #96 | libevent_malloc: new ptr-libevent@0x7f497403e3d8 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 52 14 96 28 10 07 fe 0b 52 0b 54 03 e6 d6 4a | 64 29 88 ae 3a 33 58 fd a9 dc 72 4e db 75 31 c2 | 16 a6 25 5e 70 64 eb 8f 19 39 f0 ce 19 a6 06 71 | 90 8e 54 83 62 4e be 99 90 8c 35 74 2c 99 21 07 | b2 72 f1 11 25 42 9d 59 35 28 99 5c c9 93 14 a1 | c8 bf 97 5e 66 6c e3 5a a4 03 10 19 03 38 e2 4c | 69 b5 a0 86 62 e2 ab 69 94 50 fd 84 7c c2 8a 0b | 7e 41 ba 37 2c 85 a6 80 fd ac c6 89 bc 36 5d ff | b1 2d 4e c5 5a 16 a1 bb 47 2a e0 7e 4f b5 f8 ca | 36 96 79 ee 59 64 38 0e ec 98 64 74 fb 10 c3 eb | 25 43 a8 e3 f3 a6 ec 60 cf 2d cd 47 b6 e1 e7 25 | c3 92 39 8f fe 1c df b5 9c f9 e9 e8 b8 6a 1d f1 | 0e 96 30 3d ce b9 32 78 3c 07 2c 9e d8 41 e5 cf | 7d 39 46 af 83 f3 3f 7b 11 b8 f1 a4 b6 15 88 7a | a6 14 63 5b f0 cb d1 05 94 ac 07 11 db ba be 82 | 02 3d 70 cf 34 00 37 31 c7 c5 92 63 0b 9e 6d 93 | 29 00 00 24 b8 a8 cf 08 07 9a a2 23 df a2 2f e2 | b8 dd 4e f8 e0 f0 33 49 11 5e a3 a7 f6 bd b7 56 | 01 6b 2d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1d 89 b1 f5 b6 42 77 37 ee 6a 39 | f9 6c 04 c4 32 35 05 c1 00 00 00 1c 00 00 40 05 | 15 fd f8 dd dc 07 7b 65 79 18 54 32 e3 04 fb 5e | ef 66 c4 12 | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #96 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ea 95 70 ed ce f4 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | f3 ea 95 70 ed ce f4 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.442414; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #97 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 6b f1 ee 29 dc 8b c0 34 58 2b 6a 3e 7c 0a ab | c9 4c 6d 82 b7 11 0f c6 ff 96 7e 16 0c 77 e0 ae | d2 81 f5 f8 5b 89 0d 2c c4 51 b7 04 d3 04 bc af | 79 19 c9 36 ec f2 12 ab 68 0f ad b3 59 69 6a 9a | df e0 04 15 d9 9e 19 a4 3a 97 8c 5a 79 6b 62 6a | 57 cf 16 a0 c3 6f fd a3 fa 84 e7 1e 21 75 1b 94 | ac 3c ea 33 34 a6 6e 3a 35 f0 56 e4 ab 3c eb cd | e7 c6 a6 f5 54 b1 16 bf f2 d5 53 e5 c8 52 0a 16 | 75 d2 9c f0 b1 d6 6d a7 b6 fa d9 85 46 e3 a2 e5 | f2 37 b6 14 ba c8 57 33 72 e3 06 f5 26 68 1c 71 | 34 06 27 bf ce 02 26 c1 e7 6f 9e 57 d4 9a f4 9a | 12 85 5d 8f ed 90 f3 64 25 d7 21 e2 c3 49 ca df | 30 78 f0 96 6f ed d1 e8 38 d9 af 91 59 5e a3 a3 | 6f a4 99 56 1b d5 46 95 db a8 34 09 dd a1 63 b6 | 97 b5 cf 04 7e 7a 11 c4 25 ff 92 66 6d e5 b4 c8 | 1e c9 2e f1 5a 5e b7 51 7d ac be 1c da 6a c9 1d | 29 00 00 24 58 c3 05 29 46 6d 00 c1 14 e5 a7 e3 | 65 d2 a9 48 da c5 6c 5d f6 d8 55 9f 0a 3d 43 09 | a6 aa f1 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d0 62 1a a3 f8 ad a0 17 be 31 10 | 2f 5a c3 86 32 1c 48 82 00 00 00 1c 00 00 40 05 | b1 bf 5f 5e aa 56 36 d9 f2 54 95 70 16 7a 87 5d | 49 28 dc 70 | libevent_free: release ptr-libevent@0x7f49b802b6f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #97 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 87 ef 20 74 a3 87 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | e7 87 ef 20 74 a3 87 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.505706; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #98 | libevent_malloc: new ptr-libevent@0x7f49b802b6f8 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 97 8a 0a eb 75 ff bf 83 ae 07 e3 eb 6d 97 09 | b5 2a 03 4b 9b c6 75 3f 4d 75 6d a2 bd b6 08 32 | dc 23 61 b8 0d b8 7b 3b fd 93 d8 d6 36 d5 48 06 | 7f fc ed 2e 72 25 e5 b1 d7 b3 f2 48 a7 e3 7c 87 | 88 5a 90 ff c4 e0 70 63 49 07 bd d2 3c 6b 50 bd | 5f c7 ae 05 4a 1c bd 1f c2 8b 21 20 47 54 77 47 | 9f 24 01 62 b2 52 32 73 9b 05 49 19 c8 a8 52 d3 | 77 21 1d f1 3c 38 d8 e1 78 3f d7 ad 8d 98 9a 79 | 9b c3 04 2a 6c 9f 8d 32 db d7 74 2e 52 be b0 3e | e5 98 ba 37 d0 8a f3 8b 2d 3f b0 7f 17 ca 49 3b | fe 4d 8d 13 7e 99 cd e1 5b 88 50 cc 51 d1 f6 35 | c4 7a 27 9c e4 ea 5c 70 80 c8 70 ee 70 13 0a be | a1 ea 5c 5c 73 62 5e 27 0b 14 32 00 79 70 67 a6 | 68 ce ed 41 2a e0 2b b6 ac 43 f9 a2 5c 8d ae 9f | 65 77 e4 5a 13 c7 ec 57 72 3f 5b 89 83 65 49 ba | bc ba 45 92 9c 62 06 2f 44 89 58 0e 3c 69 e9 68 | 29 00 00 24 76 6b 16 02 76 8d 57 ff cd 95 16 7c | 29 dd 07 46 a5 1b 6d a8 26 d7 99 d3 e3 ed 25 35 | e3 6f c9 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 52 d9 bb e7 c9 28 7a b6 d3 e2 19 | 78 0a e6 f3 13 4d 68 ca 00 00 00 1c 00 00 40 05 | 69 2a 33 31 e4 eb dc 09 71 67 36 8c a0 d1 57 23 | 09 41 d6 e7 | libevent_free: release ptr-libevent@0x55564daa2ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #98 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd f4 e6 fa e9 6c c2 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | bd f4 e6 fa e9 6c c2 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.563101; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #99 | libevent_malloc: new ptr-libevent@0x55564daa2ee8 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 61 2b 56 00 ba ac ec 30 66 2d ac a8 d6 42 f8 | 92 b3 9f da d0 28 8b f8 9b 38 cc 9d 33 83 e6 70 | ac 76 9f 0e 78 bf 8e 71 2f 6f 29 06 65 9f 34 4a | 1e f9 bf b9 16 48 03 0c 85 14 ba a8 c3 2a 8e 7f | 65 f9 30 74 f1 97 48 b8 53 c8 29 b7 fb 1c bd c1 | 1c 47 58 56 72 8a 52 2a 93 8f d0 b8 f0 53 71 cb | 71 b0 8e a4 11 b7 ce 33 cb 76 1b b1 55 b7 8a bd | b0 01 9a da dd 46 12 ce f4 30 77 0e 7e 18 8e 46 | 1a 14 64 d3 1c f9 07 50 43 0e d8 21 40 41 46 77 | e1 37 57 36 da aa 5c 1e 3c 1e 37 73 85 84 1b a8 | d9 89 9d a3 89 63 d5 76 6c e4 bf cf 78 14 c8 5a | ce 71 8d 2c c0 33 a5 cf 52 92 bb 15 8b 5a 23 fb | e7 83 fd 6c e7 8b 5a 52 76 bb 55 30 76 fb f7 59 | e4 22 53 75 50 15 89 c3 ee 7a fc 41 15 eb ff 9d | 0f 96 85 1c 8b bc 21 6e d7 ad d6 a0 de 84 fa 03 | e1 fa 4c 05 45 11 2e 69 f3 a2 9d 59 c5 7d 00 a2 | 29 00 00 24 de 03 07 e1 d1 7e bf 61 a5 52 fd fb | 8a 2a a3 67 57 1f 0c 21 38 be e2 b1 68 14 0e a5 | 6b a0 1f 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e af ef c4 27 a4 59 bb 11 c0 03 a7 | b3 21 51 01 be 6f ad 41 00 00 00 1c 00 00 40 05 | df 87 76 2f b2 e9 d2 ac 8c bd b6 23 09 a5 be 14 | af d5 b1 9f | libevent_free: release ptr-libevent@0x7f498403e1a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #99 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 0d c9 79 d0 64 09 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 49 0d c9 79 d0 64 09 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.622402; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006468 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #100 | libevent_malloc: new ptr-libevent@0x7f498403e1a8 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 6a 94 f2 8a 9d cf e5 08 2c 34 2a da 55 07 71 | 1e 85 8c 3d c1 22 90 ad da bd 1a f4 fc 50 61 e9 | 45 8d 35 d0 ec 54 06 37 eb 20 07 87 96 63 c9 b2 | 20 e0 fa 5b f4 54 4a 24 e0 d5 5f e3 75 a0 2a af | 40 8b 1c 7a 3a 0f 70 f0 d4 40 c5 19 9c 6c 9a 4d | ca cd be ba 69 6c e9 c5 37 f8 ee 7b 14 d5 98 f6 | 05 95 55 86 25 a9 88 83 12 2c a4 a2 55 12 2b 12 | 21 e9 f6 1d 45 dd ff 79 60 6a 7a 70 59 43 a5 06 | 42 c0 6d 2f ee 2d 45 9f db 58 a3 a8 18 e2 33 e5 | 9f 0a b1 d8 ad 75 f2 42 82 a8 b2 80 c5 d6 e7 18 | 84 15 89 0b ee 86 26 30 68 95 1c 94 88 4d a3 be | 67 3b cd 7c 44 ad b7 de 47 b0 f1 f0 66 04 dd 19 | 8a 5b a4 e7 7f 24 19 0a 3c 9a 36 cb 7f 47 8b 73 | 08 f7 51 c2 cf c6 f6 ad a7 fe e4 0b c6 bb da 3e | 7a 62 56 aa 80 cd 0e 47 a9 dd bb a8 25 f6 bb a2 | 62 0e 9f b9 14 f0 fe 3f f5 f4 01 d2 be 11 bf c9 | 29 00 00 24 e8 8c 14 15 23 ec 2b c7 16 a7 33 9d | ed dd fe f1 62 6e 49 d0 28 7f 2c 94 1e a4 1a b3 | e7 ab 1f 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 80 9a 03 06 67 ed cd ea 37 18 cc | 06 20 56 bd a1 55 0c c7 00 00 00 1c 00 00 40 05 | e8 f6 83 a5 59 35 b0 79 91 36 61 df 6d dc 61 2e | 14 a2 ff 9e | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #100 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 06 57 37 67 a3 c6 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | ab 06 57 37 67 a3 c6 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.682752; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00788 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #101 | libevent_malloc: new ptr-libevent@0x55564d9c8478 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 00 73 06 5b c4 0e 05 c3 84 13 16 71 ec a2 40 | 02 52 3e 84 c3 72 e5 ae 84 2f 57 43 85 3f 73 30 | 8b 07 ff 73 94 1d 2d b5 c3 73 d9 8a f3 0c ac 5f | 0d 74 45 5c ef ef e1 12 ab 02 46 95 73 dc a7 83 | a9 83 22 32 15 8d de 9a 8c 6a df 53 30 64 6e 44 | e3 0b 66 0e 55 c1 ba e2 cd 84 1d 61 95 55 15 87 | 40 c6 78 c7 61 27 b9 88 8e 89 1c e6 aa c2 70 6f | 4d 2c a0 bd f0 76 ae 44 6c cb 3b ee 22 31 7b 44 | af a7 f0 b7 c3 ea ac 45 10 1a fd 6c af 81 21 49 | 29 d7 c5 a0 24 ce 71 59 5a ca 85 fd 70 31 36 a7 | 61 5c 5f f1 50 6f 60 69 5e 18 4d 07 49 22 26 b5 | 62 fa 32 fa a9 cc 02 9d d0 6c 6c a7 09 f2 f1 87 | 28 00 91 d8 cd db 3d 81 cc b4 96 44 42 bd 62 7b | b3 6e 08 16 52 92 83 f8 5f 11 5e f4 0b 02 6d 2d | 6e 76 8c 62 2f 8e 88 9a b1 f2 62 94 0d e7 31 95 | 57 1d e2 2c bc 36 2d 79 d4 ae 24 d0 69 15 81 d2 | 29 00 00 24 20 af 23 1d d9 ff db fd b6 c3 a1 ea | 79 2c 7d fb b5 8a e6 ce 09 9b 19 d1 c6 13 1c af | d4 fd 34 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 87 fa 9d eb d3 35 12 8b c7 ff 81 | eb bf 6c ed b0 68 7f 37 00 00 00 1c 00 00 40 05 | ff 8c 12 7e d0 a7 8b 5b 60 3b c6 1f 42 37 1a 1c | 08 da ae 90 | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #101 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd f0 70 d5 46 04 08 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | dd f0 70 d5 46 04 08 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.741065; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #102 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 68 11 25 d3 ed ab fe 8d 1c 92 fd c3 39 b0 6a | 34 e5 43 d7 11 26 a4 4c bd 46 57 77 52 d8 ce 9c | 63 ef ab 80 e5 b1 08 f3 b8 c2 1d 61 21 14 78 cf | c8 06 77 97 b4 3b bc d1 83 04 17 4c fc de fa d4 | 92 be 9d 31 7c b5 c9 9e 7f a7 6f 8b 10 08 b8 46 | 8d 95 47 9c 0f da c6 37 4b 6b a6 e2 d2 f7 fc 48 | fe 6d d4 85 76 6e 95 ea 76 95 e3 45 2f e8 49 3c | 21 82 eb e5 e5 be 8a be 28 d3 30 c8 c3 1a c9 ee | 06 72 b8 f3 41 87 d2 05 5c 0a 5b f2 a3 8b b3 e5 | 20 f0 ec 5d 40 7d 5e 5f 97 36 41 e5 e8 b0 05 03 | d1 3f eb ec 2b 68 6a 9a 70 a4 ee 0d 7e 59 68 ff | d3 28 ad cb 11 30 09 d1 5f ab 3b 87 d7 64 87 4f | d7 67 79 0e d3 8c be 69 9a df 8a 4c 45 f6 3e cd | d2 6c 87 9b c5 a0 90 0a 43 c3 ef 37 e6 c0 e3 58 | e1 8f 55 36 9f ee cd e5 98 b6 e0 1d 04 92 dc 92 | c6 ea 11 20 e5 33 4e 38 42 af a8 8e 35 65 11 2d | 29 00 00 24 07 bc 73 ab e2 33 74 8f 35 75 b3 ab | ed bb 23 14 94 f2 56 bb 4f d5 b6 10 33 f5 09 8d | 3c 12 1e 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 d3 ec 77 d9 aa 58 96 40 b7 ae 73 | 32 40 20 dd 12 6c 7d e7 00 00 00 1c 00 00 40 05 | 30 49 78 f1 0a c3 0b 4a 56 af 59 f7 c5 e6 74 f0 | 69 c5 9c d1 | libevent_free: release ptr-libevent@0x7f499403e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #102 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 28 61 e5 47 55 c1 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | be 28 61 e5 47 55 c1 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.803422; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005215 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #103 | libevent_malloc: new ptr-libevent@0x7f499403e548 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 33 24 96 eb d2 a2 f0 56 d4 d8 7c 01 34 6a 3d | d1 e8 e2 2d 43 ea 85 f4 a2 bc f8 90 30 1e de d3 | 88 cc ef 62 80 5a 94 a1 ce fe 89 17 72 d7 b3 43 | 8f 47 5e 6b 5b 8d 53 21 54 3c bc 73 7f eb e7 7b | c7 d4 16 0d 26 a9 e6 1c ef 61 3d d9 be c5 61 e9 | dc a6 80 2e e5 39 ed ba 41 53 b6 32 4c 52 ca 40 | 78 8c 50 27 41 c2 33 e0 95 6b 7e e2 a1 f4 20 b0 | 18 49 88 0c e7 38 fb 63 3e 3a 0a 2c 86 45 f7 15 | 41 e0 80 5f 04 4a ec 4e 95 6e 1d 21 c9 62 c1 17 | 2c cc 3a ae a3 8e e6 8e 8e cc 1f b9 ec 29 96 1f | 19 50 90 3f 22 b4 e8 17 c0 5a 14 3f 02 59 cd 63 | 50 78 2a 08 9b ed e0 52 66 e0 58 38 8f 60 94 8e | 01 de 9a 5e 6f 1b fa 4f 01 f8 cf ed 69 08 98 aa | c7 a9 df b9 be ab a6 11 dc d8 38 17 46 e2 5c 3d | ad 29 dc 92 5e cc 16 1c 9b 26 a1 ce 66 be 60 8f | e8 c9 ad 4c 07 46 7b 81 b4 b3 f3 09 c7 94 36 1d | 29 00 00 24 73 53 d5 10 c3 36 e7 60 59 2d 1b 23 | 40 9c f2 a6 dd a6 04 d3 06 6a 52 0c a3 b2 ec 87 | 21 00 74 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec b0 97 25 8c 5a 84 55 a6 2c 6e 52 | f4 1f 8e 3c ad 8e 2f 4e 00 00 00 1c 00 00 40 05 | 4e 6f f5 e0 09 1b 97 b9 d2 88 ca c1 7a f3 90 f1 | 53 0e 94 1b | libevent_free: release ptr-libevent@0x7f49ac043b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #103 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 17 96 53 27 a7 c6 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | eb 17 96 53 27 a7 c6 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.869799; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #104 | libevent_malloc: new ptr-libevent@0x7f49ac043b98 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 ef 96 a0 b3 a2 21 e3 4b 27 a7 dc 8d 47 4f 95 | a5 54 ad 30 9f 61 b2 4d 76 34 8e 22 1b 0b bd 2a | d3 b4 2e 2e 5c aa 48 37 d1 12 36 01 d6 74 92 3d | ce d4 81 fe 8b a3 2d 42 eb df d4 9e d2 8b d1 f7 | ad e5 ad cb 15 9e 3c a5 ee 0a 4b 5f 51 87 1a 81 | d3 d8 df 2d 7a a8 58 02 31 0e 29 a9 ec 12 c0 b2 | d5 bd 9e ef 0d a5 51 29 c7 bd e0 07 1c fa 65 2a | 04 c8 53 cd 5b 40 df 39 88 5a 35 93 a5 80 89 94 | 5f c0 ba d8 39 fd 59 00 5b 90 4c ea 92 6a 55 28 | d1 0b 28 29 fd f4 3d 9d ca 57 87 1a 73 45 e5 fd | bc 8b 9d fd 86 49 5a 22 38 dc 49 a4 80 fc 54 1f | fb 0c 0c 34 e7 2e a7 96 4a f2 d1 b6 2e bb 7d 5f | d7 69 62 fd 62 3a 1c bb 79 c0 3b 0c 9e 0a d4 c2 | b0 c4 c8 42 2f a0 be 43 06 76 ed 84 1b 00 8e 84 | f6 85 37 49 5e 36 5c 7d 04 e4 0d b6 0c 66 c8 73 | ff 62 4c 64 df e8 35 b7 ea f9 d8 7e 08 f9 08 2a | 29 00 00 24 d3 43 12 d2 53 c4 a5 2b b3 46 97 fa | 13 64 19 69 40 c5 29 94 45 dc 30 92 ad 6a 8a 9c | 71 37 69 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 c4 46 9c 6c fe d4 8d 8d 9f 6d 11 | 55 53 f1 6c 06 7d 5b 7e 00 00 00 1c 00 00 40 05 | 4c ea d2 35 a5 6b 62 64 60 b1 82 69 8f b4 48 d1 | 67 66 80 98 | libevent_free: release ptr-libevent@0x55564da39558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #104 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 bd 55 a1 55 2e 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | 58 d0 bd 55 a1 55 2e 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.930167; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #105 | libevent_malloc: new ptr-libevent@0x55564da39558 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 39 d3 1f 07 70 31 73 06 b7 bf 34 b6 97 d9 5a | 40 2f d9 46 68 9b 09 7b 5e b6 21 a9 67 66 50 f1 | 50 03 49 c2 a3 ad d9 16 4e 94 5a 29 9a 0c 26 2c | 69 78 d7 ff 59 0f 64 81 0c 61 d2 5c a3 52 62 f4 | e8 7e 12 11 3f ea 7b 28 b7 36 83 b1 f5 e5 5c 0e | 7f 46 b3 bc e2 69 56 f0 97 1c 8e a4 eb 59 63 f0 | fc fe 2f 43 8e dd 75 bd 60 3e aa ed fb 3c ea 4e | f3 86 d3 c9 2a 20 90 2c 14 ac 0c 96 61 61 be c0 | 9e 6a 3c 37 cf be 94 d2 ea f2 69 02 a5 6f 00 73 | 92 fc e2 62 2a c8 6c 6a 03 55 5f 99 71 06 14 33 | 2c 45 85 c5 9b dc fd 8f ef 53 59 e3 74 f6 d0 fa | ca 11 6a c9 38 cd 12 04 c1 c7 bb f7 90 28 1f 8b | 24 bb b0 38 e2 65 dc 1a e4 e7 00 8a a5 d6 a9 95 | 55 76 dd 8a 02 90 65 53 aa ff e1 06 a3 ba 67 7d | 9f a0 b5 c0 1b 69 64 69 8e f1 79 1b c3 cb fd 9e | 0e 18 79 b3 df 06 8a 6f 63 a3 3e 2a 98 7d 36 1a | 29 00 00 24 fd 7e b2 55 93 09 c8 54 ea 3c 7d 58 | d1 e5 c2 e7 15 90 ed a9 29 d1 5a 07 31 04 d9 95 | 1e 5a 5e 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 aa 9e 96 09 2a 49 03 d6 51 05 86 | ae a2 66 14 9f 19 ab 81 00 00 00 1c 00 00 40 05 | 5f 9e 47 e3 da 15 f3 39 86 ee d8 50 c3 36 11 f8 | 57 3c b3 d9 | libevent_free: release ptr-libevent@0x55564da6a748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #105 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 96 5f fd 57 7f 56 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | b2 96 5f fd 57 7f 56 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10614.988454; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #106 | libevent_malloc: new ptr-libevent@0x55564da6a748 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 53 d9 0e b0 85 7e 9a 25 34 e6 25 8f e8 1e 4f | e8 2c 8d 60 87 2e c7 d6 91 65 62 0f f4 f0 3b d8 | b9 26 e5 eb d6 57 2a c4 bd a2 cc f1 e9 05 fa a7 | 65 fb d7 08 54 ca 1b 3b ed 27 d1 df b5 b5 f1 da | 86 87 44 4b 5e 61 70 ba 49 78 d4 60 9e 2a de f9 | be 0a 76 89 85 22 58 5c eb 83 14 ce 56 69 4a 8c | 0c 43 5e f2 4f b7 ab 5f 4b 6d 7b 1f f4 f1 b3 0f | 5b 83 85 3e c6 56 36 5c 6b 2a aa ec 8f 95 de 57 | 39 1f b1 8b ba 78 ca aa 6f 06 17 53 73 20 98 04 | 1f 1d 7b 1b 26 63 e8 be 31 ce 60 ef c9 28 1e 5e | b1 56 b5 59 48 80 6a 00 bf 31 84 43 97 fb 1e cc | 5e 87 0e e6 7e d0 9d a2 1e 93 e4 67 9a 1b 14 99 | 01 33 c7 fb d3 74 ee 43 a9 7f 55 f0 37 1b a7 51 | 92 89 45 40 e5 c4 4f 00 5c 6e 4d 90 f0 00 dd 67 | 17 6a 72 09 9f b1 fd 61 14 b0 5f 9d 4a a4 e0 9f | 1e d9 75 a5 81 06 12 dc c1 5c 4d 22 7e 9c aa 1a | 29 00 00 24 27 d2 6f 63 03 9a 80 67 27 f2 c7 27 | 44 4e 99 2e f0 13 68 64 e5 f1 33 03 b0 64 5a b1 | ae 55 4e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e bf 03 6b 3a 12 c3 6d aa a5 73 90 | 6e c5 dc dc a8 a4 8e 12 00 00 00 1c 00 00 40 05 | af ba 1a f0 29 20 bf 03 db c4 72 4b 15 41 5c 25 | d4 55 9d 4d | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #106 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ae 3b 35 2c f6 31 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | 3c ae 3b 35 2c f6 31 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.048802; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #107 | libevent_malloc: new ptr-libevent@0x7f49a80333d8 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 b3 db f5 a1 ee ac 03 24 45 41 47 f1 df b4 25 | 55 d8 6f 4b 6e 4e b1 67 0c fe 32 72 28 24 89 ce | 54 35 eb 23 e4 a1 b2 ad 81 04 dd b9 e0 5c 67 09 | ea 30 9b 55 b2 77 4d b8 fb 4a ea cc b7 01 9e 68 | 48 30 e6 89 e5 ab 4f 2f dc 08 74 18 70 2e 56 32 | a7 74 27 02 fc 6a 47 37 61 5f 70 19 f3 a9 39 53 | 7f 79 18 f2 23 45 30 1d 79 30 2e 01 4a 0e 45 ec | b2 fc 28 c5 60 0a fa 16 da 05 fa f1 da 2b 34 9e | c4 fb fe fe 04 54 18 cc da 08 a9 da be a3 af 5b | d9 38 fc 5e d8 d4 d1 c5 32 68 df 30 99 d8 94 9c | 35 39 79 c2 72 50 30 3a bb df 91 ab fe a1 3b a7 | e5 da d2 4c ae 22 da 47 91 50 bf c0 cf ff 3a 82 | cd 9e 67 92 df 7e 1f 45 16 c4 b6 fc 82 7f b5 95 | 6e b5 6c 9c 48 94 4a cf 05 cf 75 23 0b bc 6b 5d | 0f aa 88 fc 49 f1 ae ff 37 45 44 5c 32 b5 cf 2f | 31 73 11 b1 9b ea e3 14 0a f8 7c 51 47 4a 9d 13 | 29 00 00 24 67 19 0d 80 ff f8 81 4a 63 bf 20 96 | 13 0e 67 18 c9 ea 94 e3 4e 47 d1 e0 c5 aa d8 3d | 58 4c 89 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 8d 17 86 b0 b3 3c c1 5b c2 ee b4 | 65 14 07 41 ab af 02 b7 00 00 00 1c 00 00 40 05 | 17 f3 f9 d6 79 e5 d4 db 55 71 db 43 02 2e ff bb | 0d 0f c4 b7 | libevent_free: release ptr-libevent@0x55564da10928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #107 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 23 1f cf de ae 29 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | 97 23 1f cf de ae 29 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.108144; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #108 | libevent_malloc: new ptr-libevent@0x55564da10928 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 e6 b3 26 97 a2 3f f1 ed e7 78 f4 46 cd 47 de | ca b2 c5 82 32 ed 07 5f 93 1f 4b 9f 97 dd f3 bc | ae f5 51 aa 17 4e 59 10 05 74 9f 88 59 a9 6a c8 | dd 43 86 ba 61 f9 0e dd da 42 28 19 42 88 1a cc | 31 7a 95 74 f9 a3 a7 92 14 fa 89 0a fb f1 71 71 | 38 15 6a ff aa a1 3f 68 ba 59 34 72 f0 24 14 be | 32 8f 94 97 da e3 d7 ea b2 23 4e 8a 56 75 8d a4 | c1 47 60 1f 52 1a 9b ba 39 b3 d0 80 71 fa be 2a | 00 6c c9 20 a3 82 2f c8 42 c0 c7 a0 ad ea 40 c0 | 4b 69 03 78 a5 ee c3 a5 9b 64 df 48 bc e0 45 7d | b3 cb d6 65 96 6b d2 ff 1b c6 1b f5 95 78 33 f1 | 54 36 24 da b6 d9 74 e8 84 28 5e 70 c9 76 fe 2b | 95 f1 87 72 94 0c ae 35 a0 30 ed 2f bc 03 98 6f | 1b 91 24 b2 b3 27 29 98 3d cf 1f b6 a0 b0 80 ca | 7b c1 51 c7 73 98 08 e2 f6 da 17 80 d9 d3 52 91 | 8f 8b 61 bb bd ae 7c f6 18 e7 dc 6f f0 a9 c1 86 | 29 00 00 24 94 e3 d3 b0 69 54 bb 4e 89 72 7f ff | 01 9c b8 d8 8f 3e 8a 12 dd ad 00 08 9f 41 14 9c | d7 2d 7a 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 62 63 6c ce 57 05 a6 94 f6 41 d7 | 7a 0d a3 89 bf 97 04 cf 00 00 00 1c 00 00 40 05 | 2a b6 e6 9c 80 81 84 f2 f2 28 8f 07 cb 32 ac b1 | cb 37 52 c2 | libevent_free: release ptr-libevent@0x55564da120a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #108 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 61 ff 65 03 3a d0 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | 96 61 ff 65 03 3a d0 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.169501; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #109 | libevent_malloc: new ptr-libevent@0x55564da120a8 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a b7 86 a4 3b e2 86 4d c4 b3 ba b2 db 84 7d b7 | f0 5b 66 86 14 36 50 e5 f9 e3 a2 87 cf 30 d6 c8 | 59 27 dd ba f6 77 5b 1b 6e ae 86 11 7a 26 97 60 | 64 96 8c b9 dd 3e a2 ae 8f 98 63 31 8b 74 a6 5d | 6a 0b 3d 51 a7 6c 6c 16 57 f1 93 13 8f c9 18 8f | d3 2a be 37 2a 4f a3 fb 22 b6 de d4 b1 e0 9b 0d | 62 25 95 9c 64 35 3e d1 6e 60 41 a7 11 98 e4 b4 | 5a 42 0c 72 94 bb 05 3a 99 55 b7 31 16 a9 e8 24 | 8d 3c 28 bd 0c 58 03 39 9b cb 80 26 80 34 83 d0 | 26 f1 23 4e 4f 2a 33 b9 ac c1 54 58 c4 22 01 8f | 64 fb 6c 80 a1 a1 7a c5 8a 70 f4 36 84 72 f5 72 | cf c4 46 37 f6 c0 36 ec 0c 66 6b d4 ce 2a fe 3b | 97 9f 97 b1 90 36 1e 43 8c 42 78 d9 a3 d7 c8 d4 | 9f 87 54 b3 8d 04 16 a1 44 b9 e0 34 ba d0 22 b3 | 2d 43 1d 11 1d 49 45 f2 2a ce 9b 0e e0 40 93 1a | 37 ed bc ff 02 e6 13 8e e5 a2 c6 e9 df 91 cb f9 | 29 00 00 24 e8 e7 8c 0f 50 4e f6 9b f3 47 02 7f | 25 fd 3f 4f ed 3f 33 c1 78 24 35 a3 2a 84 66 da | 9c 1a 1e a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 7c 5e ba 82 80 d4 39 26 27 ac 1f | ab 71 f4 70 17 5d 01 e2 00 00 00 1c 00 00 40 05 | 0e 26 14 57 be 2b 0e 19 c7 c3 ec 91 28 89 61 0b | 87 61 cc 0c | libevent_free: release ptr-libevent@0x55564da41f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #109 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 02 c9 a8 ac 48 46 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 9f 02 c9 a8 ac 48 46 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.241813; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #110 | libevent_malloc: new ptr-libevent@0x55564da41f18 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 2a 4c 37 a8 c4 20 4f 70 95 10 52 84 c8 c2 e3 | b1 86 68 49 23 37 93 cc 4a a1 b5 9b 7e 12 10 25 | 79 5a 79 bd d8 51 5e 86 4e 60 32 b0 7e bc fc b6 | e2 33 38 b4 30 1a ba f0 e9 9a 8c 28 75 d6 37 ab | fc 2d d1 7f 08 fd dd 4e 44 a3 93 a2 27 c0 64 67 | 69 d0 10 a4 da ce dd 9b 22 39 57 b7 e6 d1 bd 10 | 26 aa 13 4c 70 83 6d 3e 93 6f ef 8f ae 80 8a d2 | b6 1e 25 28 8d ce 73 63 17 e3 25 2e 2b 1a 69 67 | c4 51 8a 58 65 66 8e 19 bd e6 ae f2 23 93 fd 6e | 80 8b 1b 67 dd 3b d8 31 24 57 c9 06 4b 28 32 b1 | 18 e2 29 0d 68 f7 0d 85 a9 d5 a8 78 85 4e 1b 8e | 09 46 e5 2a de 3d b4 dd f3 bd fe b9 59 0c 62 91 | 4a 67 32 4a 70 73 b6 d3 45 a5 4d 9a 86 77 08 0d | 0d 7e 05 d7 ba e4 b3 0f ce ac 58 0c 95 cf 66 b7 | af c8 6c 6e ae 15 a3 a3 5a a0 d0 aa 22 5f ca 63 | 81 e8 41 47 49 10 14 2b d5 77 15 7b 70 ea 9b 94 | 29 00 00 24 74 ff 9d 3b 3e dd e5 b5 1e dc 69 47 | 24 45 a7 58 85 a9 eb b4 1f 22 89 65 ca c5 9d ea | ca c2 b7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 f9 76 7f 61 67 30 51 b0 f6 c0 90 | 27 c3 82 95 8b f2 c6 e7 00 00 00 1c 00 00 40 05 | 56 4b 0e 97 30 02 f7 9f 5d cf a1 9b 12 3b 11 79 | 30 fa 35 85 | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #110 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 41 ce c7 73 9e fb 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 43 41 ce c7 73 9e fb 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.317179; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #111 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 31 26 16 c8 fd 5e a2 15 19 ea ea 20 cd 1f 2e | 77 03 f2 1c 95 80 fe e0 bb 6b 6d 8e a0 65 83 04 | 20 9b 0b fa 26 71 99 f3 41 33 1b 42 a8 c6 48 87 | 05 c9 e6 24 ea 45 f1 cf 79 b1 e0 b1 02 35 b7 48 | f1 37 a8 06 3b 90 ed 6c dc 66 cf ef 67 f9 0c 68 | ff 36 86 24 32 76 3c 1b b6 0c 99 86 13 a0 48 51 | e9 c3 56 7f 20 bc b8 c2 84 7e 58 a0 09 6e b2 fe | 3c bc fa 2a ce 17 d4 57 36 29 71 5a 19 1b db 11 | 2c 70 4a 26 b7 01 6f be 68 91 75 48 b3 ab 02 ea | d3 e7 a2 b0 16 df a5 69 94 06 ff 92 e8 d0 8b 29 | c8 0e 1a 30 28 88 bc 4d c3 ba 20 d2 57 18 d5 48 | 71 4e a8 b9 c9 3f 03 bf 08 3d 3a 1d 02 1c 85 15 | 07 a6 98 bc 9e 61 25 89 e7 88 53 28 37 69 d9 51 | 68 84 1f 4b b3 2f fd 4a 12 56 24 91 6d 11 fb a9 | 24 42 95 6a 5e 41 c3 0a 7c c5 b8 cb d4 3d 8c 3a | 51 2e f5 7f 25 34 98 27 f7 49 a1 94 87 f7 c0 98 | 29 00 00 24 17 76 48 d9 84 55 1d 9a 16 c9 0c 83 | 7b ea f4 dc 4f d9 b7 35 e9 1c 68 2b fa 6a 1f 39 | 46 51 8a f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 e0 6f 21 20 ca 6f d7 b0 de 59 93 | 55 27 58 ce 90 df 2a 44 00 00 00 1c 00 00 40 05 | 53 23 45 be ee 45 89 db ec a2 cf 96 c2 2b 03 7d | 37 f3 0a 5a | libevent_free: release ptr-libevent@0x7f4998043b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #111 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 6c 72 51 0a 01 3d ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | b8 6c 72 51 0a 01 3d ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.378567; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #112 | libevent_malloc: new ptr-libevent@0x7f4998043b28 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a ef 17 3e 04 6a 82 5c d0 46 5d 67 94 52 d7 9b | 95 63 ab 2a f8 11 4d b4 ed bd 33 78 d5 fa fa d1 | 4c 5b 6c c1 0e 3f 06 cd 33 b3 a5 74 31 2f 1c 5b | f9 30 84 86 8b 89 63 e0 21 df 55 48 e1 1c 71 9f | 16 f1 5a db 97 ce 03 ff 50 6c 44 9c bf 29 80 6b | 51 51 aa ae 95 f4 7c f3 68 e0 3d f1 50 7c 62 65 | af d9 ca 3d 51 5b 4b 78 48 f2 e2 86 50 c0 48 71 | 71 61 8d 7d b6 91 8e 7d 5d 7a e7 be 4d 88 8c f9 | de db 78 8a 36 ff f0 b3 a8 d2 3e fb 98 8d 66 bf | 6c 31 d3 04 1a 05 70 0f bf d4 1c f0 54 74 3c 98 | f2 8d fc 43 c4 01 2b 84 f5 32 71 20 57 db 60 8c | 7f 66 4e cf 97 e9 c7 3e 6f c0 a5 db f4 16 67 96 | b3 a8 53 4f 9e 81 7d 9e 04 61 81 13 fe 37 f6 b4 | e2 bf c5 02 97 13 93 6e 27 cd c1 2b 14 3b cc 02 | ef 26 bf 08 f3 c8 71 cd 7f 72 7a 51 b9 50 2e 78 | 07 3a 77 03 8f 43 d2 29 31 65 4d e0 29 ef 42 61 | 29 00 00 24 33 37 30 8e 75 1b e6 91 73 ee 74 67 | 31 94 29 71 b0 f8 8b 3c f8 f2 3c 20 6e 7c 84 9c | 7c 97 73 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 a6 93 45 9e 1c 89 d3 5d b4 f3 3b | 9c cf 74 3e c9 f6 c1 52 00 00 00 1c 00 00 40 05 | 71 02 c3 4d 29 bc bc 36 04 62 ef 95 6a 01 47 f3 | 3d 19 44 19 | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #112 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 3f 01 06 4d 9e 71 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | bb 3f 01 06 4d 9e 71 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.438831; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #113 | libevent_malloc: new ptr-libevent@0x7f499002da88 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 7a f8 8f 3e 5a 0c 70 80 7c e9 64 42 7f 8d d2 | 3e d0 43 32 d4 32 cb 37 4e d7 d3 75 a3 88 c7 72 | 8f ba 80 4d 16 8e 00 76 ac c1 b5 c0 d9 bb 76 fe | c0 ca b4 59 51 c7 39 6c 8d 1e 42 74 4b 5c b6 e9 | 77 bb 1c 9b 5e dc 03 0d e8 91 6c 19 d1 a6 62 71 | e4 f5 c4 91 37 4e ba df 1d 0c 11 d5 61 73 2c 15 | a7 6e 59 d8 0f 97 5a b0 e4 1d 98 a5 94 d4 4f 6e | c2 03 60 3c dd ab 8e 50 36 39 cc 47 da 4a 47 e0 | 2b 47 b0 fe dd 61 48 f2 f0 1e 44 35 87 55 97 8e | dc b8 0b 3e 5b 0d ba 4e 68 4e a6 a7 21 37 04 ba | 02 36 3a 1f 90 63 bf 84 48 64 07 f6 04 e4 14 82 | 3d 60 4e 15 82 a9 18 44 7a 58 d6 eb 6d 63 73 48 | 28 ca ae 8b 4b dd c2 b0 d5 f7 ed d8 73 07 bb 8c | 69 09 dc 82 63 00 5d bc ce a7 e9 4c e4 9b 0e 0c | ba 7e 4d ea 1f 2b 03 59 14 e6 c6 dd 32 1c 70 78 | 21 15 45 d7 b6 88 ad 72 b2 37 ca df ad 6e fe c7 | 29 00 00 24 4d 15 b2 73 44 b4 42 b8 a7 db bc f2 | 20 2a 90 a6 00 8f d1 51 3d a2 ac 5c 13 c0 7a a7 | 81 3c 59 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 6e e9 38 8a 84 d5 ab d2 46 1c 37 | ce 10 bd 7e 49 3a 12 0c 00 00 00 1c 00 00 40 05 | 17 d2 07 02 04 8d 8c ed 63 b3 4f 41 f1 e4 3f 2e | 6e 69 4a f5 | libevent_free: release ptr-libevent@0x55564dacba18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #113 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 32 45 e1 75 ea 97 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | c4 32 45 e1 75 ea 97 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.495208; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #114 | libevent_malloc: new ptr-libevent@0x55564dacba18 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 fa 46 6e 1b 0d 75 3a 49 68 92 69 b5 23 9d a8 | 83 d0 14 7f 6f 28 08 e4 7b 8a fa 09 3e d2 26 33 | 42 71 d6 95 eb 2f 38 ef 95 e3 09 2d 28 e7 95 69 | 6e c3 a8 da e6 02 7c 5d 8d 91 ca fa de dc f3 a7 | c2 8b c4 2f 06 bd 14 55 56 66 99 99 73 53 53 67 | 02 79 d9 95 46 89 3f 03 9a 9e 6a a1 ea 66 ae ae | d3 0d 28 cf d3 66 34 19 f6 f3 a8 01 d6 f7 d2 87 | 49 48 ab 88 4f 80 ea 3d 2d cb 08 d8 f7 8a 4b 56 | 06 7b 57 35 b6 b2 4b f6 ae 95 fa 41 fe b5 3e 8e | df ff c0 14 ba f7 0f 74 63 02 8d b2 f8 f2 9d 14 | 9e 97 95 68 b3 83 93 1b 62 51 45 fc 6b 92 9d 02 | 22 75 a6 43 63 bb 90 9d 3b f2 ad c0 57 59 bc 41 | f2 c4 bf 87 49 47 ce dc 11 46 d3 52 68 39 9c 42 | 13 44 10 8b b4 0c 59 bd 57 35 ff 13 10 d9 b0 0d | ce 07 4d 12 e6 34 37 41 7c 53 d8 2e 71 f8 16 6c | 67 f2 be c6 2d 85 ac 86 95 7f 72 c5 65 60 c8 9c | 29 00 00 24 46 b7 08 da e8 bb 00 39 2b aa fd e2 | 92 b7 71 ee 95 ef c5 f4 92 17 c9 97 fd 7d 37 fb | 7e e7 bb ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 88 d8 59 31 7e 8d 88 be 81 ee 8f | 05 9a 2f a5 ca 8c e2 61 00 00 00 1c 00 00 40 05 | 3b 36 48 f8 7d 98 fa da 5e 94 c7 e6 8c eb 5c 4e | e2 cd 18 c1 | libevent_free: release ptr-libevent@0x55564dacd198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #114 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f b4 80 42 63 d4 b4 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | 3f b4 80 42 63 d4 b4 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.55674; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #115 | libevent_malloc: new ptr-libevent@0x55564dacd198 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf cd bb 8d d8 cc 2d bd 2c de ad 4f b9 bd 52 c7 | b1 fe 31 d3 41 cc 2b 64 bd a8 31 f1 bd c0 b0 a3 | 93 ea 58 c2 76 75 9f a7 7a e5 9e f3 d3 d8 fb 61 | 7c 4c 6c 22 fd e2 0c 79 5b 10 1e 7c 78 8e 8e 47 | ea dd 79 1b f5 c1 9c 7e 03 f3 83 61 ad 1d da c3 | 5a 84 e4 07 e1 c4 62 dc 25 22 63 3f e0 9a 9a ba | e1 ed f7 30 35 35 a8 b3 53 65 13 05 9b bb 9e b2 | dd b5 f8 5f ee dd a6 ec cc f9 0d 74 3d 92 66 7b | 84 60 2e 9d 44 b8 3f 8a 54 75 61 66 00 a0 5f c6 | 95 b1 ee 15 85 13 71 1d 15 b2 5b 90 4b 73 d5 83 | 1a aa 62 f3 31 3c f0 90 ba a7 c6 48 92 4d 07 a9 | 40 f0 80 dc 28 97 ee 8a d3 1f a3 b3 19 e7 9a fe | 0c 0c 91 2a 00 9d b2 55 82 12 be a8 11 e7 8b 6d | 8c 9c 73 36 e7 1d 83 59 04 a8 40 c5 73 44 f8 76 | eb 5b 40 da e1 0e 79 5d 0a 9a 99 75 cb 2d 6c 66 | 79 7b a5 89 53 fd 99 22 0b 39 81 d8 f0 fa 5c 8f | 29 00 00 24 a6 12 7c 7e 44 e4 4e ba 81 de ae f8 | 06 24 8c 70 73 50 29 00 ef 70 c8 91 8a 53 52 42 | 1a 2d 65 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 6d 23 10 18 c6 8f ab 71 3e 31 70 | 52 5c 7b f6 36 80 4e f5 00 00 00 1c 00 00 40 05 | c5 68 80 36 d4 12 eb cd 73 60 48 fc b1 49 33 f7 | 2c 55 c1 78 | libevent_free: release ptr-libevent@0x7f499c043ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #115 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 9a b5 b4 9f 53 73 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | 68 9a b5 b4 9f 53 73 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.617114; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #116 | libevent_malloc: new ptr-libevent@0x7f499c043ca8 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 d2 fe 7a 1c c4 19 00 01 d5 17 66 f4 6f 39 23 | c4 00 22 fe f2 d5 80 2b a2 7d e0 ff fe 6b 76 40 | f2 94 0c e6 6f c5 74 09 42 0c 3c 7a 3f 7c 73 1e | 86 2b 2f 62 f4 b0 7f ee 35 22 af 75 37 09 7d bf | 9f 7d f6 d1 36 3c aa 1d b5 43 07 14 a5 ac ce c6 | a9 17 8b 40 4e 74 01 2b 2a 0a 6b 0c 59 07 40 62 | bd ec 98 09 e3 cc 7d f2 37 3c a7 09 f4 38 a9 2b | f9 a5 5a 23 8a 09 05 25 3c c6 93 53 30 3c d9 a0 | 8c 21 3d 2a 1c 9f c4 b2 2b 6f 42 f3 89 ec 2f fb | 48 b7 01 cc 92 af c0 19 85 ca cc b1 7e d9 be 6b | 55 b3 69 69 29 e4 43 d1 f1 f0 91 12 c3 17 01 c9 | 48 c4 f8 7e 63 94 80 4d 25 42 67 8f 58 03 fc ad | 30 fb 56 ab 9e ba f2 91 61 7a fb 99 26 f7 2f d7 | 34 ff 2f 59 d3 2f cb 75 72 2d 4c 88 6a 6b 02 68 | 94 33 d2 09 e0 d4 f0 86 a5 fb bd 8f b1 cf 42 74 | c5 27 90 68 70 97 f0 ad 59 28 e1 dc 4d 3a 62 97 | 29 00 00 24 19 ab e6 7b 4d c9 bb 4e 79 03 3e 4f | 90 58 40 d6 52 31 cd a3 8a 57 ed 3b 7a 93 27 eb | 46 68 36 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 28 e6 a4 ff ad ab e8 be dd b1 72 | 27 91 c3 b3 fa 8b dd e2 00 00 00 1c 00 00 40 05 | f8 0f 36 c1 43 18 6b 8d 60 71 2c 4d c8 32 5f ac | f5 6b 03 16 | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #116 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 fe d4 9f 08 4b 75 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | a4 fe d4 9f 08 4b 75 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada198 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.675504; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #117 | libevent_malloc: new ptr-libevent@0x7f49a80122a8 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 16 52 c9 2d ae c8 b7 50 9d 6d a9 56 cf 14 19 | 4c 6c b4 8b 13 4b 93 79 f8 7a 70 40 08 c1 7f 51 | 59 62 1f 4b a1 34 6c cb bb 53 e8 d3 2b bf 8f 8c | 4a 26 b2 e7 f0 ae 6d cf ef a6 93 d4 6d 3f 05 7c | 37 c2 59 5f 04 a6 5a 79 70 9b fb 38 7a 15 49 d4 | 23 61 0d 23 88 a8 00 8e 20 80 11 90 5c 0e 68 26 | b1 91 e5 7e cf 9c 7e 89 e0 2d c8 a8 57 9c e8 c4 | 74 5c 84 3e 51 2b 09 be 66 a3 e8 99 84 4c 2e 73 | 4f 08 46 db 6d 35 36 74 1a 61 34 ce 68 25 48 92 | 10 e8 67 55 27 49 b8 9a df 67 06 95 f3 a7 89 11 | 21 53 53 78 d8 08 a3 d4 33 05 97 cd b1 3d 7a ad | 8a 9d df e9 dc 9b 02 c8 8e 62 06 10 36 a5 f8 dc | 1b 39 4c 40 1a b4 9a ac 2e be a7 8e d2 bd e0 a1 | 09 fc c4 8a ea 18 61 26 ed f7 2f 9d 27 76 9b 5d | bd db 76 68 e3 a7 04 ef e7 ae 37 e5 ea eb ec 4a | a9 84 30 35 56 98 95 a3 63 3e 97 0f 82 de 2d 5b | 29 00 00 24 9d 7c ce 06 87 05 6c 3b 32 9e 39 0f | 85 2b ff 49 e1 f1 b5 86 1a 13 34 76 d4 b8 67 6a | 8d c8 2b 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 e6 41 7a e6 91 5f 3f d6 4b 01 53 | 65 c7 cc e9 eb 5f ec 6c 00 00 00 1c 00 00 40 05 | 3f 14 60 8a 71 cd de df 27 06 6f b4 70 4d 5f 80 | c7 47 db 5c | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada198 | #117 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 13 0d cc 63 b4 8a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 67 13 0d cc 63 b4 8a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.755815; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #118 | libevent_malloc: new ptr-libevent@0x7f4980038bb8 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 78 fb 52 ef 5d a6 26 93 a4 da b7 13 23 62 35 | 0d 61 17 f2 1d 2e a8 82 7b 38 25 ed 9f 5a da fc | bc 56 dd 91 2a 26 3a 72 fd aa 84 ed d0 87 cd bd | b1 de 3c 6e 7e 5a 61 0b 23 18 09 c4 22 4d ec f4 | 28 24 af f9 7f 3f e7 1a a7 cb 80 1d c2 ab a7 05 | 97 a2 83 5e c6 31 7a 03 f2 a3 99 77 20 97 c6 93 | d2 47 08 b3 b5 56 5d 2d d4 48 f0 ba 6e 25 de c1 | 43 53 46 98 c1 47 a1 01 7d 85 37 6d 61 ac 26 8c | a2 3a 0f 2c 46 01 5b f8 3c 39 97 87 8c c2 0f c6 | 0b 50 76 45 5d fe 5c 97 81 89 bb 28 4c d1 4f 70 | 2a bc 4f 47 00 8f 61 05 79 4d 6e cc 84 84 49 9a | 48 43 b3 70 69 06 71 93 bc 24 e0 3c 24 0a 3f e5 | c6 fa ef 54 d4 70 1c ba b8 7b 98 98 be b2 7c 5b | 2f 95 6b 83 21 fe 4b 8e 14 63 b0 07 aa 34 f9 42 | a3 47 e4 11 80 a2 93 1f 7d e2 e6 13 16 80 b2 f2 | 64 e0 e5 3b 92 4b fb 62 b6 84 03 ab 59 e5 ee f9 | 29 00 00 24 7b 81 c8 8a 5a 45 5a 0a e8 89 a9 6e | 9d 62 83 81 41 48 c3 16 58 e1 1b 5a e7 35 63 eb | da 59 b1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 36 a0 9e 45 ae 6e 0a e7 8d 93 e0 | 3e 54 42 f4 3e 4e a9 62 00 00 00 1c 00 00 40 05 | 1e 00 a5 3d ed 94 5e f3 9d b2 19 b9 73 4f c1 66 | e0 e3 5c 25 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #118 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 b4 a4 bf b8 af ff 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 80 b4 a4 bf b8 af ff 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00433 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.814224; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #119 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 69 d3 8d 85 25 61 da 74 07 ce 39 3b 40 fd 21 | ed 1c 87 5e ef e6 7a 33 de 41 d7 fa 12 38 8d 51 | 77 68 76 60 24 8b a9 81 8b 68 aa cf 78 47 76 48 | 84 b0 97 86 49 96 1c 73 65 6c cb 7c a5 32 64 3d | 43 76 88 79 8b c3 8c 00 c1 87 55 ef dc f7 b5 85 | 8a 6e 46 1e 75 f4 f6 fe 06 b9 95 ad b4 e9 b6 ed | c3 4d a7 c6 19 95 18 08 a9 d5 b1 b1 fb 12 23 d2 | cb ca 94 7c da b8 d0 8e 7b 29 fd 16 b0 37 03 6c | b9 5c a2 e4 af ab b0 47 84 22 27 ea ae e6 2a 4d | 07 ce c5 66 86 4d ef 72 33 e5 f8 64 88 1e 90 c0 | e8 35 5a a9 3a e9 fc 72 89 bc d6 e8 4b a0 40 08 | b5 f6 ec ad 2a 25 39 73 97 76 68 af bc 01 e4 b4 | 2f 71 0a 36 95 38 99 fc 4e cc 9a ed 9c 82 3a 43 | 58 3c 90 ee 29 8b 16 f1 37 81 39 4a 85 2c 5b a6 | a2 b8 e1 aa bc a9 b3 43 c5 3f 2f e6 9f e8 c1 d5 | d4 ef 71 22 6b cc d4 64 4a 92 06 b5 07 68 94 6a | 29 00 00 24 21 42 2a 04 a1 e1 2b d0 6e 0f 86 4f | 9d d0 3b 79 46 47 04 b5 31 5a b5 a5 d2 bf 3c 18 | 1d 8d 6c 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b ba 05 44 3f d0 d9 06 31 06 ba 06 | a3 77 d9 d8 7d 9d 29 d4 00 00 00 1c 00 00 40 05 | 98 b8 2f 93 0f 96 66 00 42 b3 8f e5 72 f6 cb 1c | 8c cb 06 6e | libevent_free: release ptr-libevent@0x55564da7a5e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #119 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 57 f0 0e a9 23 4c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | 65 57 f0 0e a9 23 4c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.87656; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #120 | libevent_malloc: new ptr-libevent@0x55564da7a5e8 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 15 23 47 7b 3d d5 40 90 c0 67 d1 14 9f 57 e2 | fa e7 80 0f d7 94 75 75 2b 06 01 ef c8 fb 5c fc | 98 d8 ed 16 9b 44 3a 59 9a 1a 03 81 fe 33 6e df | 29 be d8 0d c5 89 cc 80 aa f1 6d b1 86 64 4d bf | 54 b5 a0 83 01 0c 02 c2 26 42 46 26 a8 81 27 3c | a9 f8 b2 87 be ff 9d 8c 4d 56 0f b0 a8 20 0a c8 | 18 d8 4d 04 c7 65 19 f6 d9 83 3a 9a 10 61 f1 33 | c9 98 74 5a 08 6a b8 59 ab bf d6 06 b4 b0 59 25 | 60 0c eb 60 e6 02 35 6b c1 6f 5a a1 8a d9 7a ad | f3 1e 5a 24 dd 92 53 10 54 04 c6 b5 ca e5 fc e2 | 88 cd f5 4a 5b bf 00 65 06 52 66 93 32 78 8b ab | 31 02 ab 5b aa 1b ee ce a0 fe 45 45 1c 76 3c 9c | 41 1d ca 6e ac 6f 6f c5 98 c0 30 98 99 9a ce ca | 54 f5 bc a8 7e 88 ac c1 17 95 9e 16 ed 74 72 d5 | aa 4e f7 8a a4 13 5b 61 44 7b f8 f0 60 67 62 db | 9a d8 98 70 a9 db b6 de 2b 41 ef eb fc 2a f2 43 | 29 00 00 24 e8 dc 42 8a f2 3b 41 75 0b db 9b 22 | 27 0d c0 0f bb b1 29 2b 07 3c 8c 3f 42 56 1e 44 | a8 b8 1e 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b c9 e5 4e 01 c2 fe f7 61 0e bf 0e | 5e 86 b6 cc 1c b5 23 2f 00 00 00 1c 00 00 40 05 | 50 42 63 1d 5b 8b 5a 81 c4 47 70 09 25 db 5b 2d | da 97 89 7d | libevent_free: release ptr-libevent@0x55564dad5c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #120 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 2b ef ae 6b 04 94 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 86 2b ef ae 6b 04 94 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.935476; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #121 | libevent_malloc: new ptr-libevent@0x55564dad5c68 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 03 95 51 4c b1 29 d4 31 ce 55 af da 02 71 fd | 81 97 56 cb f7 5e 91 29 da 30 bc f4 cd 47 68 fb | fb de 91 23 70 63 e2 e9 a9 36 1d 5c a7 d0 79 dc | d0 3c 7c e4 30 db 25 1b e7 d1 0c 51 e8 83 49 d7 | 53 07 d4 55 31 45 fc 0b 74 07 b0 32 75 92 c8 3c | ca 80 63 80 74 12 34 e5 f6 8d 2f 63 3a e0 be 63 | b6 40 e9 73 e8 16 d6 ae 12 c5 6b b5 66 45 2e 52 | f7 72 8f e9 26 96 06 70 1a b7 55 fd 46 bf 2c 19 | e0 49 4a 3d 72 92 b6 2c 12 0b 01 95 24 2e 9f a3 | f7 20 0e 79 e0 c7 2e 4f e2 2d 62 ad f4 45 7a 4c | bf 0a 05 4b c6 3b ca af ad e6 11 4a c0 af 5e 6e | 03 46 a9 11 67 cf bc 4e 7d 21 fd a3 3e 18 2e b7 | d7 1c 1e 92 64 07 04 d0 21 fc fb be 94 7a 2b d2 | e6 ad d6 d8 c4 7c cd 3d 45 9c fe 34 18 03 b7 b9 | 29 ad de 73 4d 95 86 d2 6f 08 9e 7b d4 39 21 33 | 6e 78 d5 79 61 e8 9f 39 d0 f1 9c 76 f9 73 0d 40 | 29 00 00 24 ad ee 29 eb 67 e9 ab b4 1a 8a 48 9a | 81 8d 9b 49 27 70 18 bd 47 8a 11 70 ea 84 a0 17 | a2 66 a6 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 2c e0 b3 93 f1 25 a6 93 90 b8 da | a2 47 88 0b af a3 16 5d 00 00 00 1c 00 00 40 05 | 2e 03 4d 04 3c e5 05 72 91 8c 61 18 3c 68 c3 64 | c9 b6 65 31 | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #121 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 07 8c 48 fb 09 4e e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | c7 07 8c 48 fb 09 4e e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10615.997834; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #122 | libevent_malloc: new ptr-libevent@0x55564da95dd8 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 b1 92 ef c0 15 5c 9e dc 55 bd 31 1c ab fd bd | 04 86 e8 04 c0 1a d6 16 df c6 9a b4 ef 3f 6f c8 | 74 57 a0 50 81 97 84 93 8b e2 a7 dc b2 5e 5e ca | e5 97 85 25 f4 db 1e e1 fa 23 8a ac 43 d7 c2 53 | 2a 2b 85 21 e7 90 13 79 cb 46 0b f2 c1 09 35 66 | f6 51 d7 84 19 5d 48 19 e1 13 13 5e 2e 99 ea 85 | 53 39 5e 99 96 b9 98 c6 f7 55 72 47 72 3f af 00 | c6 b3 e5 47 7b 12 6d 54 f2 a5 a1 19 dd e4 3d 39 | cb cf b5 01 93 3f 4d e4 0f 4a 1a 57 45 d8 d0 b3 | ce f3 43 84 f5 e7 d4 7e 9e 0d eb 9d 07 c1 b0 f8 | b4 63 58 18 39 3e a2 3b c5 34 ab c2 c8 ff e9 a2 | 5f 5a 07 5d 63 9c a3 05 fe 68 73 53 d8 a4 e2 27 | 4f 36 4c 35 f8 64 86 5b ee 23 03 dc 69 2f de 11 | 8d 4f dd 28 e9 47 55 bd ed b9 61 01 44 2b 86 9b | 68 a9 aa bb 9b ac f9 6c 7a 79 b8 57 bd dc 92 25 | 90 84 d0 3d 63 ce 35 14 6b bc ee 71 f2 de 55 1c | 29 00 00 24 e1 e7 a3 55 96 da ef 77 72 8a 37 84 | e4 b2 d1 21 84 9c 11 c5 bd 40 40 ed 1c 0c fc 39 | 8f b4 94 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 5a cd 62 d3 ce c7 70 db b8 05 85 | 38 62 25 2f b1 c5 71 2c 00 00 00 1c 00 00 40 05 | f8 ba 4e 4f fa 86 d9 60 1e d6 e9 2c 1d ae 1d ed | e5 9e 89 9d | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #122 spent 0.566 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 13 20 da 99 29 93 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | af 13 20 da 99 29 93 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.062606; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #123 | libevent_malloc: new ptr-libevent@0x7f498001d1e8 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 20 cf 9f e3 b3 67 10 06 9a dc cf 7f d7 21 a6 | 65 8e f2 a4 a7 1b c5 0c b4 3d fb dd dc 19 ec 76 | 10 23 fb b9 08 48 64 f8 44 e9 77 fa a1 02 45 eb | c6 af c2 5f ac ba d5 19 78 4b 8b 64 df 78 3a 64 | e5 e9 c9 30 dc d6 e2 27 d4 4d 56 d6 38 70 de f6 | 7d 23 03 3b d7 30 a2 d4 28 ea 7a 6f 0c a8 20 aa | d0 9f 63 a2 37 da 25 dc b2 f3 73 eb 71 4f 97 72 | f7 f5 9c 5a be 69 a2 f9 c7 27 98 f3 e1 8d 60 80 | 4c b1 59 3b 0d 94 da 01 df ed 22 da bb ae 13 d4 | ab 59 10 51 4e ab 00 6e 43 1b 5f 6f cc 80 73 c6 | dd 74 b1 c2 23 ae 3e d5 62 bf 60 46 cb b1 9a ee | 3c dd 24 cc 1d ee 61 11 a7 2c 64 54 7c 5a ce 85 | 82 f7 a7 4b 3e 9d 45 d4 72 1a 4d ee 44 f1 0a ec | f6 3e a4 34 c6 ba d9 d9 3a 01 c6 55 85 7f fa 9b | 97 d6 f9 0d 31 d6 d5 5d 5c 90 c7 50 e4 36 56 89 | 87 44 fc 5c 34 18 51 66 22 22 55 d1 58 e8 bf e0 | 29 00 00 24 9e 4a 4f e6 96 c7 82 bd 05 b0 b1 79 | 92 3d 45 fd f0 27 43 64 2a e7 5d ce 08 d1 73 7a | a3 0c b2 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b4 64 b2 67 9a 53 d4 4e cd fa 4c | 8c ec ef f7 ec 15 da 03 00 00 00 1c 00 00 40 05 | 82 f8 72 1a 63 03 48 fa ec 40 35 39 89 ff f9 25 | 60 cf 1c 2d | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #123 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 40 2f bb ea 9f a9 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | fa 40 2f bb ea 9f a9 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0739 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.120963; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.003909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #124 | libevent_malloc: new ptr-libevent@0x7f497401d368 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 e3 19 94 d2 1f c6 9d b9 21 d1 1b 7b 9b 09 25 | 13 40 c4 9f 94 91 b3 29 a2 d9 38 2e c4 45 d2 d4 | a5 fc 35 64 90 92 d5 ea e1 43 37 04 36 9e 35 e8 | a4 7e b7 ff 47 40 f1 29 08 67 74 b8 d4 c8 4a 54 | 56 fc 7d 0e 45 42 3f 91 fd c4 5f 47 a5 a7 a6 f5 | f1 83 71 69 c4 32 c5 0c fc ac 47 8c ab ff 47 c0 | 86 82 82 f1 21 29 dd fc 19 e1 b1 c0 75 3e 2a b4 | d6 9a b8 b0 29 8e 1a 22 df 16 63 92 cc db b5 1d | 51 4d 4c 5c c0 30 d6 c5 f7 10 90 e0 c2 2b 0a a0 | 96 4b 68 79 50 2a 4b cd b4 d2 21 5b ef 72 5e 2f | 91 7e 5e b1 8c 61 f5 6e f4 a9 8d ad 11 24 14 21 | 7f f6 62 88 56 61 9a 0f e2 7f 0c f4 52 08 12 69 | 70 43 5e d2 2e 1c d0 b8 6b 63 6e 41 32 6e d9 09 | 0a b3 3e 8b 7f 39 5c d1 4f e7 c5 b2 85 91 7f 04 | 21 04 a2 59 21 d1 06 4a c9 55 27 fa f0 5a 38 c8 | f4 04 a0 ce ca b1 92 4b ee 0f d8 4e b8 13 82 04 | 29 00 00 24 e4 d7 a9 43 55 71 87 81 d6 00 59 90 | 70 58 a3 45 1e 2e df a3 bf 9b 20 58 3a 4d 1b bc | 5c cd ed 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a7 b3 54 0a ef 50 f1 09 bf d5 11 | 73 26 b6 36 6b 45 e1 2e 00 00 00 1c 00 00 40 05 | 67 53 a5 4f 68 f5 94 2c 5f 56 a2 93 d0 1b df 5a | 43 d7 58 d3 | libevent_free: release ptr-libevent@0x7f49ac0493a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | #124 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 23 a2 c9 f1 2b d1 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 67 23 a2 c9 f1 2b d1 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.182269; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #125 | libevent_malloc: new ptr-libevent@0x7f49ac0493a8 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 24 ab 16 d9 77 70 a7 68 0c 17 3a ca 34 e1 55 | fd b9 44 f1 ac d2 35 c1 2e 39 ff e9 0f e8 3d a0 | 5c c3 fe 5b 6d d6 91 29 db a4 1c ed b8 4c 9e f8 | 41 57 5c e8 16 22 f9 f5 8c 5d a1 34 bf ba cb 3f | 56 73 f5 2b 19 17 1f 89 f1 6d b6 a7 eb 51 15 15 | db e2 1f 52 01 c0 14 90 41 2f e9 41 3d f7 24 36 | b6 f6 c0 e9 df 8c 1e a9 af 35 e7 cb 52 c5 61 7c | 18 d1 9a f5 51 36 11 45 2a 52 ac 1b 16 76 e5 be | a7 14 c6 bf 0b 07 1a 0e 05 23 b3 31 38 61 74 85 | 09 e2 32 9f d5 9d 89 fb 64 dc 49 a9 6b 68 70 2a | 46 5f 2d af 22 07 3a 96 21 3d ba 28 37 03 49 ad | df 55 76 aa 7c 18 85 88 09 cc 7f b1 90 73 d8 ba | 1b 5c bf 6f 8d eb 54 74 d0 16 73 72 19 34 26 09 | e9 79 88 95 52 a0 c8 88 c7 6f ae 75 74 08 9c c0 | 8a 28 5a dd 5d e3 8c 6e a1 a4 14 4c a4 db 3a 5a | df e5 a8 5c fa ca 6b 65 ef 5b 8f 47 8f b9 1a be | 29 00 00 24 d7 aa bf ca c0 89 e8 b0 60 66 02 ce | 7e 1e 62 ea 0a c0 58 12 23 aa 8a 5e eb 3d 1c 7e | e6 73 fe 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 39 9a 51 ec 37 dc d4 4d d6 a8 fd | 4b 07 a4 ff 46 1d d2 4f 00 00 00 1c 00 00 40 05 | 9c 7a 5c f2 3b 98 51 2e 19 ed 0e cf 63 73 4e 37 | 28 0a 5f 69 | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #125 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 06 77 83 6a 55 d5 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | 2a 06 77 83 6a 55 d5 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.243655; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #126 | libevent_malloc: new ptr-libevent@0x7f49bc030658 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 71 d8 88 3d 11 a7 55 7f 44 40 76 a9 f8 b5 a4 | f4 42 89 0b 09 25 22 5c f8 ff d6 3d e6 1a cd 87 | e6 67 2f 9e d0 4b 4d b5 c0 e9 c2 32 4f 64 4d 19 | a6 97 39 4b 90 a2 0c fd 73 78 86 e0 0a 57 a0 30 | 30 fa f5 3f 2c c1 59 02 3a 0c d2 6f ea ca bf b5 | a6 7b 82 3d 6d 2e b4 b4 3a 2a 3e d6 dc 62 0a ed | 6d d3 8d e3 c3 ed e8 2f 4b 08 ec d8 a0 be c6 33 | 54 97 54 7c c8 4d 77 b6 9e 34 40 06 ab 05 49 7d | e2 c3 6b 2c c0 18 c2 15 43 0e 98 97 ae 24 9c 9b | 5b 56 d9 7a e6 94 18 42 2a 48 ea 6d 25 7e aa a9 | aa f7 fc a3 cd 3a 7a 6c d5 c5 a8 84 2b b5 ad 88 | 6f f8 1b aa 10 b4 e1 81 03 49 11 69 73 63 f3 f7 | 8f 19 98 b6 b5 28 c2 48 58 fb ea 40 ba 0d c1 c9 | b2 ec a6 03 61 fd a3 32 3f de 22 34 b2 d9 9b 5a | ea da 7e 9d a1 9f 2a d9 60 8b d9 d5 dc 41 25 db | 46 ed 8d 14 b7 4a ef c4 cc 71 fa 0b bc ab ac b2 | 29 00 00 24 89 5b f7 6d de 71 f1 ab 7e 1f db 19 | 53 76 f7 18 2a c4 8d f2 87 83 95 b2 c1 48 b2 8e | 1d 2d 20 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 3d 87 ff 7d 21 8a 57 46 8e 3f ab | 29 c2 0b 37 93 59 83 0c 00 00 00 1c 00 00 40 05 | 69 c3 64 2c e7 78 94 da f8 41 c2 6a d2 00 2e ee | e9 aa 46 6e | libevent_free: release ptr-libevent@0x55564da094e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #126 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 bf 8b 50 2a d2 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | 72 44 bf 8b 50 2a d2 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.300965; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #127 | libevent_malloc: new ptr-libevent@0x55564da094e8 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 59 9e 8a db d4 0e 0d fd 56 e6 c9 61 eb b5 27 | 80 ea 1c 6d 95 bf 9d 86 6f 5a 4b fd b2 f8 af c4 | e9 52 93 46 b8 40 94 45 da b9 56 31 9d 59 44 e8 | 4a da 5d 30 55 3b d7 5f e9 02 4a bc 36 a1 36 b6 | 57 60 d2 55 11 d3 4c 6a eb 91 88 dc e8 e5 12 a4 | a2 76 4f af b7 d3 53 0d ac 51 1f 4d b0 f5 8f a1 | 36 3f d1 13 74 85 0f 1e 13 ca 4c 8a cb 13 c3 51 | bb b7 07 ef c5 f4 1e 5a 83 f6 5e 4e 9d f0 1c bb | 4f b5 82 9a 44 25 2c 1d 97 1b 0e c9 0f dc a9 5a | 84 3d 73 c1 30 4c 50 2c 5a 7d 0a 63 0b 9d 08 5c | 8c 95 5c a8 ea c5 72 84 aa 92 9e 68 68 5c 6d 4d | 5d e4 a7 ec aa 71 72 6b 7e 20 c9 e5 6a b0 de 52 | f6 c0 28 c2 17 e2 b5 75 ba de cb 28 bd 7a 6c 33 | 76 8e e1 28 b8 aa c0 f7 5c 26 fa ee 41 22 20 03 | 32 04 d0 19 6d c6 ae 04 1f 5c 96 8d 14 e2 11 b2 | ab 36 85 6e 9a 80 4d e8 11 9e e5 a8 f8 56 cd 11 | 29 00 00 24 65 7a 14 a3 37 b8 25 2b 7a 96 14 07 | 46 68 28 ab 80 44 ac 81 9b 7f 5e 3c 88 dc 92 2b | 84 05 ec 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 64 8c 3c 76 61 54 71 0f cf 19 eb | 56 62 18 23 1f 8b e8 4e 00 00 00 1c 00 00 40 05 | ca e5 3d 41 5f 77 55 56 af 76 bc eb 3f b6 90 f5 | 94 5a 9f 13 | libevent_free: release ptr-libevent@0x55564da87668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #127 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 d3 1a ec 60 6d 7d 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 14 d3 1a ec 60 6d 7d 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.362274; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #128 | libevent_malloc: new ptr-libevent@0x55564da87668 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca ce f2 49 f1 87 fa f3 8b 37 c1 26 4c 70 59 d1 | 3b 62 e5 49 21 57 e0 7d b5 d1 81 dc f4 cf 7a 8b | d3 8d 07 75 34 a4 2d 8b f6 96 90 ce d5 d1 ad 49 | 4f c4 14 59 d2 69 df 52 a7 99 24 a3 00 ad a7 d1 | 61 d3 22 ae e2 16 3c 01 46 30 d5 e6 8c 01 ff d9 | bf 27 58 95 a6 25 7f c6 d0 ca 44 ca 90 32 c3 9e | e0 02 6b 7e 20 35 20 f7 ca 3c 86 ab c9 0b 69 6b | cd f5 e0 50 0d 5d ab 81 10 80 50 ce a7 8c bf a4 | f1 c2 15 1c cb 4d 93 66 9e a0 16 0c a9 0f f5 15 | 14 31 78 06 d6 86 1c 2b 17 fc 60 2b a3 7a 1c 7f | 54 71 27 df 71 3d 3e 0b 38 fe 95 a1 94 5e 50 12 | e6 63 a9 4b 7c 48 f0 d4 7e 12 71 29 74 bd 47 96 | 7e c4 19 47 98 6b 37 6f bc e3 76 43 01 b4 c8 5a | 5a e5 c2 3c 47 75 03 04 4e ac 14 3b 38 b0 33 89 | 97 93 7a 1f 67 54 9c f2 a5 20 33 9d c8 50 6f c5 | 48 58 8f 2d d6 d5 94 6c f5 a7 a7 d5 c4 1b 89 38 | 29 00 00 24 7a 9d ac ca af 5d 8c 94 33 89 45 16 | 27 bd b5 b8 81 72 3d 90 32 e5 48 1c d1 0b 87 9c | e1 02 b2 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 b0 9c 4c 9d d4 4c c6 50 54 9a e7 | 42 a7 6f c9 11 76 5b d3 00 00 00 1c 00 00 40 05 | d8 08 94 24 63 d8 05 af 9d e6 4e 1f a5 b6 ee af | eb b8 f6 64 | libevent_free: release ptr-libevent@0x7f49a8038c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | #128 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 37 b6 51 0d 33 e3 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | fc 37 b6 51 0d 33 e3 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.423607; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #129 | libevent_malloc: new ptr-libevent@0x7f49a8038c48 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 2d 76 71 6e 17 12 95 bb cb 41 3e 47 11 b0 4f | 41 7d 8b 23 4d 1f 48 15 bf f6 9d 8e 58 9a 71 48 | 52 76 18 94 0a 09 ac 5b 45 14 8a 7d 85 5c 9f 85 | 6e dd da 50 4e fb 27 7c 6d 12 4d da ad 6b d0 a2 | 30 f8 dc aa dd 43 4a 1c 9d b0 c9 98 d2 32 af 9a | bc 38 e9 60 60 b8 0a 17 7d ec 92 bd 42 99 ef c2 | 04 a7 72 59 16 86 44 db a0 bd 8d 83 2c 2a 6a 9a | 3b 60 eb a4 1e aa e9 c1 c5 6c 32 01 56 5a dd ea | ed 46 d9 ab c0 f0 43 0d fb 6b 33 b2 b0 81 91 8f | 56 61 a8 da 64 a1 33 5b a5 a0 bf ee cc 76 ab 2b | 63 e9 0c 9b 7a f3 40 b4 fe 7f de 4e 67 ef 7b a6 | 78 65 a7 1d 33 48 ba 15 0a 94 fb 25 d6 52 c6 4f | 8b ce 88 91 63 1e 75 40 2b 11 85 91 56 2d 99 f6 | 53 b9 48 6d b6 56 d9 04 02 03 24 e3 fd b2 38 ec | 72 7e 8a 4a 46 e8 c8 d2 cf 0d e3 4c f8 c7 b3 6c | 68 10 c1 e4 6a 2d 5b 23 69 2c ac 5b c0 49 b0 60 | 29 00 00 24 13 de 4c c4 e1 12 7a e2 a0 9d 5c c8 | fc c9 85 9e ae 22 29 84 d5 a6 d7 69 88 0f 3a eb | e0 fa 73 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 46 57 27 71 07 3c ba 24 4b 56 b3 | bd e0 0f 4c 18 7c 5e 6b 00 00 00 1c 00 00 40 05 | a1 82 28 8a ef 90 a6 74 4d b1 a4 a0 59 cb 29 35 | 9f e9 8a ff | libevent_free: release ptr-libevent@0x7f49a00493f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #129 spent 0.374 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e0 f7 ef b9 f7 59 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | d9 e0 f7 ef b9 f7 59 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.511197; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #130 | libevent_malloc: new ptr-libevent@0x7f49a00493f8 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 86 e1 8a bb 6a 5c a3 60 15 80 a8 91 23 38 f6 | 9d 90 fd 1c c8 58 39 9e 38 7a 8c 17 33 54 c5 a3 | 07 a1 87 33 44 71 66 0e f8 89 91 1d da 19 07 86 | 90 f8 36 ba 07 98 19 16 f7 7b c4 dc 68 41 83 b1 | 1b ba 4e a1 88 60 e0 47 a9 5f 42 d4 1a 41 20 30 | bb 72 3d c5 1e f6 bf e3 a9 15 eb bb ca a6 34 9e | 9a 44 b0 70 c6 97 34 fd d6 dc f6 14 5d 6f 52 23 | a7 01 06 64 0e 1f 38 6e 9a 41 a6 54 47 70 e5 36 | 4f 5a a2 73 65 7a 3f 00 f2 8a 8d ea 20 b5 3e cc | eb 85 8f 1a c8 de 00 fe 06 fe d2 f1 fb 9e 51 3e | 59 20 d3 3b 7e bd 82 b2 e5 cf 9b 20 be e5 04 60 | 8c 76 37 7d 28 71 cd fe f6 01 84 fd 56 38 f5 f2 | 71 57 6a b1 3e 34 f3 45 c4 fb 40 7e d6 f8 ab f4 | 4a 29 a4 2b b3 7b 55 61 e6 b1 18 bf fb a3 a0 e2 | f5 81 bd dc 72 9e 5b 6f 80 98 2a 99 6a 00 a0 d1 | e9 3b c7 97 dc c2 97 b5 62 8c f8 a2 09 2a 09 40 | 29 00 00 24 f4 e1 6b c1 14 55 fc 20 0b ba 4a 69 | 76 df e9 fc 11 9a a9 12 06 65 60 5a d8 47 d2 ea | 4e 2f ed 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 40 ab de 0e cf fc 21 c1 b2 4a 3c | ba ad 94 75 de cb ac d6 00 00 00 1c 00 00 40 05 | 85 6e 23 cc 5d 18 32 06 61 20 11 9e 72 01 92 49 | 15 c4 d5 7a | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #130 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 7f 38 ad bb 20 81 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | a1 7f 38 ad bb 20 81 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.607575; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #131 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 20 05 12 4b 75 cc 6a b9 b5 10 4b 74 39 99 82 | f1 9e 03 36 81 2c 27 c3 a4 37 f7 af 02 44 4e 44 | 78 14 6c b0 ef fe 8f 42 52 77 7e ae 24 12 15 be | ed fb 8d d2 98 69 56 e7 5b 17 0a c2 05 77 f8 73 | dd 0d e1 c3 11 d7 5b 08 f4 97 8f de 37 eb 3d b4 | 7d 78 45 d4 8d 16 f9 0e c7 e9 0a 02 c2 00 41 8d | 15 93 16 d6 a4 09 ec f6 d5 7a 7b 4b 10 bc 32 67 | 36 6c 4e 91 5e 30 a4 f5 9a 5d 72 88 2f 5c be 84 | 93 15 5f c2 0d 61 74 63 51 7e 0c ff 0b b6 e7 40 | ce 4c 21 4c 44 ee 18 e9 13 2b 46 9f 00 c0 aa 98 | f0 71 4d 25 d7 72 69 81 c4 e7 e7 02 86 42 b3 4d | bb 91 b3 49 e8 7d 57 8e 59 92 f4 1d d3 38 61 1e | be ea f0 02 a5 bb 35 7d ab 7d 9f 4b 7d e9 9d e2 | 98 39 97 be 2a 09 cb 0a 09 ae 64 8b a9 83 53 6d | 8d 4f 39 95 0d 67 da 84 b8 af a6 84 d7 49 06 c3 | 9f 9f e7 4b fc 6f 58 d8 c6 25 1e 24 1f 0c f1 e1 | 29 00 00 24 95 05 21 aa d0 59 0b 00 be d1 87 1f | f8 36 6e cc 35 77 d8 fb 34 75 78 a9 f2 d6 d3 39 | b0 55 c5 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 41 39 35 f5 8a dc 56 31 9c 97 97 | 8b f2 70 eb 80 6c 06 a1 00 00 00 1c 00 00 40 05 | c2 5f 0c ab 76 df 5f 72 fe 42 e8 fb c8 fc b5 32 | 9d 5f 9b f7 | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #131 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b0 18 7b 78 d7 18 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ae b0 18 7b 78 d7 18 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0755 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.668949; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #132 | libevent_malloc: new ptr-libevent@0x7f4980012288 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc b8 45 d3 5a ec 28 ee c3 4b eb eb 21 60 fb 2a | 75 d2 4b 34 d8 dd 31 68 9a f1 cf 41 11 53 88 27 | c4 d2 78 28 1c 0c af 8a 35 89 ee d8 d3 4a 0c 6b | 87 cd 90 99 17 55 25 82 d9 fe 73 98 83 7d 43 e1 | 14 f4 47 92 7e cf 69 ef a1 1c 0d d5 55 99 de 71 | 48 f6 ad 3b 5e 08 6e 69 67 5a 23 16 cd 20 0f 77 | c9 c2 88 8c 6b b1 67 15 57 e7 ee bb 6f 69 5c 56 | b7 2d 10 13 54 bd 7b d0 54 37 96 4e 18 2a ed 62 | c6 35 85 78 49 ba 71 ea 1f 5e e3 37 bf 32 4a e1 | 28 6c de 1b ef e9 f2 04 f1 f7 6f 08 5c 22 06 39 | 02 84 f4 dd 17 42 75 ed 4a 0d 7a 25 5f e0 13 12 | 9b 56 05 e5 b1 57 57 17 f9 98 fc 74 61 76 c8 50 | fa a8 ff ed d1 12 bc 7b 53 eb e4 57 43 3a 0d 34 | ff 46 52 cb 74 6c 9e 8a a2 c8 24 51 37 b6 c3 6e | c3 5a 26 3f 63 a7 b8 d0 d4 7e 5c b7 a6 ae 83 f1 | d2 07 5a c3 74 54 bf 75 d0 50 7e 7c b1 4c b5 78 | 29 00 00 24 06 8d 37 14 13 3e 89 9b 87 7a 46 aa | 54 34 a4 5c 23 03 5c 46 55 dd 9f ed d2 05 29 8b | 9a f5 5f 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 6e c2 8f d8 b9 fa 37 b2 3e fe 86 | 5f d2 73 fd 2e 89 bc ef 00 00 00 1c 00 00 40 05 | 0e 9a f2 b5 da 9c 5a 30 83 56 a6 64 d0 d7 98 74 | 99 b6 79 34 | libevent_free: release ptr-libevent@0x55564d98e708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #132 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2d 09 28 84 0e f2 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | fe 2d 09 28 84 0e f2 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.732248; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #133 | libevent_malloc: new ptr-libevent@0x55564d98e708 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 63 b6 e2 f0 c4 00 78 aa 13 ab 49 d3 8b 06 | 8a 26 1c 1e 8a 91 d4 32 ce a8 69 c9 ee 22 24 f7 | 67 b2 fb ce ce fd 1a e8 23 8c 0a c6 a5 e5 ff fa | 4a a8 b2 4f 53 8a 71 fe 01 32 da b3 d0 5e c8 ea | 46 d3 60 cc 4c 36 5a e3 84 6b ac c1 32 b4 62 b8 | 25 22 42 bb 2a 0c ce eb e0 80 73 6d 4b b8 a5 5c | 60 d6 d3 48 bc cf 82 22 44 a8 7f 92 70 5d a1 d7 | b5 f0 3c 5f c5 63 38 38 0a a3 69 68 47 6e 61 95 | ba 28 6b 9a f4 90 70 c9 22 8f 3e c0 f6 0b 11 83 | e4 27 c3 e2 a0 d5 b8 e3 8b 4e 0f 29 3b 81 af fa | a8 a1 50 15 c1 5d 25 2e 96 db 23 31 56 fa 84 00 | fc eb 16 ac fa 1c 6c 21 c4 88 38 6f 28 da 2e 15 | 36 1d b2 de 72 fd 3f d0 ea bb 79 46 5e 54 5f c6 | a1 f4 9c b7 0d cf 39 b2 61 bc 05 f2 d0 52 42 14 | ce f9 66 43 c8 17 11 6c 0f d8 81 53 d3 e4 a8 55 | d3 fb 26 66 b9 f6 7e e9 92 ed 7e 63 61 ef be 41 | 29 00 00 24 12 d9 32 56 80 16 97 13 19 34 2c ea | 44 9b f2 d0 99 fe 6e d2 0c 8a 05 b1 c1 f4 b5 22 | 75 ac 56 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 17 e9 2a ba d6 aa 38 6e ce c1 3f | 31 50 d4 32 34 55 9c 79 00 00 00 1c 00 00 40 05 | cd 10 63 82 bd 58 8e 62 b2 ad d4 6d df 9c 65 6b | 8d df 82 12 | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #133 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 b3 c7 eb 34 d0 45 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | d4 b3 c7 eb 34 d0 45 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.794615; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #134 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 60 68 3d 5a cc de 9a 2f 8d cd 91 3e 4c 0d 69 | d7 fc e0 1c 0c 79 78 1b 62 08 d0 19 44 09 d1 da | 6b a1 97 e3 f8 1f 93 25 99 ab 16 25 1d d1 99 f1 | 81 39 b0 29 6b 8e 1e 90 b3 49 83 34 53 a8 ae fc | 08 39 83 56 25 3b 06 f7 1b d5 22 f2 3f 7e ba c7 | e1 fd 2f e2 08 e7 7c 74 4a 53 0e 1b ac 35 34 ad | a5 fa 49 31 9f c7 49 18 19 41 18 55 cd 9c 7c 3e | 80 90 f4 dc 08 ce 5a 4d 21 d9 eb ff cf 24 d8 c1 | 70 66 52 da fc 80 d4 7f 79 68 42 f6 85 89 34 45 | de 69 f0 8a 60 85 51 82 0f 03 95 e5 da 27 12 d8 | 4a ef ac 83 92 a0 b2 8d e8 ee b9 02 c2 ad 2b 08 | d6 30 17 9a 12 7f c8 ec c7 56 6b ab 56 30 3e f2 | 67 df 13 52 c5 83 92 61 f4 69 c6 d4 83 50 1b 9e | d6 de eb a1 1b 08 46 1a 3c e7 0f fa 6f 27 4c a2 | 5a 47 1f 6b ef 3b a4 83 ea c3 67 93 2b da 73 f4 | 20 f6 7d e6 84 31 e0 35 f6 25 c1 94 e1 5b 3e c9 | 29 00 00 24 65 f7 98 cb ee 53 62 f1 8a 9a 98 1a | 5f 4c a2 18 b7 c6 87 f8 33 01 19 2f df 37 29 ff | 6c f0 ed 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 d4 6f 10 53 8e 20 ea 36 0a 6e 5b | 6f b2 a6 bf 1e 7a 0f 57 00 00 00 1c 00 00 40 05 | 65 40 a2 03 33 35 13 90 5b b9 31 b9 11 c9 00 41 | 13 d3 b9 00 | libevent_free: release ptr-libevent@0x7f498c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #134 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 01 b6 be 4a 8d 80 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | bf 01 b6 be 4a 8d 80 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.850995; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004379 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #135 | libevent_malloc: new ptr-libevent@0x7f498c017a48 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 08 86 8b 52 bb 50 51 6c f0 36 95 06 0a 9c 3a | 17 f2 2d ea 77 d0 10 e6 8e 83 88 46 a2 d8 61 86 | af 16 84 0f 99 76 f4 1e 0f 27 cf 60 7c bc 6b 42 | a9 12 b3 98 46 61 4a 1e 74 9c 7e dc fc 01 f5 c8 | 58 65 c0 9e fa c0 b9 26 7d f7 09 26 bc fb 1d ec | b2 3e b8 23 ee cd 2e 99 b9 5e 67 fb 91 db fb fa | 2d 31 9b 6e 32 6c dc 81 af f1 6f 24 2f 8d 8b 04 | 5d 08 1e 0e 39 19 6f 53 2e df e2 35 36 a6 d1 20 | 36 71 47 00 ac e6 74 d7 a4 a6 c0 b8 c4 61 ed 53 | ad 72 18 ca f6 05 18 22 11 5f ed 0d 5b 22 43 47 | 2f 88 81 0b 7a c5 46 3f 4f 7a d3 1c 6c c0 a1 af | 30 ff 63 45 0c 94 83 99 7c 76 fd a3 ed 87 55 aa | f1 4a 2c d7 6b a6 c4 a3 3c 90 8f a2 2a e9 6f cb | 0c 4a 14 d5 f8 78 7b 33 92 d7 ca c2 ec 82 5d f1 | 5f e5 f1 df fc 5d 96 6c 97 75 e6 a7 69 0f eb e7 | 2f 4e 17 98 ca 5b 38 8c 04 4a 0b 14 d2 02 ff ad | 29 00 00 24 c2 b3 ab e3 e8 3c b1 86 e4 56 07 05 | 9f fc 6a 7d 7e a7 9a 3f bd c8 0a 74 89 af 17 c4 | 97 95 10 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ca d6 43 86 db ca 9d a2 3e 9e 55 | 4e d1 ba 07 33 61 23 9e 00 00 00 1c 00 00 40 05 | 80 2a 00 65 81 63 80 9c 51 08 f9 c5 c0 b6 c0 8a | 5b 4d e0 44 | libevent_free: release ptr-libevent@0x55564d9b56d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #135 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 92 9a 5b a0 29 ec a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 28 92 9a 5b a0 29 ec a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.912367; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #136 | libevent_malloc: new ptr-libevent@0x55564d9b56d8 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce 45 00 f1 4c d9 d0 33 27 d9 8b e9 46 25 c1 72 | 81 15 9a 73 97 12 ec 06 22 e7 96 23 a0 ef 06 59 | b2 16 e9 42 ad 47 a7 47 59 be 25 ac 8e 17 09 43 | bd d1 de 8d 68 76 be 7a 9c 4a 58 c4 2a 4d 24 94 | 3e 55 70 91 22 bd 7b 9b f0 d9 53 1a c2 fa d9 68 | bf 40 87 74 48 51 e9 6f 49 49 7d 1f f3 a4 fc 83 | af f2 2d 35 4d cc d8 37 96 50 d0 17 65 e8 39 48 | be d1 f6 ff 06 46 25 b6 97 57 6f 12 1e 32 a9 99 | d3 1f 8d 22 7c 4b 7e ce 0c ae 86 27 1c fe a5 89 | 7b 8d 18 f4 72 a4 d3 ce 91 b7 73 6d cb 8a 6e 62 | 03 ab f1 69 91 f4 eb 83 86 c1 28 a4 5d 74 0c 9a | 9e 07 a3 2f b2 0b ed a6 8a 0a cb 4a aa 58 9b 43 | f5 8d 2a 6a 61 a4 5f 1d 0e f2 54 6c 48 81 86 97 | 5b 14 89 c1 71 40 a7 6a d0 33 74 fa 8a 96 cd 01 | d5 dd 5e 91 bf 18 bc 33 1b 97 a0 36 b8 6d b2 3b | 7f 7e af 4b 01 0e 74 c5 e6 53 67 a1 c2 28 86 ea | 29 00 00 24 d8 40 b3 ce 11 65 7c c2 22 af b8 58 | cd 06 fa 5e 1d 8e 0f 4e d1 64 71 f1 ee ec 09 05 | 3e 54 12 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 02 62 6e d4 e0 d0 d5 9e e0 ce 8b | c3 25 78 95 bd 26 4b 43 00 00 00 1c 00 00 40 05 | 0f 62 bc 10 d1 f9 c2 c9 a6 15 27 a4 5d fc 6c f5 | 50 6c e5 b2 | libevent_free: release ptr-libevent@0x55564da0c408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #136 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 fb 8f c9 eb d0 6c 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | 22 fb 8f c9 eb d0 6c 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10616.970723; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #137 | libevent_malloc: new ptr-libevent@0x55564da0c408 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 4e d1 c0 0a 20 8f 84 43 69 6a 19 9b f4 c6 47 | c6 39 49 d2 e5 93 7e 81 42 cb 13 81 f6 82 fe 18 | ce 61 08 c7 23 72 4d b4 64 15 67 8a f3 24 ad 7d | f6 2e aa 74 57 14 68 3f b2 3f 1f b5 28 a5 5a ab | 65 09 db a0 ae 40 9f 47 04 b4 64 c2 eb 3f ff e8 | 4d 3b 39 46 f7 06 49 24 22 1a 2e c5 55 3d c1 39 | af 81 dc bd 2e ed 61 1b 10 f8 97 e0 e0 0e e5 7f | 17 8f 19 b2 fe 21 22 d6 08 25 f8 52 54 d6 45 21 | c1 49 28 5a 9f c4 21 80 2b 8a b9 ea 78 80 ae d2 | ff ee 90 92 5f 96 ab 0e 7e bb 33 97 00 92 26 5f | 7d 2d 4d 4c 02 01 a3 85 06 59 06 83 1b 5e 1e 02 | 78 e0 11 bd c7 da 2b e1 82 7e ba 24 c9 f9 f7 50 | 2c fa fe 6a e0 c5 08 5a f5 f8 a7 b5 d5 a9 36 00 | 16 ed 33 d1 6c ca 5c 31 d9 13 73 8b ba 82 aa e3 | 31 4d 8e 1c 38 f5 60 a5 f9 de 4e 29 7c 47 25 99 | 66 8a e1 74 14 61 11 9b 91 ef 0d 79 d6 0d bc fe | 29 00 00 24 e6 7c 18 a0 98 d3 33 31 f4 30 e9 4b | 09 01 4f ec bb eb 55 e2 b1 ca 18 57 2d 9e aa e6 | 6a 98 26 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 41 3a 78 fb 72 0c bf 03 cc 3f e3 | db 0c 80 d6 50 c9 51 b8 00 00 00 1c 00 00 40 05 | 82 53 49 55 9a e8 cb d0 7a 97 80 48 bf 05 cb da | 03 b3 9a 10 | libevent_free: release ptr-libevent@0x7f499c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #137 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 ed 75 29 21 54 63 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | c7 ed 75 29 21 54 63 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0513 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.062066; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #138 | libevent_malloc: new ptr-libevent@0x7f499c0282d8 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e be c5 f1 fa 94 19 f7 d4 2e b4 7c 6c aa f6 80 | 1f a3 e0 2c 40 e1 fc 53 6f 37 be cc 7e 5a a0 38 | 1b 82 cb aa cc 46 d9 f0 aa ec 00 99 8b 31 79 2f | 60 98 57 a1 86 03 7a 1e 1d f4 6e 3b 60 65 ab 5c | 17 ff 32 10 aa 3b 0f 8a 52 3b 8a f8 b8 6a 67 35 | c0 56 12 b3 5b 9a 4c e6 6f 15 08 d4 4a 3e 42 47 | 08 2c 62 ba df 6c 6d 7e 4e 47 5b ff 95 98 80 2e | 48 55 89 34 16 7f 9d cb a3 7d d9 ed b3 db 47 da | c9 09 2d 61 b9 d8 95 ff fb 86 aa f7 f4 79 33 fc | b2 0a f3 77 3e f6 1a cf 29 c2 0a d1 1e a6 2c 3a | 3f 43 22 54 cd 79 94 13 6f 72 d4 1c c9 67 66 d1 | bc 2b 6f 97 cb ed 94 a6 29 ef 11 5e 79 9d 82 82 | b8 d2 3e 8c 35 75 8b 5f fe ba 1b 1b 34 a6 a0 84 | 05 18 a2 8a 9e 92 41 50 21 45 dc 0f 0d f4 fd e4 | 88 81 ab ab ab e8 fb 46 5d f1 d3 3d 61 cf 26 a4 | 42 59 5b 99 3c bc e7 0d 42 8e 50 f3 1b ca 6e e0 | 29 00 00 24 46 51 56 2b 2f 50 5d 08 d6 ad f8 43 | 6b ec 9c 7d 88 04 35 da 39 be fb 03 a5 7f 69 7d | 33 91 bf ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f1 e1 96 54 82 54 0d 4e 0c b1 5c | 7e 2a 5f a9 ea 24 5e d2 00 00 00 1c 00 00 40 05 | a8 fd 7b 66 6a 95 8b 19 48 7a b5 f3 f1 34 f0 b6 | e2 f4 54 49 | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #138 spent 0.352 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 71 34 4f 96 19 19 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 7d 71 34 4f 96 19 19 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.129619; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #139 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 c2 d3 a2 fa e1 59 c6 f9 5e 8b 82 b8 bf 14 9e | 4d e0 b1 bb 0f c1 39 89 2e a1 e6 96 1e 65 3e 5a | 47 08 03 e2 1d cd ba ef 7c 04 49 e5 d2 45 1f a1 | 24 61 32 2e 34 9b 03 d7 9e 15 a2 1d 40 16 9d 4a | e0 7d b9 9a da e5 50 22 9e dc 41 24 a9 44 8a 86 | f6 d8 e6 45 90 ee f4 be aa c9 34 9a 35 0e 09 a7 | a1 f2 bd 0b 59 60 6a a8 9c 3a ca 77 4a 27 ce e6 | d0 46 3d 05 80 da b0 c3 e0 86 c6 b6 22 4c 62 9f | f5 a4 d2 e1 6a 3b 8a 9a ad 76 ea 7b 40 0f d5 b5 | d9 eb 82 a5 bf f9 53 22 03 b4 de 86 67 fa 3f 7e | b5 44 c7 87 c3 a8 84 7c 37 d8 c1 e0 41 83 e7 58 | 7a 95 31 5f 47 99 bb 2b 50 b3 28 2e 6e 0f f8 57 | 87 e5 f2 bf 4b 7d fd 8d 05 47 48 79 5f 3a 8f 40 | f6 46 18 41 95 11 73 a9 78 7f 2d 3f 15 6f bb 63 | d9 db dd b7 ca 30 99 54 35 80 b5 ba fa d8 aa 70 | 42 6a 4a dd bd 15 1b bb c6 74 b0 22 bf 05 6b d0 | 29 00 00 24 57 6e a4 af 30 2c c5 42 ec f8 6e a2 | 51 50 9a 7d 91 b1 f1 b8 82 98 a6 01 f2 45 39 8f | e7 56 d5 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 94 d0 e6 9c 8e 19 86 53 fe 41 69 | 0c ca 71 36 7a aa 00 b7 00 00 00 1c 00 00 40 05 | dd d2 09 58 c3 40 37 6d 27 41 3b a5 0c 89 74 98 | dd cb 54 23 | libevent_free: release ptr-libevent@0x7f49a00332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #139 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 44 0d 59 90 ea 2b 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 72 44 0d 59 90 ea 2b 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.188989; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #140 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 6c 98 68 17 e3 25 e8 ad b0 2d 45 5a b9 0c df | 69 5e 15 5f 58 73 c5 2b d3 8a c2 f4 34 80 9d 32 | 0a 1d 5d 5f 0f 13 81 3a ac 27 5e 19 24 ca 26 bc | 48 20 45 f5 77 23 03 a4 04 17 4e 1f 53 f2 f1 76 | 74 8c 91 15 b5 2c cf 42 d6 ac 62 2d 4d f7 11 fa | 96 05 97 2e 07 4f bd ff 1d ec df 6b ac 3d 03 a1 | 54 e4 83 eb d3 0b 70 a1 36 86 33 7c dc 9e e9 03 | c7 c2 02 0d 2d a4 42 ea 5b 2f 91 66 1a bc cb 2a | 8b ac 9b 96 50 a4 32 89 7d 56 7e b7 56 5f 3d 0d | d1 99 13 49 4c ae ad e7 fe 8d 3a 60 69 bd 5e 54 | 16 67 9d 69 06 36 1c 68 a1 a3 86 f4 57 5c 53 ec | 5f b6 d2 ed 0c 25 32 1d 1d b6 1c 3e 7b 90 ab 68 | 32 e1 07 da 59 d0 a0 d9 5e a2 25 c5 40 9b 85 09 | 5f 5a d0 46 b0 dc ce bf 62 78 48 60 cd fc 92 94 | 5e e7 94 7a 2e 6e 47 5b 0e 00 b4 e3 f9 aa 63 6b | 63 e7 7a c7 a4 69 34 fc 5b cd a1 47 64 9e d5 50 | 29 00 00 24 9f 78 8f 8c 5c b1 a1 ca 7f df 75 63 | 03 fe 50 32 eb 3d 36 3f 1a ee 91 d9 61 8e 00 13 | 82 fe 91 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 19 a5 1d 28 89 66 b9 9f e1 28 76 | 2e c8 7e a1 f9 35 11 55 00 00 00 1c 00 00 40 05 | f8 6f 2a 49 5a d0 22 77 fd e5 4b d1 7a bc 47 56 | 16 b8 4b b0 | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #140 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 00 98 c0 9a 55 6a fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 1f 00 98 c0 9a 55 6a fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.259366; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #141 | libevent_malloc: new ptr-libevent@0x55564da7a6c8 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 e0 27 9f c5 1c 14 52 38 08 c2 30 99 84 5e e5 | 00 42 8f 50 4d 7d a4 ac 7e 7e 8e 2c fc 35 7f 68 | 70 07 5e a4 fe f5 7b f4 c8 b4 74 c8 6d 9f 0d 22 | b5 b6 52 31 b7 80 ba 88 c3 de f9 11 4f ac 2b 46 | 19 5b 13 69 68 5e e4 f5 a8 f0 b7 96 68 2f 86 6e | 16 84 0d e3 94 25 de 3b 69 b2 e9 c3 97 7f d5 48 | 8f 52 99 ed ee 2e 93 ff 26 69 2d d1 5a c6 60 20 | c6 d8 60 a5 95 d2 0a d2 4b ef 3e 0f 96 cf f0 d9 | b8 fa 61 36 c2 00 30 52 dc 41 2d e5 a9 11 4c b3 | 5d ec b7 71 4e 80 46 7b 3e c7 2c 61 d3 31 67 4d | fe 71 66 94 80 5e 71 8b c3 d3 c9 6a 52 38 ee de | 33 50 3d c0 2a bd f2 b1 44 6c b5 29 69 41 0d c3 | 0c bd 6f 5a 88 57 d1 b2 ad 1e 39 a8 e1 6f c2 b9 | 3d 18 3f f2 64 bd 25 c0 ff e8 71 63 a2 64 c3 39 | f3 b2 35 62 e2 43 b3 8e 26 3b e4 0c 48 4f 60 c3 | 1f 95 9c 0d 2b 99 e0 35 8d 36 dc 30 0a 57 19 24 | 29 00 00 24 bb b1 4c 92 fd cc 53 91 dd 82 8d 3f | d1 6f 39 2b 6f 42 d6 d7 68 45 63 93 4b aa 0e ec | 7e 17 b9 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 6e 9f b4 ef 1e 7d 4a 21 68 94 2a | f4 ff 8a 7e 58 9d ba 17 00 00 00 1c 00 00 40 05 | 52 92 2f 82 d7 67 ce 14 b7 3f 36 b0 00 4c 39 75 | 5e be 43 af | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #141 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3c 19 1e 27 db 87 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | 52 3c 19 1e 27 db 87 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.325711; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #142 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 2b c3 8b 72 36 02 12 e4 16 38 38 8f f1 b2 8f | 92 49 a0 59 8f e2 60 92 91 0e b8 55 97 32 6a dc | 7e ff a5 2c 2f 55 fc 74 2e 77 81 f5 bb 56 52 6b | f1 91 e1 33 50 67 b4 de f1 77 ab 5e ae fe 2a dd | 0d 4e f0 40 12 73 e4 a5 5a 83 ea 51 08 95 35 72 | 00 60 3a 78 70 ba f3 05 ad ec 38 09 9d d9 9e d5 | 04 2e be fc d3 88 bf 11 c1 53 7f 00 53 47 bb 71 | f5 52 f4 5a bd 40 16 5a 04 fb 5b 88 bb c3 8c 0e | ae ec 7f 28 6f 8e 9a 88 8e 67 bc 79 bd 1b 3b 83 | f4 c9 24 51 81 b5 34 e5 c3 a9 f3 0c 5d 1a a3 53 | 50 ef 1f 4b 72 85 05 4e 56 62 64 7f 3e 2f 8e 5a | 04 c6 2c 6f 27 22 63 e1 e8 90 59 bf 22 6d 0e f7 | 67 39 d9 60 90 a6 f1 b2 a2 3b af 2d 06 83 83 fe | 11 8f 6d 27 64 6c d6 28 b2 a2 15 ae 65 76 b6 a9 | d3 fd 24 5b df db bd a6 d4 95 0a 5c 98 7e 5d de | 59 73 be da 47 f7 fe 14 68 3e e6 c5 db bb 27 e7 | 29 00 00 24 b2 f1 df 5d ee 9b 5a ff ef d8 a7 41 | 05 c0 36 76 cd 80 81 6f 68 73 b9 c9 b8 67 2c a3 | 87 16 7f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 55 25 db 91 bd a3 40 11 44 ce e0 | 67 d4 f4 0e 43 ab 8f fa 00 00 00 1c 00 00 40 05 | 4d 36 a4 67 e3 49 ef 81 a7 7c 7e db 9a ff c4 6d | 5c 5f 8e ee | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #142 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 d7 b4 41 ed 22 77 ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 68 d7 b4 41 ed 22 77 ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da51d68 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.386; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #143 | libevent_malloc: new ptr-libevent@0x7f496c00ce18 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 2d fa e8 1a 2e 2e c3 08 99 41 fb 5d a9 aa 4c | bc 37 fb 1c 3f 8b cd 0f 35 8f cd 07 dd 80 72 35 | f7 80 1e ad 4a ce b1 e9 04 1d 74 d0 8b 07 f4 e5 | 17 d8 b8 e1 05 8e 79 b6 d7 3a ac bb e4 2e 8c ce | bc 86 e1 a1 5d 1d 75 de 65 ba 3c 50 b9 67 1d cb | f3 45 98 92 0c 2b 47 f9 ac 24 b6 e7 02 14 6a d0 | 35 ae bb 41 0e d5 5e 1c 9e f3 6f 0b cf 24 89 05 | 28 33 1d 20 87 cd 17 ae 96 36 46 f2 8b b0 55 49 | c9 e2 69 05 a5 3b ce e9 79 5e 98 28 2d 26 87 30 | 8c ce 64 32 db c4 cc 28 0b 54 ec 11 20 c3 42 13 | b0 9a 60 90 5b d6 a2 37 cd 64 5d 68 1b 7d 9a 9b | 7e 3c b0 42 8b ce c4 b3 0f 38 ed d0 44 b0 ce 7b | ca 30 16 1b 4e 65 24 d1 1a 68 f9 23 ac 23 95 4b | 02 bd 87 4d d7 92 ba b2 f4 a8 e7 51 79 38 fc 5c | 54 dc 6c 0b cc d5 fa c3 84 b9 b0 c6 72 c0 ce b3 | 65 f2 11 a3 51 4b 0f 25 51 0c fc df da e8 92 0d | 29 00 00 24 ff 22 bc 83 73 2b 06 c5 51 f7 57 45 | 49 92 04 ed e6 73 fb 5f a8 24 0b 8e dd 0d 08 e1 | 8d fb ae a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 d6 e2 e3 09 80 0d 6e e3 9f 5f c5 | b3 4f 7e 34 97 69 ef 75 00 00 00 1c 00 00 40 05 | 8e 14 58 03 ea 79 5f 21 d8 ee a7 88 d3 36 66 5a | 3d 1e f6 5d | libevent_free: release ptr-libevent@0x7f49b402acf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da51d68 | #143 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 c4 87 1e aa 93 78 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | 54 c4 87 1e aa 93 78 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.447315; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00619 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #144 | libevent_malloc: new ptr-libevent@0x7f49b402acf8 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 19 bb 17 4e 1d d2 44 87 c5 ec 86 08 0b bd 19 | 93 c6 2c a7 54 91 37 e0 a9 ed 6d 16 f8 31 78 65 | 6f 40 ad 95 d4 fb 9c f0 4d ab 9a 34 1a ba 3f 99 | c3 56 fa e1 6c ac 28 2d b8 91 f9 81 38 4c 7f 7a | c3 f5 43 21 bb fd 1c d3 68 73 0d 30 e5 2f 2a e6 | 7c 26 a5 8d 1b 71 16 d3 5d 95 64 7c fa 15 f6 73 | fc c3 61 66 61 6e 8e 19 41 21 24 a6 79 58 22 3a | f4 d0 a3 6e 89 28 94 d4 0f fb 71 6c 42 47 a0 76 | f1 c4 17 dc df 20 3e b7 a4 2c 00 17 dc da 04 77 | ab ef b4 6d 0d d9 b7 d6 77 92 21 14 46 ba 43 38 | f8 f8 ea d4 4d 76 88 e5 1c c6 19 12 bb ed 17 ee | d6 bd e6 d2 f8 9a 03 4a 43 4e d7 f5 51 f6 aa c9 | 30 7b 9c 98 d1 5f 6a 45 53 5d 0e db eb 30 d7 62 | 43 b3 d2 72 d1 71 b3 1d c4 45 28 ea e8 d3 70 06 | 47 0f 6d f8 30 7b 63 53 31 39 1e 66 36 f5 dc 3c | c0 3d 44 cd 1b c3 be 4a c3 c9 2b a4 25 ba d7 86 | 29 00 00 24 d7 19 b0 2d 20 ce fd e7 be f6 db 33 | 46 5b e6 29 47 c9 18 f7 f6 59 8e ee 5f dc 3e 05 | b7 34 3b ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 11 7c 7f f3 35 2f 09 f7 2e 0a c3 | f2 66 5d 18 d3 c6 ca 87 00 00 00 1c 00 00 40 05 | cf c4 b6 cb 15 46 c8 99 95 8c 34 db 2f e3 73 3e | 3c 75 7a 21 | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #144 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0c ae 94 de 98 d8 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 44 0c ae 94 de 98 d8 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.507596; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #145 | libevent_malloc: new ptr-libevent@0x55564da3d978 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 a4 4c f9 77 32 98 ef f0 9f a3 23 f2 58 52 15 | d5 84 d1 56 c8 ec 9f bd 91 14 4e 87 b5 1e 2c 8e | 57 1c 36 df f9 4d 29 8e 25 58 01 ab aa 8e 43 76 | df d4 8a 9a 5d 40 00 57 6b dc 1a 8b 5a 2b 39 cb | 94 89 ce d4 c8 01 d3 57 f0 df 67 12 78 5b 35 48 | ad 6f 60 da 6e 89 cc 6b 0b 72 37 4e 89 40 45 40 | d7 b3 6e 95 53 7b ff 98 3b 11 78 0e 35 38 63 4c | f2 9d d1 fb 40 3c 99 2b cf 76 91 19 ea 84 4c d2 | e0 34 e0 cc ae d0 d1 f3 89 09 50 49 44 18 09 36 | 7a 48 34 98 3b 37 34 4b 5c 41 8a 75 9c 0f b4 4d | e8 7b d5 b1 c6 51 f6 31 61 a5 ab 17 4c 9a c2 38 | 33 0b 9c 95 1c 3d 87 f9 54 38 00 31 7f 6a 2f b1 | e0 53 42 f8 f8 c6 78 e5 ce 1a 74 e8 42 94 46 ae | 3a 8f e2 e0 e3 ae ef 38 7c fe c8 83 3a 34 b3 e3 | 43 e6 2a bd 3f bb e2 05 04 6e 9a aa cb 09 ab e3 | 80 01 f4 2d 0d ca 7f 2d 30 84 4f 36 d8 65 5d c2 | 29 00 00 24 f6 f9 0d 7b 66 66 4d d8 7f 96 ae 0a | b6 a1 b2 7c bc 8a c7 4f 92 f9 78 0e 71 48 3c 69 | 28 98 eb 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 4f 47 7e d4 ea 05 28 6d b0 56 c8 | 3a d0 73 a2 5e 3d 47 66 00 00 00 1c 00 00 40 05 | bc 95 82 f5 b9 fe 51 72 76 c1 0a 6b 50 5e b3 fc | 9d 8a 1c 9d | libevent_free: release ptr-libevent@0x55564da17d58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #145 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 ca 6b 71 3b 85 18 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | 64 ca 6b 71 3b 85 18 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.568916; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #146 | libevent_malloc: new ptr-libevent@0x55564da17d58 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b b2 f6 69 e8 94 39 b7 2c 20 6d c3 d2 7f 37 62 | 91 20 81 5d 5c 0e 6a 3f 4c 2c a1 3d ac 2a cf 39 | b5 cf 22 ed 5a 61 00 c3 eb b4 d3 6f b9 98 5d 0a | 3a 5d d7 b9 be 1a 31 c0 d0 89 e5 29 0c 5e e9 23 | 0f ba c6 23 7d df 01 92 ee e4 95 6a c4 db 54 d4 | 08 4e 88 45 95 d5 66 03 3b 55 d4 63 f6 90 22 9a | b7 e7 5b 74 01 22 29 66 b5 bf ae 7f 11 5e 89 f9 | 6e f4 37 c4 29 e3 91 2b 2d 1e 92 6b 81 dd cb 26 | cf 41 f9 eb 06 4f 42 6d 36 e3 9c e0 c8 f0 c5 68 | 82 cf ab d1 6d 0c b3 05 13 cc dc ff 86 c0 71 7c | 0a 5c 9d 36 96 60 54 48 a8 79 5a 48 0a a1 ae a2 | 76 7f 05 5a d1 04 e9 78 61 4f aa 18 51 bb 8c 05 | f4 79 3a da 67 5e 90 76 fa 2a 20 61 40 a0 17 bb | 38 f3 45 7e 4f 95 1a 42 a4 4e dc 87 92 0b 92 b1 | b6 8b 37 05 51 31 46 d7 d2 cc fd e8 68 a8 52 17 | e9 e3 bd d8 32 4f ad f6 5a f8 87 0a fb fe 31 2a | 29 00 00 24 11 38 40 26 b7 d0 7b c8 d6 7d a5 14 | cc f1 ab 2a a3 ed 07 1b 92 f3 08 c9 32 2f 66 6f | 36 dd e0 f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 77 3c ea aa b1 45 ce c0 aa e5 46 78 | e0 a6 76 81 d7 8e 9d f1 00 00 00 1c 00 00 40 05 | d2 ab e8 7d 6f 5c d1 a1 62 9c ff fd 98 84 28 f4 | 27 f0 de b5 | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #146 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 64 66 50 2d 5e 5e 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 07 64 66 50 2d 5e 5e 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.626264; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #147 | libevent_malloc: new ptr-libevent@0x7f497c01d2b8 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 8e 95 b0 dc 66 2e ea d0 7d 9c 9e 03 e5 dd ed | 57 6d df ab 8c e2 fe ce 5e 54 71 8b c4 e5 c4 b9 | 23 c4 a2 e2 33 97 1a f4 a3 4a d0 84 3e 58 6f ef | 68 19 e8 48 95 db c8 00 b4 59 93 6e c8 72 bf 1f | 05 7b b8 58 ac 18 73 7d 8c 56 4f df 81 88 0b 61 | a1 3a af 9d d3 35 1c 72 af 79 b1 45 48 de 6c 7b | 9e 73 a8 e0 c0 a5 70 f2 47 8d 8a 19 1c 82 40 fd | 51 9f 15 18 66 61 f0 51 d3 19 86 c0 4e 00 b5 a2 | 15 93 9b 06 ee 38 3a 7f b7 4b 22 6d e6 86 62 7b | e9 7e 89 23 0c 84 a1 c7 93 4b 88 35 f4 fc 7f e5 | f2 c4 a2 e0 c4 77 50 96 d7 15 69 53 bd fa aa 20 | 05 c8 1b f6 56 06 4f 1f 7d 76 47 b4 8d 51 f9 da | c6 a5 f9 cc 7a 8f f1 bc 3c 8d 2e e8 cc da b0 8c | 87 6a d3 57 d9 4b 43 ca 1f bd cc 7b ec c6 7a b2 | bb 57 4a fa 45 08 56 59 a3 20 86 5a d9 63 78 1d | 99 0d ac fa 6d b3 f8 dd a6 57 cb 71 43 c4 84 52 | 29 00 00 24 26 d6 b8 7e 9b 33 8c 25 71 77 47 b8 | ba 95 3b 27 0c f8 96 c4 c9 e7 55 fb 9d ac d7 02 | 5d 59 1c d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 9c f2 5f 5a 01 54 40 55 8b b2 06 | 7d fd 9d 0d 53 92 0d bd 00 00 00 1c 00 00 40 05 | 5b fb 28 f7 3f 11 16 83 b6 5e a2 a5 e7 ba 72 ec | 7c 43 39 40 | libevent_free: release ptr-libevent@0x7f49800333a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #147 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 e5 4f b2 bf 36 52 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | 02 e5 4f b2 bf 36 52 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.699622; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005108 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #148 | libevent_malloc: new ptr-libevent@0x7f49800333a8 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 71 ba fd b6 ba 21 bb 9f e1 3b 7c 42 8f ec 3f | 3f 1b e4 ec dd 3e e2 6d b6 61 43 0c a8 f7 42 fc | a2 e1 f0 e2 24 e2 19 61 5e f3 96 f6 82 e1 37 66 | 0a e1 f6 2f 7e c9 c7 ee 00 fc 9b 85 77 67 1d e4 | 95 6a 34 98 4d 22 fe 8a 66 d4 41 28 88 87 26 94 | 34 98 fd 46 a4 30 24 7f 0a a0 26 a9 d9 d5 4b c1 | bb 53 83 9c d4 fe 88 c0 18 f0 35 f3 19 03 e4 d3 | 52 ce d7 69 65 6d 3f 0f 23 a0 a2 57 0a 36 49 6c | 42 dc f7 20 6e 59 d6 26 a8 1d df 24 3f 9e 53 0c | 27 23 0b c2 b6 6e a9 67 23 9d f7 b3 44 ec 16 e1 | 1c a6 53 a6 6b e9 fd ef 4e f2 7a 85 54 6f 18 11 | 20 f1 fe db 23 ce 11 29 73 f4 81 73 8b 98 1f 39 | 6a e8 87 84 64 a0 a5 12 04 3a 55 92 bd a0 f0 49 | 1a 06 1b e6 d5 2b 42 7e b6 68 f2 e6 33 cd 59 e4 | 7f 72 33 fd e6 d7 8d 4a 14 28 40 6c 28 62 17 bb | bd 33 23 0f 0d 26 c8 7b c7 1e 0f e0 63 c1 58 dd | 29 00 00 24 0d a4 cf 8d d1 da 42 61 2c 7c 05 81 | 7e 2b 15 87 fc 09 f4 1c 8f 88 9d 0f a6 74 1e d6 | 3b b1 11 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d ea c5 15 6b 6d 69 21 43 d2 e7 7b | c8 3a 03 3d cc 33 55 53 00 00 00 1c 00 00 40 05 | af 57 b1 51 61 53 26 79 0c c2 cd 58 ae 20 9b 53 | 55 d9 6a 96 | libevent_free: release ptr-libevent@0x55564da8d358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #148 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 02 7b 28 2a 09 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | dc 9b 02 7b 28 2a 09 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.764931; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #149 | libevent_malloc: new ptr-libevent@0x55564da8d358 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 66 3f 7e 71 4f d8 f2 b7 bc e4 de b5 31 42 78 | 9b 87 96 f9 14 10 45 c2 2c 32 a7 d3 42 93 66 2c | 87 e3 ff fc 4a 8e a8 80 a6 d3 29 b4 84 b3 d1 ab | 1a 50 f1 40 99 0b 76 c9 7e d2 6a 91 8a 60 9a 4a | 4e b8 45 00 a9 62 8e 3c 9c b2 a0 aa 9a 02 54 a2 | 4b 23 61 73 7a ad 96 b6 99 6e 19 f8 ce a8 3b 38 | 72 fe 0f f4 12 13 e8 51 0f 6a f6 31 db 99 29 e8 | ce 37 4d 7e ba 54 6a 02 d1 f6 ba 73 0e 30 6e 74 | c4 5b 09 ff 96 44 63 b5 20 0b e2 68 63 06 f8 6d | 21 73 a0 96 e0 14 cd ba c8 e7 e8 7d 77 07 7a 1f | aa c1 f6 e8 12 07 63 3b a0 1f d5 28 d0 7d 6c c6 | 67 f3 22 38 ff 46 da e0 2a 14 5e aa 07 53 f8 d2 | 02 81 23 ee 49 ea 25 31 a0 cd df 76 6e a8 d6 e5 | 79 a2 1c ca 52 45 66 dd 19 3c f9 bf f3 93 6c 58 | 61 95 a5 0d 5e 99 03 96 7f 2e 8f bc 2a 5a dd 55 | 77 63 49 01 b3 34 f1 a0 b1 0f f6 b9 06 6d 77 02 | 29 00 00 24 3e ce 28 3a 70 30 f3 e0 ed f2 15 29 | 6c e4 b8 f3 d6 9b 24 fe 7c 75 dc 22 ff 51 27 21 | 17 62 a0 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 d9 4f f6 f2 7c 7b 27 d3 2d 5a 50 | ad 1c f3 97 cd 4e dc 4b 00 00 00 1c 00 00 40 05 | d8 0e ee e3 9a f9 84 66 7d 1e 39 11 0d 18 62 e9 | 02 92 d6 41 | libevent_free: release ptr-libevent@0x55564da4d778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #149 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 47 fc 58 f8 95 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | c2 47 fc 58 f8 95 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.82224; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #150 | libevent_malloc: new ptr-libevent@0x55564da4d778 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 1d 31 0c f4 9e 21 01 ca 21 e9 1e 4e a2 b1 8a | 3d d3 61 3b 13 b5 65 e2 45 de 68 9e 2d 62 92 27 | b2 d5 b5 74 23 6d ae 61 fb 36 bf 4c 50 c4 47 ba | 7b 81 3f 11 c2 17 84 d3 08 6b 4a a2 e7 35 35 44 | 9f 31 2b a4 4a 88 27 df d9 49 c0 ec 50 fb 6c 9f | 59 81 fc 12 8d 51 09 56 26 56 a0 12 9e a4 52 aa | 6d 69 6c 7f 36 97 f0 cd fb b5 c7 8e 60 15 58 6c | 07 e0 4b a4 38 41 bc ed 81 cf 93 68 0e 03 86 91 | 2b fb 68 fa ec f3 c3 59 15 89 e5 0f a8 a7 b8 32 | 64 13 dc fc ed ef 8f 33 cf a2 61 bd 3b 8f 5f f9 | 3b bf dc 18 0e 2d 4a 02 1a b4 ef a1 bd 38 55 1a | 4f 0c 93 51 ca ac 0a 42 53 53 fc c2 62 16 b1 57 | 8f 4f af b2 56 3f 4e 5e c1 2c b2 01 ee 0b ac f0 | bd 25 e8 c5 92 db 32 57 ad ab b4 77 25 38 0d 1d | 08 5b 60 e9 0c 0b b1 b4 91 58 c7 cd 54 94 3f 38 | c6 78 83 73 da bc 42 57 d2 09 6e 60 aa 9e 96 e9 | 29 00 00 24 58 6d c5 cf d2 75 46 6a 00 db 8e f7 | f0 93 1b ac de b0 d9 72 a7 f2 37 d8 0c 92 80 84 | e6 7a 7c 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 89 60 f3 39 3c 1d ba 39 ce c3 38 | 4c b5 42 7d fd 1f ab 9c 00 00 00 1c 00 00 40 05 | 45 92 ed 93 7f bb fa ff 82 13 4e f0 f6 26 2c 55 | ab 50 89 90 | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #150 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 81 7c 93 0b 23 e0 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 82 81 7c 93 0b 23 e0 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0505 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.881595; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #151 | libevent_malloc: new ptr-libevent@0x55564da238e8 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 4f a3 ce 82 ab 18 83 2a 17 35 e6 f0 0d 36 | 09 ea 33 a7 8d fb c2 69 6f 85 f3 92 d7 10 a2 b6 | d7 48 97 fd 31 61 11 c7 f5 24 92 cf e1 64 ba 99 | 3c 66 6a 01 3b 26 26 c4 a6 f4 fc 62 97 5c 60 cc | 6a 56 0a d5 31 20 bd d5 11 1d 96 3a d8 9c f9 40 | 5c b7 4b ee 10 a2 ec a1 19 e4 2e 8f a1 d2 07 cb | e8 c3 a7 41 c7 98 55 00 6e 5c 1c 58 4b 08 de 9f | 36 ba 89 17 40 bf 59 7a fa 79 e5 47 e7 d0 f2 ba | 60 33 ed a1 01 86 c2 4e d6 1d 1a 6d 2a 66 23 ee | 82 87 09 dc b3 9b a4 81 c8 7a 36 cb bd 79 4d 58 | e9 55 6a b7 07 79 3d 03 2a 31 97 85 d8 b5 58 a2 | c4 f2 a5 e7 9f 06 5f f4 04 e4 2a e4 e7 f3 6f bd | e6 ef b7 eb d4 d8 ea c5 47 47 96 36 2b de ca 3f | ed 31 f9 8e f6 0c f8 ef 7e 5c f6 3c f5 52 9a 83 | 67 61 46 e0 70 1d c6 b4 1a 3c e9 83 33 ac ba 6e | b9 52 72 2e c7 bb 68 74 73 92 88 cc c4 92 e6 2c | 29 00 00 24 0b e7 9d 32 ae 3b 33 3d cf a8 52 fa | e7 25 54 46 47 42 7f a5 7e bf d5 f4 70 db ce 94 | bb 8f ae 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 ab ee 60 8c 9c 3a f1 97 30 62 df | 60 33 21 19 dc 2c 13 98 00 00 00 1c 00 00 40 05 | 24 b2 c3 0c a6 9d 6b 40 5f 9c 0f cd 6d 48 3f 9a | d2 3d 21 21 | libevent_free: release ptr-libevent@0x7f4994022bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #151 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db 77 b4 67 a3 6a 59 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | db 77 b4 67 a3 6a 59 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10617.947996; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #152 | libevent_malloc: new ptr-libevent@0x7f4994022bd8 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 09 cd a1 00 73 8a 5e 4a 31 57 88 3e b4 49 ee | 06 e4 da c4 e0 e7 d9 78 be 2b f4 b7 60 d3 37 a9 | b8 ec eb 34 eb 28 96 14 0e b5 11 cf df 71 e8 03 | 9d bd d4 42 8d d7 57 d7 46 fd 8f 4e 31 63 30 21 | bd 19 d1 24 a8 6b a9 bd 53 db ed cd 4e 8e 75 54 | 80 06 99 d7 bd 80 10 1d cd 58 6e e5 38 e9 6e 94 | d5 64 4f a1 d7 19 da 63 e4 8b 7a cd 97 56 0a 61 | 5c 3b 6e 4d d4 43 53 51 7c e2 ed 33 d5 fe c1 fa | 19 b0 ef 33 72 38 eb 34 31 93 5f ea fe d2 89 d5 | 62 d9 3f 7d 90 30 0d 8f 4b f0 c7 fc c1 6d 2d fc | 8b d8 65 b4 83 ed b6 a5 79 22 44 35 09 9a 78 d3 | 34 60 00 75 d9 03 bd af f3 96 15 da 88 8f ba f3 | 0d 9d 4a c4 c2 75 62 19 51 c8 ff 5e d7 90 96 4d | a2 b0 34 50 d9 eb 1d b1 c8 03 03 a2 d8 45 82 41 | e0 e8 36 ca d1 88 23 0b 8a 4b 4e 9d d9 cc 77 e0 | b1 b0 20 b8 91 f7 be df bb c7 a6 82 09 93 59 3c | 29 00 00 24 a5 6a 23 25 d8 d3 57 62 ea ba fc e2 | 8d bc 10 3e 7b 23 7e 61 b6 b7 88 5f 17 53 25 71 | fb 19 97 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d de de 4e 92 07 fc fe 67 38 c1 4e | 06 28 02 0e 70 27 2a 81 00 00 00 1c 00 00 40 05 | 54 e1 52 04 2d 54 b0 d3 66 2a 9d eb 0b a2 b6 50 | e7 e2 b6 a0 | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #152 spent 0.201 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 f7 ef 73 63 51 05 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | 73 f7 ef 73 63 51 05 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0945 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.006917; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #153 | libevent_malloc: new ptr-libevent@0x55564da69038 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 ae fb b4 8b d1 60 4a 08 e2 dc 68 a8 c8 e0 07 | cd 5e 54 ad 22 9a 24 01 d2 de 32 7d ec b4 03 57 | 09 1a fc 1e e1 b4 12 65 86 db 9f 61 76 9c 33 b6 | 82 d0 fd 8f 27 37 68 35 14 d5 b5 80 29 7b fe 60 | da 0b 76 59 37 23 00 69 67 41 38 91 17 32 2a f6 | c4 2d 95 99 22 fb d4 e7 5e 5e 21 9f f2 1a 16 d9 | e8 dc a2 e2 50 03 7c 41 ba 62 40 25 3c 78 23 5b | 8c 17 6a d1 0a 3d 0c 0b b6 39 2b fb cf 06 8a 90 | d0 cd 5b 1c cd b7 56 38 e7 22 e5 d1 ba 9c c8 c1 | b9 87 10 1b 4f 67 88 78 c2 a0 85 55 53 2c a4 fe | 9a a3 e5 e8 f4 3d 65 48 ed c7 ab ac 36 e3 40 23 | 0e ce f3 38 cc ba c2 31 2a fa 88 73 03 ff 56 6b | 41 5b 8f c2 ff 3d 28 d0 34 3c 19 88 86 04 61 d4 | 29 88 00 20 9d 33 24 66 5e c0 5c f3 e1 92 1b e8 | ea 3f 48 5c c3 80 8b 0d 0e 53 d8 71 55 f3 a7 bb | a4 f4 e8 24 4b 38 22 31 4e a4 33 72 40 80 08 62 | 29 00 00 24 a7 e6 c2 8d 62 48 22 e6 5c a5 cb df | 58 d2 63 b7 e8 75 3d 2a 53 b3 a8 b1 03 8b 7a 71 | 8f 7e e4 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 72 45 6e b2 13 57 6b 04 b6 17 d2 | fe 9a ff a3 87 a5 52 53 00 00 00 1c 00 00 40 05 | 4a d6 f7 01 99 0f 80 af 15 eb e3 ad 4c 01 27 6f | 2f 61 da e9 | libevent_free: release ptr-libevent@0x7f497c028398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #153 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 84 e9 4f 67 b1 d4 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | 9f 84 e9 4f 67 b1 d4 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.066346; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #154 | libevent_malloc: new ptr-libevent@0x7f497c028398 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f bd a4 55 b9 b9 5a 98 f1 52 06 e9 72 54 c2 a8 | 74 8c 8f 6f 45 b6 f4 82 6f 38 74 3b 67 b6 77 9f | a5 e4 ac fa 72 84 2e 10 09 c3 66 7d 16 ce 4a 25 | df 1b bf fd cd 92 6c 5c fc 0c 9a b4 6e d2 ae 6f | e4 71 1f cb 12 8a f0 bc f5 ea c4 f5 41 d8 52 26 | 19 3f a7 81 17 80 6a b8 a9 02 0f bd 08 dc 18 f2 | 6b 6f d1 92 5c 28 51 81 23 5a 38 43 4e dd eb c2 | 46 dc 8f 8c ba 31 87 e2 4c eb ae 8f 26 3c d4 39 | 98 d5 e1 f2 28 b1 41 98 15 b5 9b ab 44 f7 45 06 | b3 f1 18 b0 d7 df d6 e2 7c e9 da c9 31 86 1c 13 | 6c d2 32 83 56 79 16 47 a7 df 53 73 19 52 34 f5 | 43 af 33 32 49 fa 15 c8 ab 28 34 b3 cc c3 2f ef | 0e e9 6d 71 2c ca d4 8d 40 ee 3b 21 9b 9c 89 47 | 35 0b 50 ff ca 1b 7a 22 50 4b 57 c9 46 58 0f ce | 29 58 8e 7f 49 b0 06 b1 24 3b 7b 3b 84 2e bb bf | 17 78 93 f3 f6 19 bb b2 fd 9e 6f 06 d9 24 e2 e2 | 29 00 00 24 56 2d be 6e 9a 66 38 6a fd fe 07 a2 | 0d ff c9 e0 48 58 6a 12 0c 26 2b 99 0e 5a 5a ad | 6d ae 6e bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 e4 e6 60 4e 55 c5 c5 d5 f5 d8 2c | b0 79 4b 07 f3 9e fb 1d 00 00 00 1c 00 00 40 05 | 4b f5 22 8b 63 74 1f 02 bd 76 8d 89 19 9d 8a 60 | 4f 1c 98 93 | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #154 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 d5 a3 eb 4e d1 0a 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 98 d5 a3 eb 4e d1 0a 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.132701; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #155 | libevent_malloc: new ptr-libevent@0x55564da6a668 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c f5 11 8c 07 e5 26 0c 29 42 17 b7 1f 64 20 58 | cc d0 f3 f7 3d 0f 27 9a 6b 9d ca dd d6 b6 c3 58 | d8 a0 b6 c6 00 75 b9 3c da 7c ff 6d 80 dd 6b 29 | 92 30 a5 a3 ab c8 85 bd 61 0f e5 d5 a9 e0 f4 8a | 10 d1 08 dd 03 7e 50 b0 4d d8 42 1f 96 89 f9 26 | 8d c2 cd 15 87 06 d4 dc 85 2e d4 dd 6f 44 6f 3d | 16 99 90 6c 76 5a 7a 2a 4a bf 11 0e b6 5e 43 3d | 14 ae 4c 13 5c 5b a7 d2 e1 43 ec 1e 6c 33 ec 64 | c6 ae db 66 6d 92 f1 00 cd 56 40 78 d5 3b 37 91 | 77 4c d4 31 94 2f 03 ac f2 2d 02 9a 90 10 23 07 | a7 87 5c b2 dd 55 1a cf 5c d1 9a b0 eb 6d e7 6b | 87 6a c5 5a ce 7f 6c f0 aa 44 56 81 e6 8b 31 5f | 30 10 0f b1 db f5 05 d5 ef 63 cc d5 57 7a c8 02 | f4 1d 7d 1b 3b ad 2b 8c 63 b7 18 94 5e 11 0a b6 | 1a e7 f2 48 c8 50 d9 a8 9b 69 79 73 84 71 79 5b | 41 3c 39 5a f7 b1 58 e0 f5 58 08 96 8e 84 1f 7c | 29 00 00 24 61 37 17 74 a5 b6 dd 0d aa 4f 0d f5 | 14 d5 0c 2f a8 0c 52 ad b2 6e 9f 46 84 cb 67 c6 | e6 ba f9 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f9 41 56 72 a9 13 5a e3 f9 8c 7f | 4c 30 2a 42 a5 de bf 95 00 00 00 1c 00 00 40 05 | 2d 50 4a e7 a6 0e c7 9d 9f 1c 0e a1 42 df 14 09 | 27 54 dc b4 | libevent_free: release ptr-libevent@0x7f49800282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #155 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 a2 42 61 a1 36 38 a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | e3 a2 42 61 a1 36 38 a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.1981; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004867 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #156 | libevent_malloc: new ptr-libevent@0x7f49800282c8 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e3 99 15 17 0c d9 5c e0 4a 96 c2 61 32 40 6e 05 | 6e 24 c8 80 75 ae 65 8d 4d cb 42 fe 53 fd 81 ae | db 92 aa 5e 79 50 b1 8d 7e 4e 72 1b a6 55 1b d1 | fe a8 80 5f 5f 0a 9f 39 16 37 c6 06 72 d1 54 dc | 54 bd 7c b5 2c 3c 4e 70 77 5c e2 95 e3 74 ab 7a | 51 25 2c a0 a5 50 b0 cd 3d 51 62 3d 02 ce f3 4d | c1 f4 5a 80 de ae 2f 07 29 ef 9d d3 ca 12 66 83 | 09 78 fe a9 30 f5 13 fc 81 99 af c3 36 b5 72 0a | bb 8e 5e 08 51 90 55 01 df 59 26 9e 88 2e 85 3c | b1 db 4b ed b7 8a 31 01 2f 63 8f e0 52 0b 11 9b | 57 71 89 7e 1c 17 87 4c a9 b0 6b 35 2a be f3 d2 | 35 f6 d8 51 3a ab f9 8d 3a 86 4b 1a 63 e0 58 c8 | 08 4e b0 73 19 5f d7 ef d0 37 27 7d be 5d 31 51 | b6 ae 72 16 82 cc cf d7 ad ff 64 e2 8b 8a b3 8d | 62 21 53 67 90 82 73 2d a6 2d 89 8a db a3 2a c3 | eb 49 a7 06 d0 77 ad b2 a2 03 f1 97 21 1b 3d 1f | 29 00 00 24 a6 0d 82 1c 0f d5 6d 10 b6 5d b5 a1 | 56 0b 23 bd 3b 33 6a 55 58 3f 25 ef f5 08 fe 12 | a4 eb 0d b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd a7 f9 6c 39 44 6d 03 54 8a 03 cf | d2 f3 34 b0 6d f5 5e 2f 00 00 00 1c 00 00 40 05 | 1c 01 61 20 13 27 bd bf cf 02 1f c0 ae b9 48 d3 | 45 7e 5e d5 | libevent_free: release ptr-libevent@0x55564da85ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #156 spent 0.0992 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 2e a4 a3 cc 5e d9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | 8c 2e a4 a3 cc 5e d9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.259406; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #157 | libevent_malloc: new ptr-libevent@0x55564da85ee8 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 09 42 9f 52 2d 18 88 c8 7b 8c 65 de e8 fd ce | 00 5b 6c f7 54 7d 2e 41 91 88 30 8c 45 70 cf 73 | 2b a4 19 a7 8f 53 e0 57 cf 17 c5 c2 51 c8 5d 26 | 74 c7 a8 6a b5 a9 d5 a0 6a 26 23 32 b1 fc c6 39 | 08 04 0b 92 20 ca b0 b2 f8 80 ca 05 e9 7e a7 21 | e0 f7 b1 46 f4 f1 58 3f f5 0b 2c 58 af 01 12 ce | d5 ed bd 83 d6 13 f3 2d 04 00 7e 53 b1 c7 ff f6 | d7 11 cb dd 2d 19 76 92 cf d8 c4 d9 e7 45 8f 72 | 00 3b e3 3d 8b f0 28 76 51 7b 33 db 3f 9c 19 2c | cd 2f 3f e9 9b 40 75 8b 6b 06 8f 51 cb 41 f9 16 | 14 da 95 d7 a0 f0 bb 8d 7b 97 46 b4 24 61 7d 07 | 9d f7 6c 20 ab ea 2c eb 26 ff ca 12 8d 92 1b c8 | 30 1c fd 13 c4 dd 2b 71 0d 18 ea e8 5c b6 84 57 | be a3 10 57 70 99 fc b0 3a 4d 26 04 fe 81 af 44 | eb 87 9f 3f 42 12 66 e4 06 3e f3 72 05 f9 4e c4 | d3 d5 f7 3a 50 bb 14 18 1a 17 13 ca 5b 4a 35 b3 | 29 00 00 24 96 03 71 a6 38 06 11 34 9c cb a1 e9 | e7 c7 d6 e8 7a 29 79 fc ff b6 f9 fc d9 3b ae 9e | f8 66 f0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 b0 c0 88 e4 ed d9 2d 72 7f 6f eb | c9 e9 e7 02 1a c4 28 ef 00 00 00 1c 00 00 40 05 | bf 81 ae 65 e3 c1 b7 aa 70 01 2c 4d 39 9a ab 10 | 4f 37 b9 0b | libevent_free: release ptr-libevent@0x7f49a802dc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #157 spent 0.204 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 0b 57 c5 13 80 dd cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 09 0b 57 c5 13 80 dd cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0915 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.317853; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #158 | libevent_malloc: new ptr-libevent@0x7f49a802dc78 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd ce 43 a7 ea 50 47 2d 89 2e f9 b8 c7 2e a7 fb | b7 5f 08 e8 df fa 80 f2 40 0a be dd 81 0b aa 2e | 23 80 9c 66 51 ce 50 9c 2e 26 3e 2b 32 b3 96 7f | 0f 3a 0c 4f b5 f7 4f a9 cf b9 ad f9 58 03 70 4a | 6b 2d da 0d fe 6b c1 68 17 1c 95 12 2a 74 20 48 | ff 61 ce 35 92 39 4f f7 d4 0d f3 27 45 94 c3 56 | 3d b2 2e d2 21 d8 65 37 f1 4a 4a 36 b8 7b 82 a4 | 30 58 cf 18 2a cc ee 74 a5 9d 1e f3 cd 20 70 ec | 66 55 25 e8 1a ef aa 2e 0e dc 5f 48 51 fd a5 47 | 92 d6 d9 84 de fd 95 39 eb c4 53 ba fe 47 41 17 | c4 36 f7 c1 7f b6 53 6e 98 2b 91 35 25 3c 0e 29 | 5b e9 7c 8e 62 c5 ca a2 e0 d4 d1 bb 8a a2 75 07 | 82 0b 2d 34 85 d0 ab 2c c2 b3 90 93 c1 3b c1 53 | 4c 46 8f 81 46 df ba 26 43 ea 41 b6 21 12 97 14 | 73 61 05 eb 24 48 6b 31 4b 8f af c8 a9 b0 f6 dc | e0 9f 44 77 44 fc da 1b dc af fc a5 6d 0c 80 bd | 29 00 00 24 b6 b1 43 3f 07 72 d4 5b cc de 1e 57 | 91 b2 01 dc 3e 33 2e 9d 47 e1 c1 4b ab 26 a0 f9 | 25 68 da d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 80 ca 30 15 a2 65 66 f8 95 02 7a | 64 a2 16 d3 b6 29 bd 00 00 00 00 1c 00 00 40 05 | bc 5c 7e 1e b6 c4 0d 52 d5 a7 52 ec 47 f0 22 ba | 66 51 39 a2 | libevent_free: release ptr-libevent@0x55564da44d38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #158 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 d0 5a c1 9c ea 59 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | 58 d0 5a c1 9c ea 59 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0813 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.376298; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #159 | libevent_malloc: new ptr-libevent@0x55564da44d38 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 a2 21 f4 4d 30 62 88 a2 af 26 28 64 44 34 ce | 60 4e 41 e7 2d f3 93 93 90 bf e5 b8 fc b7 35 54 | 76 49 cd 7e d3 fa 2e f5 18 bd fe 34 e6 d5 bf 71 | 82 7f ba 6d 52 89 bd 25 69 b8 d5 13 fd 00 a2 e7 | 6c 35 29 55 71 93 56 0a 10 a8 02 0c f6 5b 0b c2 | 90 56 c4 5e dd c5 63 d0 b0 5c 95 9d 13 85 1f 53 | 45 89 1b f7 19 8a e8 16 77 2c 57 6e 1c b5 c2 47 | 31 f0 11 96 a9 32 8c e8 91 aa 14 ef 9e 3d 15 7f | 6d 4f 08 e4 29 4f a4 bd 66 34 e2 67 f8 a4 e6 8a | 5c 8a 89 90 b6 ad 02 98 49 9e 9f 76 4a 6a 32 db | a2 22 03 32 74 79 52 4a 33 f8 9c a1 fd 3a 7d 53 | 91 8c 33 b8 ae bc 95 0b 7e e1 9b 13 d4 9c 18 c1 | bc 02 0c 97 4f 1a 75 48 c8 eb b3 17 31 77 5c db | ea d7 d8 b6 2f 10 4a c5 19 12 ad 56 e8 0b 0f 09 | 57 b1 df 2c 62 14 fe 61 8a c6 0a 43 53 7a ff 11 | 66 a8 76 be f0 6a d8 35 7b 5b 1f 05 f1 72 aa 39 | 29 00 00 24 7b 6d 30 54 55 b9 0e a8 01 26 cc ad | f8 2b e3 60 62 df 38 2b 2d 97 ef a1 9d c7 db e5 | d8 42 3c d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 70 a8 f6 dd 8c a1 69 c4 e0 0a af | 91 81 7f 61 bf 74 05 14 00 00 00 1c 00 00 40 05 | 61 f1 fa 04 89 dd 83 62 75 a9 ed e7 fa 9c cf 58 | 85 b0 69 fa | libevent_free: release ptr-libevent@0x55564da88de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #159 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ba 73 89 75 d4 10 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 44 ba 73 89 75 d4 10 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0818 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.440786; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #160 | libevent_malloc: new ptr-libevent@0x55564da88de8 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 7f e8 0e 27 89 26 bc e5 d7 6b 19 cf 67 d3 d4 | 10 08 19 75 1f 0f 98 34 8a 66 1f 53 67 36 42 b8 | eb 64 74 fc dd 21 29 b1 51 cf bd 34 a5 32 56 70 | 60 41 2a 4c a9 17 5e ed 15 18 d7 3e 62 eb cb f2 | 4f 56 65 1f 62 17 7a 33 6d 8d d6 86 83 b3 47 c1 | 6c dc ab fb af 0c b1 12 6d 48 6a 3c da ef 80 f7 | f3 88 38 a1 ef 2a 09 ed d9 d9 8f 68 e1 8c 8f 3a | dd 9e 04 7c d3 6a 6e f8 de 4c 28 4e be 44 6e 8e | ee e6 e8 b5 b7 b3 72 5e 91 da 6a 13 9f 89 37 29 | 12 62 e2 9f ec a2 1d 05 b2 5d 4a 07 d0 8f 89 4e | 33 02 63 b9 a2 71 d1 7d 62 0d f2 eb f3 aa 46 3a | 61 0b 0a 3e 13 71 2f a6 9c d7 e6 6f 19 a5 7b 19 | 07 a1 df 1f e8 57 2c 44 52 c3 2d a5 24 da e2 3d | 7d b4 cd 8f 63 2d 32 a8 ab ed 6c c0 cf 88 57 7c | ff 39 19 0d cf ea f7 c0 9c 88 37 0d bd 85 63 d2 | 97 e6 75 b9 ea 90 6e e8 ec 80 7d fb 40 d6 85 63 | 29 00 00 24 d2 d4 67 76 aa 9c 1d ab c6 ce 55 a2 | ce 67 12 a9 c1 6a 43 78 94 f2 14 6e 55 48 bc 92 | 1a 67 03 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 8c 7f bf 83 8f b9 04 e0 93 8e 38 | 0c f1 e6 fa 34 58 4f b9 00 00 00 1c 00 00 40 05 | f8 b0 f2 ea ef 0b fe d2 c5 0c 11 03 31 0b ed d5 | 8e a8 ef 0c | libevent_free: release ptr-libevent@0x55564dadfe48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #160 spent 0.251 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 48 42 2c c3 84 4f de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | 27 48 42 2c c3 84 4f de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.51936; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #161 | libevent_malloc: new ptr-libevent@0x55564dadfe48 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 d6 5d 5a c1 48 57 28 cf c6 cf 95 18 7e 34 98 | ce 01 b8 8a 0e 8c 97 7e 37 54 f2 ee 09 75 0d 89 | 7a 15 cd 95 d4 b3 b7 26 61 06 d6 5c 88 44 07 01 | 14 99 0a 9d a9 ba 64 63 96 be 6f 21 76 e3 18 d5 | ac 80 a5 1d 9f 29 00 e0 be 04 da 0c ac c1 3e 82 | bd 4b 31 49 c9 0d d8 a3 e9 ea b0 be 53 d0 a6 7e | 5f 6a c3 51 4f 0a 92 de 9c e7 f2 5b 42 eb 49 89 | 85 22 9f c3 f6 1a e4 b5 dd 75 dd 5e d7 de c4 8e | ff 2b ae bb ba f0 df 0b 0f 37 92 37 55 0d d6 2b | 27 99 c7 af 71 8c b6 98 3d fa e5 50 bf dd 8e 44 | a2 ac 77 c0 2d e0 f4 86 61 dd dd 27 2e d5 aa a8 | 03 c2 98 f0 26 36 7f 6f 7e 5e 3b 67 1a 6e 27 2f | df 64 7b 75 e8 5c 2c 0e b1 4c a5 f3 db 82 b3 ea | 3f e3 96 3a 75 00 de bc 05 5d 0b f1 48 6e c2 bd | b6 05 03 6b 78 23 9e 86 69 34 5a 82 d7 59 aa 5a | c4 c9 0b e7 44 1c 37 e5 ee a8 2c f5 ff a0 2c bc | 29 00 00 24 98 24 f9 1d c3 0a ad fb 7c 27 8c 29 | ca f3 63 38 87 1e 58 9e b6 16 c2 7a 4e 9e d9 d2 | 8a 7b 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 62 e4 3d 0b 37 a6 18 54 7b aa 49 | 82 f7 ea 18 cd f6 d7 71 00 00 00 1c 00 00 40 05 | 0b d5 39 aa 36 4e f7 3f ac c4 b5 20 8e 94 7e ea | b5 5b 43 e6 | libevent_free: release ptr-libevent@0x7f496c02dca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #161 spent 0.273 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 3d 55 f5 68 83 f8 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0a 3d 55 f5 68 83 f8 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.126 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.580962; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007017 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #162 | libevent_malloc: new ptr-libevent@0x7f496c02dca8 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 42 73 15 a9 eb 37 c1 c9 62 0f 14 85 d7 c1 19 | 29 d4 b5 f8 ed 3c 92 27 31 20 a1 e1 8c 7c 71 36 | e9 94 ce 44 c0 a7 45 b3 fa 3f 51 1d 98 00 9f 7b | 9d 71 b7 f5 cf a8 2a 85 f5 86 7d 36 67 5f ce 38 | 5d 42 69 c0 a0 57 93 c6 28 65 26 8e ee 10 fe 43 | 7a e5 d2 c6 51 a6 8c 65 39 69 55 c6 90 5f fa a5 | 4a 1f 84 05 78 bb 87 3b 76 9d a7 c3 35 3d 0d 14 | eb 0a d1 3b dd a9 cb a4 d4 52 e4 8b 80 55 21 ee | c7 fa e8 5d ac c0 7b a3 b9 72 34 d5 eb 63 31 14 | 2a 6f 3e ca 6b 3c e1 d1 b3 36 6b 70 84 2c 07 cf | 2e 6f 0d 0b 10 d3 9e 01 f1 97 d8 76 95 a1 cb 94 | b3 fc 59 c0 82 5e 61 ed c3 f4 61 70 f6 62 ac a2 | 20 d1 7a c2 33 2e b0 3f af 70 83 41 eb c5 93 2e | 43 c9 69 12 0e 91 ab da 78 b6 bf 16 57 48 c6 0f | 90 3d 27 e3 f2 50 41 86 83 0e 4e 45 59 79 9b ed | 88 f0 6e e5 d0 65 df 7e 61 79 6d 1e 66 fe e8 82 | 29 00 00 24 ef b8 9d e4 ac a8 2e f5 61 2f 7b a0 | 60 30 e3 db 75 b9 a4 32 e6 f0 75 3d 86 1a dd c7 | af 7b a3 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f ff 39 97 9e b7 a5 af 42 1b 12 91 | 77 5d 13 63 b4 73 2b 84 00 00 00 1c 00 00 40 05 | 3d 6d 46 18 c9 29 cb 26 71 8d b1 47 89 42 a0 5d | bf 48 22 13 | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #162 spent 0.263 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad c7 29 65 ac 00 86 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | ad c7 29 65 ac 00 86 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.643526; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #163 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 40 a9 3a c9 f4 b8 07 ec 21 3e ed 9c 21 00 77 | c8 30 6e 42 67 ff 32 12 b8 93 77 f9 63 8b 13 2c | 1e c2 d6 58 9a a4 29 5d e6 a3 e5 59 15 55 5a d9 | 41 57 d0 8d b9 e4 a3 21 83 36 c5 52 77 11 1b ec | 26 79 57 d4 32 ef ac 9f 5e db 81 a2 4f 13 19 b3 | 9c 6e c3 be 38 26 41 a2 2c 38 f2 a0 d8 91 fc 21 | 2b fa f6 61 c9 bd 98 bc c7 8f 42 5e d2 64 f6 de | 23 f6 91 02 d0 7d 93 d2 a0 8b cc 52 94 31 ba fb | 83 4d b3 c4 3c 72 e5 e0 37 c6 89 cc 33 62 f8 b9 | 79 2b b5 46 47 b8 e1 90 22 b5 00 95 7a 5e df c7 | 0c 4e a0 fa 65 74 d8 4c e3 15 76 a4 63 da 58 2e | 82 a9 ed ba 84 40 27 97 aa 70 27 61 25 72 5d 41 | 01 28 0f 9a 0e a0 a8 8e 3a 9d 30 a3 e2 07 c6 32 | c1 73 0f 28 84 49 40 47 b9 4f ec d6 0f 1f 8e 4c | f7 6b 4e 53 bd 8e e0 66 d4 6b dc cd 63 18 8e fa | ac 84 db da aa 7b 0a f4 6f ab db af e8 c1 56 21 | 29 00 00 24 db e1 1e 0e cd f3 3e 50 bc e8 6f e1 | d8 e8 eb 47 b8 7f 3f 52 4a 4b 98 d4 24 1b c7 00 | 74 60 9e ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 5c 43 28 3a a0 62 a9 01 78 44 5c | e1 6b 36 83 e3 f5 0d e1 00 00 00 1c 00 00 40 05 | d5 dc b1 47 fb 46 4d 3f b7 0e 7f af 05 76 41 e6 | cb 45 d8 57 | libevent_free: release ptr-libevent@0x7f499c03e498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | #163 spent 0.269 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 79 1b 3d 2a 0f c0 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | ad 79 1b 3d 2a 0f c0 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.121 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.703093; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #164 | libevent_malloc: new ptr-libevent@0x7f499c03e498 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 bc c3 f7 e0 28 66 da 03 f1 3c 23 ba c5 51 46 | da 59 dc 53 4d 84 95 20 59 1c 67 e3 30 1e d0 22 | e0 dc 8a 8f 2f 24 93 3d 07 57 56 55 17 d9 a4 b3 | 39 3f b9 15 b2 e8 2a b9 a6 93 49 f0 7a 6c 58 f4 | b9 61 41 c6 7f fb a0 1d 0e ad 95 e1 a8 4f 69 6e | 44 c3 d2 85 69 99 1c d0 da 9a 04 d4 11 57 f7 f0 | 58 fc 70 8e 20 ae 63 92 cb e1 46 49 63 f5 fd 54 | 6f bf f9 f0 52 6d 04 9b ea 5e bc d2 7c 4a 18 db | b4 95 f8 a1 2a 52 c0 7c 3b 23 ab ba 0a 80 2f fc | 47 20 b7 4e 8b 0d 47 7d b1 e7 84 0d 0c 60 67 e5 | 49 e3 b4 1d ac 56 c0 9d f3 65 b3 39 bc fd 14 16 | a5 a6 12 e8 b0 aa 1c df ef 93 07 2d 89 53 fa 6d | f2 53 1a 27 e4 51 ba 5b c2 28 3d 01 a4 c9 ee d2 | 8c e6 c6 58 0a 3b 9a 4c b9 4a 2f bd e5 30 aa 8e | 80 b3 e2 04 cc 28 62 ad 52 bc af 8c 85 0c 3b 40 | cf ff eb 73 12 e2 d7 69 38 eb 83 62 34 7d a8 5d | 29 00 00 24 71 cb 70 7f c3 98 c1 1f 1f 79 e2 8d | a6 cd a8 5e c9 40 cf b4 b5 0c 70 b5 0c a5 3a 02 | dd 06 2e 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 92 3f b0 f5 7a 75 10 71 ec 97 c3 | 12 47 db 14 3b 24 02 6b 00 00 00 1c 00 00 40 05 | 25 cd 97 0d f2 b4 13 fe ed 93 1c 3a d2 65 9c b3 | e8 7d 8d 08 | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #164 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac ee 04 c8 10 c0 50 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | ac ee 04 c8 10 c0 50 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.764492; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #165 | libevent_malloc: new ptr-libevent@0x55564da00ba8 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 c0 a1 7f 59 b4 87 b7 c3 8e e4 63 f1 cc 1d 8f | 66 8e 7b f2 0f 55 82 75 10 64 35 0d 9b 76 14 19 | 58 7c 06 90 4a 85 01 6c da 3e 15 a9 fe bc f5 69 | 91 60 5d 1b a5 b7 8c 13 d3 0e 55 05 68 81 02 9a | ab fd 4c 65 8a 66 a4 d5 34 45 3b be 18 4a a6 d6 | 67 22 a6 b7 8c c2 2e bb ef db 6f 5a 1a 4b bd d8 | 7a bd 74 e9 79 a1 71 4a 96 c7 66 4e 4e 80 c1 49 | bf 22 ab 51 6b dd 15 81 32 2c c2 67 19 ba 56 f2 | 8d 01 65 e1 d0 91 e3 b1 5f 9c 45 cc 5a 9f 2d 7e | b4 3e 78 8d 9e f2 7c bf ed 42 d3 b9 88 76 8f 0f | 2f b4 69 92 62 50 92 3c 76 cc e2 4f 16 bd 72 71 | 1b 34 c6 6e e7 8f bb 9c d9 96 9e 38 00 5e 8a 7c | e5 a5 6d be d1 0e 49 2f a3 44 a5 80 c3 3e 7d f7 | f6 ca b4 4b 5b ed 7b df 32 da 87 a5 c4 6f 40 54 | a9 8f 0c 07 79 79 09 2d 8b da dc 5e 51 4f 09 58 | be 9d de 94 ad 9d 99 0f c1 dc 22 7f c0 e5 96 4c | 29 00 00 24 c5 51 df c9 e9 b3 35 65 e3 28 fb 2a | ca 41 25 9b 46 6d b9 fb b7 d3 56 d6 aa 44 a0 2b | d8 18 04 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 6c 8a 33 73 a1 86 a5 85 43 1a a4 | 08 c2 31 89 27 02 72 4c 00 00 00 1c 00 00 40 05 | 61 0e f5 df 6f ea 44 34 a5 fa f7 44 1d 55 6e 16 | c4 32 0c ab | libevent_free: release ptr-libevent@0x55564da37cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #165 spent 0.562 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e de 98 27 29 67 da 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 1e de 98 27 29 67 da 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.833274; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #166 | libevent_malloc: new ptr-libevent@0x55564da37cb8 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 75 90 d5 30 15 c6 80 75 02 ba c8 2b ec c6 ab | 2e a5 1e 5f 94 ee c4 69 5c 02 e1 15 89 b2 6b 89 | 68 27 25 68 22 96 38 31 3a cd 67 61 b9 19 47 51 | 9d c4 e2 29 51 bf d1 9b 20 b2 0a b5 63 4e 26 56 | 65 4e bf e7 6f ba 1d 67 d8 f9 ef 19 60 58 ea d5 | d5 1a 0c e9 57 8f ba 08 f2 a4 11 d4 e8 3c 47 87 | c5 e8 6a be 48 66 ae 3a 52 81 8e 82 6b 19 73 b2 | 8d ca 98 e5 f2 64 b9 4d cd 4d 22 ef cf 79 62 8a | a1 50 ed 7b 19 79 d9 de c2 5e 2e fd 91 80 31 8c | c5 0b 82 7a af 35 1d 02 0c c2 16 84 00 f1 34 e4 | 82 8b 55 41 7f b4 0a be c5 96 6e ce 93 b2 82 1c | 46 bf 06 8f 95 06 58 ad 71 96 ed 8b 29 25 8a d6 | a8 25 65 26 f0 e5 42 97 3c 3c 99 d7 d4 a0 24 fe | c5 ca d3 51 73 a7 2a b3 96 1d 68 1b 66 42 8b b8 | 97 c1 1b 80 9e 6f 3a be 1f 4e ab e1 60 48 e5 fa | 08 b0 8c 29 7f 57 5f 83 f8 bd ab f1 80 57 17 c6 | 29 00 00 24 4e 8d e4 3b 51 f0 24 54 d6 94 5e 0f | 33 cb 8d 7f 03 64 c6 c9 fb b7 67 65 76 5f fb 4a | 8a b5 0f 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 f4 6f e3 a0 e4 79 23 a7 83 9a d4 | e2 f6 fb 12 f8 32 58 4f 00 00 00 1c 00 00 40 05 | 33 ad e5 ed 88 8b 80 ea 77 f4 69 74 33 f0 97 93 | 18 b6 b9 0a | libevent_free: release ptr-libevent@0x55564da39438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #166 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 84 d7 e5 06 c9 7a c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | 29 84 d7 e5 06 c9 7a c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.892624; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #167 | libevent_malloc: new ptr-libevent@0x55564da39438 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 8c 27 3e dd 75 e4 53 44 5d c8 ee 7b d3 f8 83 | bf 82 a2 8c 1e 36 f6 64 ce 70 df 87 df dc 18 4a | 45 fc 5f b6 32 0b 4f 02 3f 95 f4 22 48 b1 be 59 | 3d 82 9a 2b 8d 74 0e 85 db 6c e1 69 3f 27 76 fe | 54 92 8e 2b ca d4 ad f4 44 15 98 a1 f7 ac a3 99 | 36 18 80 1e e1 ef 92 49 1d 70 80 1b 4f 18 34 ad | 0a a4 e1 92 e5 7e 5a a9 04 2b 20 2c 20 7e 3c cd | 47 a5 65 73 55 ed 2c 75 ac d7 a6 65 86 38 ab 68 | 38 b3 cd e5 cf 0c c3 c0 c5 0f 8e fe 25 a1 62 bb | 84 86 a8 4c 7c f3 d5 21 5e 5d 06 31 7d 9d 5a b2 | 69 c0 6c 45 66 a6 8c 51 d0 19 89 4f 41 16 66 ae | ca b8 ea a2 04 c1 d9 80 90 c7 86 c2 83 6c 5c 5a | 47 cf f0 aa 9b fb f8 75 92 36 ea 72 c9 e4 e3 51 | ae ee 8e d5 f3 6f 06 af bb 6e 7b f6 4c 56 98 a5 | 2c 37 52 10 0c f1 e7 7e 74 25 2e 47 62 52 b8 06 | b3 af ad ca d6 b1 0e ae c8 2f 34 68 a0 ad 5d da | 29 00 00 24 7a 1c a2 82 6a 06 2f 86 2c 1f bc d2 | cc 5c 34 fb 95 bf f5 48 5c 6d 68 9e 57 7f 8a fe | e8 8a cf 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 00 21 97 40 72 15 d4 15 aa f8 57 | 17 e1 0c 6a 19 2c 15 68 00 00 00 1c 00 00 40 05 | de 0b 99 4b 93 a8 d4 d6 05 76 14 81 4e f2 52 4e | d7 8a ae ba | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #167 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 90 23 db 81 bd 65 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | 41 90 23 db 81 bd 65 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10618.951988; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #168 | libevent_malloc: new ptr-libevent@0x55564da7bd68 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a d9 ee e5 b2 c4 84 16 80 3e 16 58 40 3e f8 | 01 99 b9 7e 05 76 c0 7c e9 3f 44 3b 33 10 dc 07 | 1d 1c 35 9c 22 9d 38 b8 98 c6 39 31 f2 a4 03 60 | 12 83 00 13 89 a1 e6 dc 38 b1 db b0 e8 08 cb fe | 22 a3 bb 5a ed cc 05 46 a6 88 c7 a0 2e 53 5f 64 | 7f 2c a0 7d 83 ae b0 92 ba a2 fc 41 54 17 d7 c1 | 87 3c bc e6 50 3e b8 eb b5 a7 59 59 2b 4f 31 e5 | 3c 58 44 89 c8 b0 40 86 80 ed 2e 49 74 36 3b a5 | e6 79 ea d0 ac 93 36 8d bf 07 23 36 e1 e0 da 8b | 1d 89 74 d0 27 30 e8 75 77 50 df 92 12 9e ab 0a | e2 cf 7b 1c 9e 5d e4 6b 03 b1 c6 d6 64 ee 15 3d | a8 23 ba 17 d6 b9 53 6b 67 8d 7c 64 36 bb fb 4d | 77 89 f2 2e 80 b7 90 12 4e d0 ea d3 8b dc b7 3a | 0a fe e5 39 a8 6f a4 c0 e8 ad 06 01 bd c2 a6 24 | 12 22 a9 f7 37 69 27 17 35 41 7d 31 40 39 a7 2c | b7 12 4a 80 b0 45 b8 29 f5 29 c8 38 e2 52 bb 35 | 29 00 00 24 3a 8e aa 91 8d 45 0b 09 b1 62 e4 13 | 53 b9 4f 89 f5 56 03 af fe e6 9c 68 2e f9 46 08 | 2e 29 65 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c9 b4 6b 4e 86 b2 91 69 18 32 2e | 4a b1 d7 79 98 43 b4 d1 00 00 00 1c 00 00 40 05 | 05 71 37 94 de cf 79 c0 51 41 e4 bc c7 5c 48 3b | a1 5c 47 e6 | libevent_free: release ptr-libevent@0x55564daecfc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #168 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e be 23 ba ab 02 b0 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | 4e be 23 ba ab 02 b0 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.029364; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #169 | libevent_malloc: new ptr-libevent@0x55564daecfc8 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a f0 f8 9e 85 4b 9f 88 6f 74 8e e8 d6 88 76 73 | b7 78 2f 15 cd 58 9d d6 0f 04 49 1e 53 97 1e f8 | 99 5f 2b e5 df af b6 44 9b ee de 12 3a b1 4c 42 | c9 c0 01 ac 2a d9 c4 e4 71 02 76 9e f3 b3 3a 75 | d8 0d 8c c6 1b 4a e9 85 61 2f 09 c7 70 2e 9c f4 | b7 c3 60 f5 06 bf 6c 7f 1e e6 43 b8 1a f6 2f b6 | c0 35 df 0e 0f 91 fe a1 b6 3f 0d 00 53 72 23 7a | a4 9b e7 23 31 ed 84 2f 2c 02 59 2e 5e 02 4b c5 | d4 df 9e dd 2c 84 51 c8 28 b1 da 39 3a 92 30 58 | 94 aa 03 38 7a f2 35 2e 21 eb a6 80 0c f6 c7 c7 | e2 f7 b5 4d bd 86 66 b3 03 57 83 cb 40 99 f1 fd | d4 e0 5e 72 44 05 9c ff bf 15 96 a3 98 bd d7 39 | 39 ac ec 91 cf ad 0d ea 34 c6 34 ea 6c 41 44 c6 | 83 95 a8 28 e8 6e e6 73 15 18 fc c8 80 1e 9a 15 | da 72 7f 36 c5 97 ee a0 e2 8e 4b ef 0f 7e 32 68 | 5a a7 4f 72 a6 df e7 de 24 79 e1 1b f2 8d 30 ae | 29 00 00 24 cc 12 28 83 39 c0 2c 70 d9 44 eb 7c | 2f 9c 02 6f 22 e7 35 9f 44 05 87 85 32 1a d7 2c | a3 38 ca ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 ad 26 d0 bd b9 9d c4 71 4e 37 51 | 32 b6 7b a5 50 f6 f5 c1 00 00 00 1c 00 00 40 05 | 54 7c 6d 94 29 4d 6b 4b 64 4f 93 5c a1 14 5e f0 | 8d a1 5e 01 | libevent_free: release ptr-libevent@0x55564da3f0f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #169 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 50 e2 0c 5e 85 1a 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | b4 50 e2 0c 5e 85 1a 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.106674; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007249 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #170 | libevent_malloc: new ptr-libevent@0x55564da3f0f8 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 01 f7 bc ec 6f 3b 7f 71 62 86 64 cc 5d 7c 8e | a4 58 c0 6a 3b 56 ab 99 14 70 1a f4 fe 43 3e cc | f2 ff 6d 1a 2f 72 0d e9 b2 a7 48 3d 52 12 dc d2 | 8a 9c 99 31 ff c5 93 91 66 f7 5e 6c e5 81 6b a8 | 6b 1b ef 60 65 51 e5 2d 72 f5 26 b9 a9 8a 79 e8 | 7c e8 45 a9 98 6a c8 d1 d6 42 f4 b4 54 c9 29 c1 | 80 be 42 58 71 7b 43 cb 8d 3e 21 e4 46 8c 91 a0 | a2 a3 2d 1d 54 11 73 eb 45 5f 33 16 48 c5 08 3d | 41 f4 50 aa 3a 87 2f 3b 3a ad 78 bf 84 57 bf 9a | 77 3e 41 dc 55 db 40 71 06 03 0f a9 a4 98 01 a1 | 39 bd 0a c9 8a b2 0a 4d b4 99 0a 5a fa a2 0f 7a | 6c b9 af 79 ca 78 4e 8b c2 fb 80 f5 80 c3 b1 97 | 4a 7c 08 45 5e 3e 15 d7 6f 1f 49 ff 25 75 83 6b | 3f d9 c9 9e ae b8 c0 9c 14 ba be 12 4c 82 62 d1 | 88 bf fa 05 5e c7 12 7f d2 c4 bc 4a eb ff 19 af | 7b c9 a9 29 0e e4 99 53 56 f3 3a 33 2d 25 13 9f | 29 00 00 24 85 6f aa 0b 51 83 7b f3 12 3d a1 06 | 08 ae 5f d6 55 85 d2 ae 21 3a 23 1c 99 a3 fa 48 | dc c6 3d ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 09 fb 19 a2 5e 22 41 3d b2 0b 4f | 57 b7 97 ca dc d8 1e d2 00 00 00 1c 00 00 40 05 | f2 d0 5c e8 86 29 b0 16 35 e5 07 6b 34 42 ef 90 | 9d e8 44 8d | libevent_free: release ptr-libevent@0x55564da40808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #170 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 24 f3 c8 38 6b 0d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 7e 24 f3 c8 38 6b 0d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.172979; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #171 | libevent_malloc: new ptr-libevent@0x55564da40808 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 52 64 d5 a6 61 5f a7 43 bd b1 e0 6a 83 c3 14 | c4 63 b2 72 3e c0 b7 1a 09 c9 f4 fb 06 f5 f1 4d | 33 1d 7d 0e e1 40 97 e2 b8 68 ef 8b ec 28 94 a1 | 4d c1 1d c1 cd 8d d2 29 bd 2c b5 51 3a 1a 42 d1 | be 7c c6 72 0e 3e 5a 44 08 be 66 2f f4 aa 33 de | 7c 33 1b 95 cf 2b 9f cb d8 2b 15 2c 46 17 82 47 | b9 e3 76 f9 29 a3 c3 35 bf f0 bd c2 20 6a 39 27 | 79 84 39 4e 91 09 88 67 a4 90 e6 f2 61 5b a9 a0 | 23 19 ab 61 00 3f ca 18 1b d5 ed e6 39 49 70 c5 | 77 54 54 b6 31 b8 36 e9 a3 98 64 f0 c7 66 85 a4 | 73 59 9d c6 60 60 cb d7 10 bb 5c fa 2c c8 c1 70 | 9c 18 2b c8 31 dd 65 e1 f3 96 9c e4 6d c4 2f 2d | 19 c3 5e 4e 7e 33 a4 00 13 85 18 06 51 5a f5 2b | f6 66 7b 29 57 cc 21 e6 06 f0 d4 22 2f 98 cc 38 | 35 76 11 d7 76 d4 fe bb 8b db fe c2 17 60 36 73 | c0 ce 93 d8 33 35 b3 8c cf 56 8a 91 d6 4e bd 8a | 29 00 00 24 af 2a b0 f6 f8 29 44 a2 e3 ff ef 5b | a4 da 4d a4 ac 6a cb 8a c6 10 28 46 1d c5 38 c6 | 16 2f 9b b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 34 2e 6f a0 2f a3 94 fc 2f 2f 22 | a4 91 86 43 43 ca 29 8a 00 00 00 1c 00 00 40 05 | 09 42 91 e6 67 e6 a4 59 98 70 d7 be c6 17 7d 6d | 52 db 1e c4 | libevent_free: release ptr-libevent@0x55564daf15d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #171 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 c6 95 a1 eb 4d 3e 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 96 c6 95 a1 eb 4d 3e 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa7488 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.23652; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #172 | libevent_malloc: new ptr-libevent@0x55564daf15d8 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 0a 0c 5e 22 bb 9f 12 33 a3 9d 2a 06 37 1b 14 | ee 31 d2 0f ac 56 64 3d 9a 3b 56 e3 12 be ab 43 | fd b9 4e ea c8 3f 61 3d 20 fa 05 42 3c 5c ca e3 | dc f3 51 52 87 90 0d e6 ed 20 9b cb c2 51 3d 8b | 35 f3 1d 04 4a cc 54 ef 4c 44 26 46 cc bb 26 07 | 64 64 bf e4 c4 fd 48 f3 47 0e ba 8e b4 78 ee 54 | af 1b 56 63 10 66 ef 19 5b 7a 40 fd 05 4c 51 72 | 7a 08 92 fe cc 46 54 e0 f6 ed cc b4 90 bf e9 81 | 28 40 6c 8e 25 c6 30 28 2a d4 5c 69 a3 bf a3 d2 | 6e cb 83 f9 46 4b 4d 0c 0d 56 16 64 67 f4 41 b2 | b8 fd 20 3c 40 eb b3 aa 7b 19 18 c5 b5 30 64 6f | 4f 44 68 88 76 38 a4 ac 8f 21 f0 30 2b a2 05 8e | 09 1c da af 6e 6f 33 26 b9 79 2d 01 29 15 62 7c | 3c 6e e2 46 9a dd 54 20 a5 33 22 1a 06 80 4f 86 | 53 d6 4b a3 74 0a d4 01 3a 0c 79 2c e2 c0 b8 f8 | 5d ea e9 d1 91 eb c8 49 f6 a3 cc 33 dc 53 38 c9 | 29 00 00 24 64 0a dd 4c ea d2 b1 a7 e4 d8 c0 7f | 2d 37 de f7 a6 0b d3 ea ea ad 28 82 59 bc cc 5a | 04 24 e8 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 73 b5 88 41 bf 4c f3 e7 64 71 fb | 7d 1e 08 33 3d 0f 63 fc 00 00 00 1c 00 00 40 05 | 46 25 7e 4f 17 c6 59 99 ca bc 83 ab a7 28 e7 a6 | 51 f3 35 14 | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa7488 | #172 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 d7 f7 fa 0d 30 7f f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 80 d7 f7 fa 0d 30 7f f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7bcf8 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.295848; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #173 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 52 69 b3 fb 25 c0 a4 eb f8 f8 b9 14 8b 87 b2 | af 52 b8 5a 93 8b 55 d5 c2 be aa 2b e3 0c 8a 9f | ae 05 e3 8b 12 fe b3 d0 ea 86 67 da bd 88 d1 12 | 72 85 7f 0c 8d f6 26 39 38 5a fb 2a 3a 64 a3 f6 | 50 40 3e b4 99 91 d5 1d 22 3c 14 e1 1e 52 01 4d | 72 ab bf 35 64 97 03 5f ef bc d0 68 96 00 1d ed | 0c 10 81 8c c0 bf ed 03 06 c2 f9 ae 4c f0 65 9c | c2 97 40 5c 5e b1 b0 39 a1 a7 11 8f 99 22 55 a3 | b9 c4 f6 1d a3 a5 9e aa e6 6a cd 25 84 e3 e5 54 | 0f c0 1d fc 29 c9 bd 19 97 90 19 8d 0b f1 e3 a9 | b2 23 31 22 9f d4 84 d6 8d 2b d4 d7 0f db 5b eb | 95 d4 a0 1e f8 ad e1 fa 4d 00 48 77 b4 23 c3 03 | 24 e0 b2 df 21 0b da 21 26 56 99 51 a3 2c 29 44 | c4 58 28 74 89 f8 70 56 6a b5 ec 1b bd 41 f9 95 | 4e 83 af a3 50 86 a8 85 9e f0 2f 0f 78 b5 ba 91 | 71 20 0f 13 49 14 6b 1c 7e 7e f0 7f 46 c3 c8 a7 | 29 00 00 24 b6 31 50 b2 62 0a 0c a5 84 1e c9 a2 | 46 ca ef 1b e6 cb eb ac ff c5 bc 97 38 a0 03 27 | a9 d3 f3 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 1a db 9c b2 48 ab c3 a5 10 a0 92 | 4f ab 0c ca 65 44 1a df 00 00 00 1c 00 00 40 05 | bb 8d c4 d5 4d 85 e8 6e 74 d7 cb 48 b0 aa d9 93 | 1c 4b f0 10 | libevent_free: release ptr-libevent@0x7f498c033248 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7bcf8 | #173 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 a1 08 59 c3 18 fb f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | e1 a1 08 59 c3 18 fb f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.358131; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #174 | libevent_malloc: new ptr-libevent@0x7f498c033248 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 02 8e c2 8b ce 63 d0 fd 7c 79 9a 68 fd 2a cb | 9f 60 a4 17 e4 8f 3e ea 57 e0 4c 97 4c e3 e1 18 | 4c 5b a3 c1 b0 3a 69 39 80 d5 7a b7 34 8c 9a 13 | 3b 82 ed 7f c8 f0 53 15 2f be ba 2c f6 3f 93 bd | 67 eb 0b 90 35 ee e3 87 1c 89 b3 ef 9b f0 59 d6 | 16 44 04 64 00 95 fa c6 14 40 33 41 b8 15 03 ae | b9 8d 90 8a 3d 60 31 e1 d6 42 6a 3c 62 b4 14 a0 | d8 e7 b4 49 b4 5b c9 a6 a0 17 8c 35 91 bb 28 5c | 52 2c 68 73 67 23 e0 d4 2a f0 83 81 c4 92 0d 53 | 41 3f 2f c6 e5 30 2e 67 48 ad cd 58 7c 2b 31 1c | 25 c6 ee 9d e9 fb 07 b4 d1 dc 75 62 b7 d0 1d f6 | 9a 1a e5 72 6a c3 f7 0b 97 95 19 bf 48 d0 d0 33 | 94 09 3e 57 75 28 77 8f af f9 f2 8c 4e 9b c3 53 | 3e fc 5c a4 89 6b 66 c2 5c b9 41 da 4a f9 78 52 | 5c 81 2d cd fe 3a 73 ca 6e 43 19 f8 68 8b d9 ca | 4c ed 9d 02 81 f1 ae ca f0 af 04 70 bb 93 70 a0 | 29 00 00 24 28 58 19 4d 9d aa 4c 0f e9 13 a0 c2 | 8d 63 43 0d 22 b5 0d 87 a0 85 9f fa 5c 66 90 59 | 03 83 7b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 26 68 3a 07 63 fc cb 10 58 29 dc | 72 11 d7 66 b9 8d a9 06 00 00 00 1c 00 00 40 05 | 8c 4c 47 36 8b dd a7 10 2e 16 c9 50 54 38 01 17 | 5f a9 71 c3 | libevent_free: release ptr-libevent@0x55564d9c0ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #174 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 4d 73 b7 8c f1 08 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | e3 4d 73 b7 8c f1 08 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.41444; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #175 | libevent_malloc: new ptr-libevent@0x55564d9c0ef8 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 1a e0 30 5a dc e7 e0 41 75 64 1e a8 24 47 2f | a7 84 2b e2 5a 67 e7 c1 96 ec 30 c7 f7 f3 b9 78 | 6c 51 ad 0c 84 2e 7c 18 46 27 69 54 b2 c2 11 1c | 79 e0 9e 4e f2 a0 41 b0 63 99 4c 75 b1 d1 e6 a5 | 84 92 f7 5b 4f c1 b5 80 e9 53 a2 d7 81 83 83 1e | 5f 5e 3d 4d ae 62 f8 93 ec ab 10 a9 19 1f fd c0 | 85 f0 99 5a 0b c0 ec 85 24 b6 9e ee 85 b9 1a 2c | 9b 09 b4 94 81 24 24 63 77 f2 98 30 e8 52 9f 18 | b9 56 23 fe f3 22 35 64 49 9f 81 a5 91 5a e9 ef | 4d cc d1 f3 b8 12 5f f7 f3 ba 74 f5 5c 6e 7d 39 | 9c c2 e3 b3 0e 9b a9 ec 26 45 43 01 a8 e5 74 49 | 38 bc d8 94 0c cc 1f 3a 0e 6f c4 df 48 9d 16 32 | f8 53 eb 67 02 2f 6c a5 41 cf 73 2b 65 4e 16 99 | fe 13 45 82 b7 c4 60 40 72 a5 eb 55 68 3e 6b d7 | ea 64 ea 3f c8 4a d8 6f dd 88 61 a8 0d d5 d5 67 | b9 91 1b 91 1c 79 7b 87 2f 5f 28 2d 04 2d 9f 96 | 29 00 00 24 17 5e bb f4 fe fe 60 f4 db 3a d7 7f | 70 ab a5 bc df 15 bb 76 11 f9 7a 44 f5 65 a1 c8 | 05 2c d1 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 88 27 73 81 5a 9f b8 9c e4 f4 2b | 6c a4 2a 57 cc 92 b9 65 00 00 00 1c 00 00 40 05 | 7a 70 bd 39 43 ef 1a 96 4e 39 44 50 ba b6 8a 05 | 74 fb 56 36 | libevent_free: release ptr-libevent@0x7f49840331d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | #175 spent 0.0938 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 4f f2 99 fc 76 c9 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | f6 4f f2 99 fc 76 c9 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.474745; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #176 | libevent_malloc: new ptr-libevent@0x7f49840331d8 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 8a 7d d5 b4 4e 26 93 a3 69 f2 b4 25 43 b7 46 | 84 99 0b eb 78 90 34 24 4c cf b5 a6 a3 08 6a 47 | 9b 83 9c 10 55 d9 91 ef 86 cf 35 df a7 59 b5 d2 | ad 7b 1f d3 0d 0b 28 aa d7 90 a3 cc 45 34 32 a2 | d8 e0 c5 35 e0 47 57 25 54 cd 77 ab 91 88 7d 4c | a9 47 da 91 a4 42 8e c9 ae 8d c1 9d 2b c0 23 d6 | 9a 77 93 41 d0 2d c5 ac fd a4 7e 6f 41 e6 c1 1d | ac 61 2b 27 69 1b 97 21 d0 a7 c1 79 e9 66 95 ab | d1 db c3 ef 51 1a 52 f4 d3 de c5 11 d1 a3 5a 0d | e7 47 f1 fe f3 ab 3e fa 36 d1 52 88 3f 2e b9 f1 | 66 e2 62 26 18 87 7a 7c ea 90 72 1a 62 f2 59 08 | 16 a4 b7 1b fe 43 f9 ff 88 8b 1b cc ac 21 44 48 | df 06 b4 c3 ef 7a f9 0c c1 bc 7a b9 94 ec eb 2a | 0c 4b df 05 3e ab 62 32 17 3a d8 0d 8d d3 a7 87 | d3 64 32 59 d3 21 ec a2 03 d3 6d 49 cb 2e 83 91 | 93 29 09 8d 62 75 e1 e1 0e f8 dd 57 f0 06 b2 fd | 29 00 00 24 9a 1b ae 18 34 23 d7 27 ae 06 c8 a7 | 90 81 5b c4 db 56 6d f9 c6 29 78 69 c6 14 10 a8 | df 0a d8 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 2f 51 0e 5c a0 d7 8f ad 76 29 04 | 0f be a2 34 92 7b 8a 58 00 00 00 1c 00 00 40 05 | c0 de 2e e8 40 12 d5 d1 c6 a7 1d 95 9e 47 36 b4 | 7d 93 c6 56 | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #176 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 cd f5 1e aa e9 8e 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | 69 cd f5 1e aa e9 8e 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.536041; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #177 | libevent_malloc: new ptr-libevent@0x55564d9b6de8 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 0c 53 65 b8 2a 47 c9 86 38 76 0a 15 0b 94 2c | 68 39 98 15 e4 c9 79 9b 9f ab 63 24 ce a9 2a b0 | 7f 26 b1 07 f7 1a f5 86 7c 5a e8 91 cb 2e fe 6c | 74 21 bc 33 b3 c9 c7 eb 9d da 97 ab 9e d3 c8 d4 | be c8 08 10 9a b2 f9 af ca 87 38 d5 31 73 ed 1c | d5 2d ec bc 1c 55 a3 f9 97 ac 81 2b 64 f5 c0 26 | 05 3d 64 d8 f4 27 72 bc 53 fc 1c 9b 34 05 15 e8 | 4e ec 9b ab 5a 41 89 4f 16 a7 3e d8 a1 f1 7e d0 | 90 31 44 7e 35 a6 89 ac a5 ac 81 12 24 9a 47 08 | 9a 95 9a c0 ac 1a 33 67 f0 c0 e0 23 8d a6 11 50 | 30 9b c1 c2 3b 28 04 cd e1 c3 fd 56 c8 4d fc dd | 6e 11 64 a2 d8 63 b6 67 31 22 ee 15 9a 54 6d 89 | 02 5c 8c 80 90 da de d3 54 44 a2 42 04 38 a5 fa | 55 16 a6 2c 35 16 56 af 33 19 a1 97 e5 b9 ee 60 | be 5c a7 0c fc 54 a8 d5 fb fa 73 28 92 e0 52 46 | ea 9a 64 9c b6 26 0a 1c 01 2d 68 f1 4e ac 48 4f | 29 00 00 24 d5 aa bc f6 80 e4 eb e9 21 6f 4b ee | ee fa fd eb f8 12 f8 62 20 01 c9 b7 84 6a b5 9f | a8 1e 6e 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 f8 65 79 13 ac 74 bb c8 c9 73 3f | 20 ab 31 cc 27 ae 97 e4 00 00 00 1c 00 00 40 05 | a5 e6 b8 3e 90 b1 43 43 54 6f bb 41 60 79 47 e3 | 89 0c f2 5b | libevent_free: release ptr-libevent@0x7f49b000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #177 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e1 84 ca ff cb 19 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | b9 e1 84 ca ff cb 19 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.626422; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006117 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #178 | libevent_malloc: new ptr-libevent@0x7f49b000cd68 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb dd dd b9 f3 44 84 2a 3b 7d fb 87 19 8c e0 fb | 9b 2a 87 37 c1 0e a9 30 ee fb de a4 1f 21 a5 a8 | be b0 56 c0 e5 e8 1d 78 77 b8 8c 72 a8 8d 11 2f | c4 cc 0f ad ec 05 93 45 1a a5 ca 0f 40 30 6e 7c | a2 d7 13 1e 0f ef f3 38 1d 96 ee 16 28 5a cb a1 | 1a cf f5 60 e4 63 6e 06 23 a9 40 3c b6 cf e5 c8 | 40 d4 58 d1 77 c6 b9 7a b8 2b 7f 68 a5 9e f9 49 | 83 a5 60 da 80 5d f7 fe 2b 9e 4f d4 67 f4 6b 86 | 94 e0 25 8b 66 b2 b8 1e 37 fb bc bc 6e a8 b7 86 | 11 70 ba 24 8d 51 58 24 49 cb 22 b2 26 62 5b cb | 0d 4d fb 5b 7f 0e 12 74 33 07 f2 85 42 74 9f c7 | 80 80 62 80 54 ba 69 77 ae 25 11 c0 1d 36 eb 87 | 2f 66 d8 2f 76 b9 b0 a9 66 e8 24 6d 05 12 3c 33 | 8d 61 48 d9 d3 39 8f f5 8c 86 0d 21 4c 3b e1 a6 | 0d e6 6a 73 53 12 1c 12 1e e6 bc 09 c9 b8 99 ec | ed e9 ec d2 bc 5a 5d 8c ce 9e e7 53 92 10 6b fe | 29 00 00 24 89 95 4e ef ed 7c 0e 2b ce e0 1c 48 | 3c 65 7d 12 cd 41 d1 fe b1 e9 e8 bd 42 e8 5a 77 | cb cd 76 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 05 b1 83 38 3b fa 85 bf 5b 0c ec | 72 a4 76 57 a2 cf b8 d0 00 00 00 1c 00 00 40 05 | a1 1a f1 c6 d3 b4 12 f9 7c c6 cd 0f 91 8b d3 60 | b4 81 96 2d | libevent_free: release ptr-libevent@0x55564da61c08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #178 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 b7 b2 e6 20 36 41 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | 54 b7 b2 e6 20 36 41 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.716862; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005447 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #179 | libevent_malloc: new ptr-libevent@0x55564da61c08 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 ee 41 1f b6 98 78 7c 69 d4 cf f4 45 6c c1 e0 | 24 94 82 ca 03 56 87 22 5f 81 90 eb a0 94 0f d9 | b2 e2 7d e4 f3 a5 e6 1e 1c 61 72 64 00 e8 4e b6 | 2e 63 c4 3d ad 54 f4 b3 f1 1d e8 14 c3 19 37 10 | 2e 76 0c 22 aa 6a bb 06 5f 4d 3f 73 d1 b1 0b ef | 5b 8b 5b 82 d6 9c 85 0e fb f7 86 a9 d4 22 5c 93 | 85 77 cd e8 f6 e5 f7 1e 18 86 b2 f0 17 95 f8 03 | 87 6b b6 9e 87 c8 4c 47 3c f8 a3 56 67 c8 4f 32 | 69 9c 2d 5d f3 de e1 21 87 64 64 ba 7d e6 46 af | ae fc af 28 dd a0 82 6c a3 be 9b a9 a9 8c 35 da | be d5 7e 7b 7b cf 20 3a bc ec 66 75 f9 00 7a 48 | c9 08 ca e0 26 94 dd c1 f2 80 1f a9 10 f8 8e c4 | cd d3 34 47 44 a4 82 08 f7 93 ce df 15 65 9e 0e | 9c a5 58 d0 93 15 57 e5 66 54 9c 70 45 d1 22 82 | 12 d9 c3 ad 7e cc cb dd 84 90 2d fd 56 86 be f6 | f0 76 50 e6 c8 f3 15 5d f6 21 f0 e4 64 7f b5 27 | 29 00 00 24 f3 24 24 e7 cd 69 6d 76 77 47 15 89 | 8b e5 70 05 f2 75 5a 7a 78 96 8c 94 39 9b 59 dc | 8c de dc e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 77 31 f8 2f 79 d6 eb 42 cf 80 94 | 4a 4a 34 b1 e9 e0 9b 07 00 00 00 1c 00 00 40 05 | d8 20 95 cb 77 00 fc eb ec c9 9e 37 80 b5 1b f8 | 0e 48 b5 a4 | libevent_free: release ptr-libevent@0x7f496c038d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #179 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 74 50 64 6b 9b 10 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | bb 74 50 64 6b 9b 10 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da875f8 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.800191; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #180 | libevent_malloc: new ptr-libevent@0x7f496c038d28 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 60 a6 f4 96 c5 0d ed 6e f9 25 0b cb 14 fb f9 | 77 97 5b 09 0f 78 0f bb 9c d0 07 ab 2f a8 8d b5 | 8b 2b 90 63 aa f0 39 20 44 d0 35 96 74 7b 34 f8 | 8b f3 95 61 e6 d9 e7 81 ec 0b 93 85 f6 6f 26 70 | 9d aa 57 b3 81 95 d1 a8 dc 35 1f 15 21 c3 a6 46 | 33 8a fc e5 c2 3b 82 8c 4b 6a 7c d9 78 a0 f9 63 | 72 43 e6 6b f0 7d 8e 67 ed 7a 8c 84 66 56 e0 82 | bb ca c9 bd 02 df 17 65 5e 90 7a 63 e9 a7 b6 1f | 42 e6 fb 81 00 9d 1d 3d 2d 5a ee 1c dd 4f 0d 1b | fa 5c 7e b4 23 f0 a8 08 d0 48 99 8f f7 15 1c f5 | 10 68 83 d7 6d e4 08 a7 5d d5 9a de a0 b0 66 5c | 9b 8d 42 e7 69 e3 6c 58 74 65 68 3b c3 ca 3d 39 | d3 0a e5 7d 03 27 80 14 1b da 3e 03 17 77 33 3a | b7 47 ba 39 42 83 7e e4 b7 22 6c 63 be 3c 1a 09 | 53 9c c6 5f 0b 9f 54 28 76 6e 8a 96 37 db 5e 01 | 30 79 05 f6 b2 ac a3 bb 2a db 35 a1 ee a6 f4 1b | 29 00 00 24 fa 0a eb d8 10 ac 8c 52 7e 79 33 1a | 65 2d 04 93 cd 97 32 e4 fa 97 aa d3 6c 01 9e d8 | 8f 41 32 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c db 7b 15 7f bb fb 41 25 fc 5a 8d | 14 b8 24 fb a5 c2 3d ea 00 00 00 1c 00 00 40 05 | 35 5b 45 d1 b3 53 bf 6a a7 0e bd df f3 6d ad 09 | 14 24 33 57 | libevent_free: release ptr-libevent@0x55564da43628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da875f8 | #180 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 0e d7 8c c6 58 48 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | e1 0e d7 8c c6 58 48 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.860572; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #181 | libevent_malloc: new ptr-libevent@0x55564da43628 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 a0 4d 06 a4 ed 50 03 ee 58 f2 0e 74 2f 8b 7f | 6d ff 7f 69 4c 69 d6 f1 1d bd 04 48 8b b1 0c f7 | 37 13 0b 44 d9 97 16 c5 bf 58 7c c0 8e 7d 54 b4 | 2d 10 03 22 93 9d d7 8a 11 46 aa 23 8d 68 88 00 | 9e 8c 6c 55 3f 9c e9 a0 a4 95 d7 c8 1b e7 59 a3 | 1f 00 ca 21 8d d6 5d f6 9f cb 6b 2e f1 61 f0 6a | 0a 0c a9 a4 cb 7d d6 33 29 a3 d5 66 2d 5c 01 d1 | e2 4e b7 4c 32 ec 03 2a 1f 3e 43 e9 7f 1b 6e 0e | 51 b5 48 25 1b 59 22 33 61 63 6a 45 df 89 49 32 | 57 28 40 3d 49 3e 85 9e 79 29 2f ed f5 b6 a2 6a | 87 0c 5d 2e f3 a7 da 86 fc d1 37 61 24 ec 78 09 | ec 1c 11 bc 51 c2 73 dd bd a8 ac 5a 4e cd a6 d7 | 58 f3 8d 4a b3 ea 1a 52 d9 0a 21 80 97 67 d1 f2 | f0 15 a9 07 de 33 65 36 e7 ab af 9b 26 84 85 d9 | 39 5b e6 c3 ec 79 d7 f4 74 54 9c a2 a0 14 fb b4 | 81 b3 f8 20 7e 12 59 ec a5 bc 32 1e 68 f3 a3 98 | 29 00 00 24 08 79 4a 4d e0 96 bc 82 b9 91 2a 8d | 45 37 ec 23 79 9c c9 a4 41 e0 43 8e 12 6f a0 d6 | 18 d4 62 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 c2 80 5d 3f a0 69 eb 59 46 fd 15 | e1 72 a4 a2 da ef 43 8e 00 00 00 1c 00 00 40 05 | 1c 0e 3a 8e 6b e0 26 7a 80 13 b6 79 6a 63 e3 aa | af 9f 8b 2b | libevent_free: release ptr-libevent@0x55564d9bf7e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | #181 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 bf c5 ed 2a b1 4e a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 66 bf c5 ed 2a b1 4e a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.923918; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #182 | libevent_malloc: new ptr-libevent@0x55564d9bf7e8 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc bd 6c b5 c3 f0 fa 6b f9 6e 53 b9 45 c0 75 3c | 64 e3 fe c8 ad 20 c0 b7 83 c4 53 46 9e c5 13 c6 | a7 68 a3 95 78 a0 ec 20 d3 aa 66 e4 c5 b8 74 6f | d1 24 45 72 a5 26 36 57 18 dd 81 95 d5 9a 27 f5 | 4f 08 37 20 64 33 d1 48 db 2d 75 79 33 62 6e 3d | f2 31 ef 37 d6 62 6b fc 82 68 cf 4b d5 03 f3 69 | 58 df 12 0e 4e 6d fd 22 24 90 b9 94 3f ed ae a1 | 27 1d 25 bd 27 b9 2e c8 ad 02 b5 d6 fa 5e b1 50 | d3 f6 fe a9 78 91 0d a4 a7 3f bb f7 fb e2 79 1b | f4 5d ec 9d 9f 32 1f 01 b0 b4 b5 08 16 7b 76 af | 60 76 07 d8 33 5c da 7c cb db d1 0b a5 00 1a 0d | ac ab 11 26 00 a0 ef e7 ee 50 a6 ee a3 0e 03 c1 | 68 ba ec e5 f4 bc 1f 85 4a e2 35 ac e3 2e 2a 75 | 4f 11 90 9b 1b 6d 1d fd 8c e3 a7 6e d7 0e 93 cc | 1b e6 44 80 77 43 c3 78 ea 76 0f 1d be 9f 8c d3 | 2d 95 5e 0c 21 54 66 b9 55 27 35 95 d8 bb 2e 04 | 29 00 00 24 9f 82 cb 6b b0 d8 00 51 48 ee 87 a9 | 0b 7f be 8b 8e 67 5a ff 54 ff 2a 9c b2 cd 56 a7 | df 35 1e a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 28 cf 11 91 76 d3 49 e6 a7 ad fd | b4 16 0c 7f 1a dd 6f 2d 00 00 00 1c 00 00 40 05 | a6 38 21 3e 07 17 e8 6f f3 5a f8 e9 57 98 c9 1f | 10 67 f6 63 | libevent_free: release ptr-libevent@0x55564da802a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #182 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 9c 08 86 15 91 ad a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 2d 9c 08 86 15 91 ad a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10619.9814; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #183 | libevent_malloc: new ptr-libevent@0x55564da802a8 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 58 c9 9b 05 0f f0 62 f1 3d 24 43 30 dc ed 60 | 8a ed 9a f6 40 0b d1 45 73 c4 43 af 42 51 90 cb | 98 b4 44 27 40 a0 d2 f2 0b 22 72 1c a8 f7 d0 0c | a4 f6 f8 60 33 3e c8 a8 81 2c 34 5c 84 ab eb 19 | af b0 13 7c f1 95 7c 9b 9f b1 62 88 8d 1f 64 c6 | 6b a5 9b fa 9f e5 b8 cd 1d 82 91 52 c1 40 7f cb | 1f 8a 18 dc a3 c3 7a 28 a9 46 2e 47 7e 62 2d 16 | 2d e6 c4 5c b5 78 fc 87 cd 64 6d 33 45 66 17 23 | 11 d2 d9 91 e0 7b 55 a1 86 5c b9 a9 f0 42 01 4a | 64 a6 1b 40 3d e5 5e bf ca fa 59 83 9a 8c 06 f0 | e5 fb d6 69 3f 00 5e 87 47 58 8b 69 f5 5b c9 cb | eb ad 49 4b d7 0e 22 6a d4 bb e5 c3 05 f4 50 78 | 4b d6 d2 2e b9 7a e8 1e da bf 12 1a 3f c4 55 b8 | 58 6c 38 e1 ad 66 4c 24 4c 22 67 cf 1d 70 2e 5d | 25 15 2d 52 ed d1 fc a3 bd 19 66 c0 e5 c5 56 bb | 30 c3 05 67 2f 0b 84 70 68 17 27 de 58 24 bb 81 | 29 00 00 24 7b e1 ed 89 3a 9b 11 71 02 9b 0a 14 | 0d 9e d9 d9 a3 1a 08 c9 47 ee a3 2f ad 3c 4b ae | b6 7a 6b 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 3e df bb 2a 29 a7 eb 0d cd 0e 21 | dc d9 c2 0d 76 1d 2a 53 00 00 00 1c 00 00 40 05 | c6 fa 9b 44 dc 5e 0f 6a ae 99 68 5b 88 59 d1 87 | 17 6b 27 2a | libevent_free: release ptr-libevent@0x55564da819b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #183 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 90 a3 5d 25 cb 5d 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | 55 90 a3 5d 25 cb 5d 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.038797; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #184 | libevent_malloc: new ptr-libevent@0x55564da819b8 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 24 4f 9b f7 67 66 96 fd 1a 14 4d e7 e2 c7 ac | 00 16 72 11 42 cf 74 92 39 d0 35 cc cb 20 57 d9 | 1a bb 50 6a a9 7a a3 6f cb 50 88 9c e9 3d d9 bd | 7a 2d d1 99 62 b9 31 7e c0 d0 a6 bf 29 32 c9 b9 | 86 ad ca 60 81 f0 16 d9 14 66 b1 43 60 2c 29 aa | 95 66 65 67 3d e3 b0 54 92 c7 a0 66 bc 6d cb 5d | be d9 ee 81 e8 34 b3 e9 68 b9 03 31 0b 02 69 a2 | db a6 f8 fb 48 06 e5 4b d1 02 ed f8 2e b1 89 86 | 29 9c f7 7d 0f 9d 36 98 48 db 49 5d fb eb 89 35 | fb a1 ab e0 bb a3 7b 92 99 49 2d 00 de 97 18 42 | 56 2d 64 51 a0 8f 9e b7 c2 cd 8f d3 ee de bf 54 | 98 ac a8 e4 2e 07 12 cf e2 fa 78 99 88 da 88 2c | 30 ed 34 83 03 db e5 7f ba 36 99 7d d2 e3 2c 8a | a2 41 71 30 b3 7c 9d 89 ff 8b 7e 37 96 b2 ca ed | 23 a5 e6 bc 03 82 d9 11 81 d3 aa 83 09 ae d7 ec | 63 a5 a6 a4 b8 0c af ea 13 c8 26 01 c1 0a 52 91 | 29 00 00 24 ae 9a a2 a8 b7 48 c3 4a eb 0d e9 8f | 88 e9 43 6f 94 c4 77 72 84 f2 7b 74 13 6b 41 62 | e9 02 d7 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 2f df c9 ae ab 38 f7 6f d1 30 ab | ee 5b 39 46 c3 7e 02 55 00 00 00 1c 00 00 40 05 | 9e 5f ab d0 37 72 28 84 3f 2b f1 85 d6 93 da ee | 51 45 87 cd | libevent_free: release ptr-libevent@0x55564dad73e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #184 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd ad be 7e 63 6a 2d fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | dd ad be 7e 63 6a 2d fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.097774; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #185 | libevent_malloc: new ptr-libevent@0x55564dad73e8 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 55 cc 33 77 3e a7 22 34 88 b5 86 ef ae 39 c2 | 42 6a c0 b4 22 d3 67 09 10 15 15 e0 2e 9f 75 33 | fa af 6a ef 04 f3 c3 f1 a2 ff d4 1b 32 a0 80 f4 | 17 00 b4 10 68 6e b1 7c 16 ba e3 d1 ea ec eb 74 | 6b 92 b2 bf 6a 80 90 45 43 3b 12 94 9a 90 93 94 | e3 e2 35 d4 ef 47 90 99 04 77 79 73 2d 7d c5 7b | b4 d4 c2 90 b1 8e a9 a4 5d dd 39 a6 c6 2b 9a 83 | 6b 58 99 12 c2 15 c2 bb 4f dd 8c 62 e4 1f e4 23 | 5b a3 c0 8c dc bb a4 14 88 81 8e 65 7f b6 89 42 | 58 9f 77 3c 1d 69 62 df 15 a2 49 cd ae c6 9c 70 | 4b 37 a0 cf 64 47 3c 39 fc 84 fe af 1f a6 8d 0b | 4d 59 71 36 e0 6c 69 ef cc df c8 7b b6 b9 48 d4 | 85 2c db 5f 20 fb df 44 ba 46 b5 89 4f c5 e8 17 | 32 53 5b 3b 7b e3 06 39 d5 6e 15 6c ee 95 2b 6f | 81 e8 8c c2 f0 34 34 97 59 c2 4e f4 0e ad 35 59 | 56 a9 e1 b6 24 41 02 08 c8 fe 93 b7 c3 96 5e b5 | 29 00 00 24 86 d5 59 30 12 8f 98 52 d6 f3 9b f4 | f5 03 44 38 90 15 fe 9e 54 6b be 2d cf e3 84 da | a0 d0 29 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 d0 e3 5e 32 0a d5 e2 0f 37 f7 b2 | 13 fc df 0f 1c a0 23 65 00 00 00 1c 00 00 40 05 | 9d 8f 36 d7 53 6a 72 24 a7 c3 e0 83 35 0f 8e c9 | ad 63 ca 64 | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #185 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 8a 26 75 2a fb b8 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | a3 8a 26 75 2a fb b8 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.172142; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #186 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 50 d3 46 6a 09 0f 79 64 ed f0 c4 86 50 9b e8 | 42 e7 1f f8 84 53 0b 93 17 01 f4 b2 a2 33 66 f3 | c8 23 18 3b 34 3b ea 7f 03 96 9c 13 8b 79 0e 81 | b8 53 ca d1 3a a5 50 36 15 b7 89 25 af c3 0d f8 | 5a 75 d7 e1 be f9 8b 3d 5a 9d 54 29 3f a2 b4 54 | 06 50 84 06 d9 42 e2 c9 32 74 55 9c f2 4e 23 ec | e7 43 15 9c 9f 64 39 54 15 ab f2 18 8b e2 23 d7 | 7a c6 68 63 f9 fd d7 4c d1 bf 35 71 7d ff 24 a4 | 56 13 91 97 ca 71 82 44 7b 64 7d dc a6 52 fa d5 | ca bd af 72 91 08 41 16 40 42 7c 9f 5f ca 55 af | 94 53 38 b9 03 86 88 95 f6 3a 77 b0 27 35 fa 9d | 9a 76 20 3b cb c6 73 dd 41 9e d2 da 09 46 42 b1 | c4 e6 94 ae 41 39 6b 67 f6 fa 64 7b db 97 fb de | eb cb 7d 2e d0 e8 a4 1e c3 76 0e 2c 52 af 48 61 | 7d c3 a7 eb fc ad a1 b1 3b 89 95 13 ac 9b e0 5d | 13 6a 1d e5 7b 0e 85 de a4 34 78 72 12 31 31 6d | 29 00 00 24 25 48 e6 04 55 a3 20 09 7d 82 a5 1a | 7a 2b 08 b5 15 96 8a 14 cb b5 10 d3 6d 86 63 54 | a9 6f 41 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 89 be e4 aa 7c c5 62 b1 8a 82 8a | 23 7f b2 99 ba 42 36 2e 00 00 00 1c 00 00 40 05 | 6b ed e5 79 2b 01 96 a9 9d 17 92 f1 9a 11 3e 8b | 9b 52 0f 77 | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #186 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 62 93 8a ad 73 65 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | c2 62 93 8a ad 73 65 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.266543; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #187 | libevent_malloc: new ptr-libevent@0x7f49b8025658 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 e9 0b 10 33 54 4b 21 be 6b 7c eb a8 45 2e a6 | 7b bc e6 0c 80 01 bd ab 53 0b 4e 2a 04 3c 80 cb | cb 91 9c d4 c6 98 b4 6e e5 5d 24 0d f7 e0 38 2c | 7d 9d 83 55 cf 27 a0 0e ff 44 64 7d 55 db c9 9c | c8 52 65 de f3 3d 57 7c 30 81 95 1f 16 68 2b 84 | e2 5d 71 22 25 d6 7a 51 4a 3e b3 3a 2e 18 d5 4c | 88 d1 19 38 9b 85 8a 4d 1b cc e0 05 6c b3 1c 28 | 62 2f bd a3 0c 33 f2 54 a3 db 3a 4e 17 c7 be c0 | 72 5a ee 5e 65 ab 76 5e ef 94 b2 fd 9a 85 0b 59 | c3 f3 3a b1 36 b0 a9 84 7f 69 3f 8b 8e cf 6b 85 | 7e fd fe c2 f7 5e ec 1f eb 7c f3 ed bd 82 09 80 | f0 6a 58 70 d6 63 0d 01 8b 38 de b1 17 03 4c fa | 62 3f a0 7e 41 3d 4b 67 c3 6a 66 6b 83 e4 14 c5 | 2f 4c 6f 8c 71 b3 29 b4 55 19 69 59 3f b8 79 63 | 0a 46 a7 b9 7f 81 ed 16 7a 82 27 30 f2 61 72 c4 | 9f 78 96 b9 5e 5d fb e2 c7 35 a8 ad 42 96 c0 80 | 29 00 00 24 45 b9 0c 50 c7 d4 92 a2 56 46 19 26 | f7 79 a8 01 be 7b 4d fd dc 05 bf 0e 40 a1 db 48 | 28 e4 f7 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 58 4b 7b ad cf d1 8f 9d b5 3d a3 | 91 f3 74 86 65 e9 17 d3 00 00 00 1c 00 00 40 05 | 5f 28 cd 6f b6 84 88 be 5c 01 54 c9 08 d5 ad c2 | 03 88 96 6a | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #187 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 4f 25 e9 7b 68 72 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | a8 4f 25 e9 7b 68 72 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0792 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.324949; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #188 | libevent_malloc: new ptr-libevent@0x55564da54bf8 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 0f d2 0e d9 a3 96 9d 64 02 f6 37 7f 40 49 ba | ad ff 3d c2 a7 47 37 84 07 85 ff 0f 10 a6 6d e8 | 81 e8 b9 93 08 dc d9 3d 8e c9 b2 e1 60 95 5e fb | 5a 0d b8 cc c0 b8 c6 d9 67 a5 64 cb f3 0b 39 69 | 05 5c cc 6e f4 2b 96 7a c9 57 5b f4 3e db 77 f4 | 2e 50 85 4f 6b be 49 5e ae 89 ec 43 12 2a 3d 7a | 63 d0 86 71 44 87 5f 36 5d 2a 6b 6a ed f5 29 dc | 34 94 7e e1 e7 57 1a 9f 8f cd fc 0c 7e 8e 83 e5 | e6 f9 b9 d7 90 94 04 39 84 9b 1b 4e 98 9f f9 09 | 57 ea 83 0a 42 78 f6 94 6c bd b2 90 af 0d 5f 5e | 1f b4 ca 51 25 d9 a4 df 7d 35 25 a1 d9 c1 8d b6 | 6a 2b f3 11 b0 f2 a7 8c b9 a5 3e ed eb 17 76 32 | ce 77 42 9d 11 d7 d0 75 65 e2 73 ee 07 22 dd 4b | 91 7a d3 d2 73 19 0c 76 78 cf 40 57 a1 a6 11 71 | 86 5b c3 93 5b ca 3d e2 c5 7e 7f 75 d8 f9 5e e5 | 4c dd e3 a9 d3 8b a9 d8 11 2c 70 c1 b6 4b 9d 94 | 29 00 00 24 46 1c 1b 10 72 5f 67 2c ce df 6a b8 | 2b 8e c4 b8 e2 38 26 c4 c8 32 da 6a 9b 72 4d de | 0b ae db 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 f5 e7 30 a1 01 ff f3 2a 96 96 9c | 97 88 c8 ec 29 77 97 f5 00 00 00 1c 00 00 40 05 | f3 de 53 27 41 7f ee 5d 4e 6e a2 06 09 bd 85 26 | 40 b1 8b b7 | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #188 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 87 a7 77 73 72 0b 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | cb 87 a7 77 73 72 0b 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.384317; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #189 | libevent_malloc: new ptr-libevent@0x55564d9f8018 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 88 8d 78 99 3e 3a d3 14 08 84 59 b4 2c 16 3c | f7 a0 16 46 36 37 cb 02 86 b3 7d c8 44 60 8d 66 | ea 37 4a b0 b8 f8 e6 fc 00 ea 5f 19 0d aa 5b 72 | 43 b5 54 b2 d4 ea a7 d0 9e 1e 11 e1 60 05 bf 12 | ec 43 f2 67 e8 f5 2a 36 f4 07 28 ea ea ff 36 71 | 46 4e dc 10 69 b4 24 bc 81 4d ac 6b fb c1 7a aa | 25 51 92 8f b0 88 19 27 60 2e 96 0e 7f 13 cb 37 | 2b 30 3e 19 cc b6 5c 06 88 cd b5 0f e0 19 4a 5f | f3 ef 75 b0 63 6a 7c 8e aa de 48 ba 69 8a f8 b6 | 10 08 69 2d 51 82 78 a1 89 67 bc 26 32 16 c3 dc | a8 56 ff 65 4b fa 31 46 4a 05 6f 3b 20 a7 fa 7c | f5 a8 52 82 59 96 23 e4 59 0f 7a 20 07 26 ae d4 | 2e 08 d1 20 6a 4f 30 36 d9 8e 69 a5 5d 9f a2 31 | 4e cd 95 39 1c 71 31 c3 b2 98 c8 b7 c2 4d b1 70 | 2e 2d 59 d3 08 1e f0 6d cd 99 a1 aa 19 9e 4a 31 | b6 b4 7d 46 a4 4e 96 c6 ca 0c de cf 22 22 70 c0 | 29 00 00 24 f1 04 11 a9 b3 aa 2e ee 95 0c 60 0c | 16 3d f3 6a 99 49 84 2a 3d c8 b6 98 97 de cc ec | d1 3a 19 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 77 a9 f2 78 39 d9 9b 30 8b 69 b5 | 67 12 43 91 d9 b2 43 df 00 00 00 1c 00 00 40 05 | 5a 6e f5 e9 62 b2 18 a6 aa 5a a3 ea ab 7d 01 cf | 85 0d c4 8b | libevent_free: release ptr-libevent@0x7f497402dc58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #189 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 9b d7 a0 bd c6 05 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 03 9b d7 a0 bd c6 05 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da92e98 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.44462; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #190 | libevent_malloc: new ptr-libevent@0x7f497402dc58 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 53 c2 01 d0 65 b1 ee 5c 12 5e 27 40 5e 92 09 | e0 e2 5b 38 c0 b6 a9 cf 28 c0 9b c7 f8 95 bd e6 | 53 f4 a2 b6 8f db 53 c8 8d bf 85 4a da 65 67 41 | d9 8e 6e 05 d1 4b f2 bc 9d 4a db 17 2e b4 aa 0c | c5 2d 63 8e 3b 84 fc 5e eb 94 26 e4 75 bd 8c 6b | 91 a7 7f e9 5d 06 34 ae 86 b5 1c 59 5d ef 2e a4 | 9c db da 1c 91 84 73 92 6f 1b c1 e1 70 e5 a7 5f | 0e 07 a3 cf af 4e 3f 82 ae 51 b4 9d 94 78 05 bb | 17 e1 bd 80 77 cb 6e ae 53 fb 03 fd 8d 42 cd 26 | 51 8c 52 43 6c f5 e8 da 55 f0 1f 2e d3 5c e7 76 | cf 60 ec 7b ac 9a 1f 4e b4 0a 30 e3 c7 d4 02 f4 | 34 64 21 e9 41 2c 34 a3 0a 97 c7 f8 4c ac 5e ba | 2e c9 cc 34 a4 4f e6 58 72 b7 9e 90 b1 dc ac 6f | 86 58 8b fc d5 6e 38 39 a4 9b 23 fb f1 b0 34 42 | a8 85 33 fc 0b aa 7f b1 d3 73 35 3a 28 80 51 d0 | c5 54 89 75 23 3a 59 c7 92 67 83 9a 92 61 70 f6 | 29 00 00 24 30 73 92 10 0a 58 17 12 ed 7d ef b0 | ae a7 ff 00 12 5c 9c e1 bc 24 21 a1 2e 59 41 cc | 34 41 e4 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 32 2e 31 27 51 44 ba ce a4 f7 9f | d5 5c 7a 58 d2 e5 8a 4b 00 00 00 1c 00 00 40 05 | c3 8b 58 12 98 a8 a8 98 ad ee 1e fa 9f e8 8f 0f | 9a 96 0e ff | libevent_free: release ptr-libevent@0x7f499c038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da92e98 | #190 spent 0.201 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 7a e0 c1 90 9b 3a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | 07 7a e0 c1 90 9b 3a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da95d68 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.503059; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #191 | libevent_malloc: new ptr-libevent@0x7f499c038c28 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 95 11 3f fa 3a e2 d5 6b b7 8e 46 74 56 12 92 | 0b b9 ab fe 80 36 97 bf 28 db ef 9b be 1b e1 95 | a2 83 f5 b3 be de a9 7a cd 8b ef 85 99 7b 64 42 | 86 63 f1 d4 85 78 2a 99 1d 87 10 02 bd 60 ad d0 | e8 6c 35 0f 87 39 47 73 13 0b a9 1e f5 a4 d5 12 | c1 85 18 06 50 2f b1 0c b3 29 41 97 ac 98 4f 06 | 2e 67 1a 59 0e bc 74 60 14 93 90 d3 fd fe fb ea | e9 1e b8 33 74 c9 5e 1d fb 79 0d fd 9d 8e 18 28 | ea 53 4f 76 5c e5 6b df 9f 5f f6 6d 42 3c 73 70 | 44 ce 8a ba 5c 17 c6 ae c9 d6 43 5c 7d 8a 87 bd | f0 ea 1e 39 d6 65 69 89 e1 a9 4f 7f b5 ac 9c be | 4d 2d f9 10 83 55 82 ce da 2d c4 58 77 fa 1f 25 | 22 43 2d 06 6c 1b 0a e3 cc c4 a8 a9 f2 a0 db e1 | 8a fa 33 aa 4e 4d 9e f1 e8 95 34 2c 43 33 c3 29 | 66 eb 78 72 25 c8 74 21 a0 04 75 25 2d 5f b5 44 | 29 25 52 71 53 13 ab a2 36 fd 30 a2 4b 62 b9 1d | 29 00 00 24 4f d7 0c cc 18 6d 35 18 b2 d5 f4 a3 | 78 1b c4 dd f2 35 6f 26 7e 14 6c de 38 ce fb 3a | f6 04 ee ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb 33 d7 19 a6 4d 6f 6f 39 71 97 74 | a1 9b 42 a6 98 30 d7 b0 00 00 00 1c 00 00 40 05 | cd 29 99 b6 b3 41 9b f5 ab 96 83 33 06 07 7c 00 | 06 06 34 bd | libevent_free: release ptr-libevent@0x7f49a0038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da95d68 | #191 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b9 d5 67 2a f6 40 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 43 b9 d5 67 2a f6 40 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.576349; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da95d68 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #192 | libevent_malloc: new ptr-libevent@0x7f49a0038b68 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 58 bb ae 3b 7e b2 b5 a5 c5 cb f9 34 d9 44 85 | fb a9 f7 16 3b ff 5e b6 4c b5 f4 09 aa 68 44 f9 | 98 35 91 3b 2b 7c be f5 41 17 3e 32 00 fc ef d9 | 25 1e 38 51 0d 68 07 df a0 1f ed b5 96 ae b3 df | af 76 54 45 eb b7 ea 3e 45 d0 f2 e4 34 d3 0a 34 | c9 bd 51 7f 35 b9 fc 5f 32 99 2f 94 d9 cc fb db | 2b f1 88 20 56 26 df 19 aa 33 70 6c a2 55 51 e5 | ea 1f 79 fe 4d 78 f1 7b ed ce 50 7a 34 de a9 35 | 09 37 9c 94 fc 0b 30 22 82 f6 e8 0e 42 db e4 6a | f9 23 d3 40 09 d8 c2 2f 61 b4 64 ee 42 9c f1 39 | cd 8e e7 47 d1 78 59 61 1f c6 7e 25 d0 91 18 6e | 7c f7 27 1a 53 59 dd 06 ee c0 4f b8 05 5f e7 57 | 09 55 92 90 e4 cf 92 d3 ec 0e 10 f8 2e 70 68 71 | 73 29 cf 93 16 fd 6c dd 1c 1b 35 68 e7 50 1b 8d | fb 25 cc 99 83 34 f4 49 98 f8 bf 35 8d 9e 30 d7 | c6 39 5a 79 c4 7a 5b 40 de 43 05 af e1 36 94 40 | 29 00 00 24 f1 79 83 47 d7 2a 60 30 8c a3 cc c3 | 1c cf 8e b5 a8 dc 3c 29 27 69 9e 1e f0 76 f9 bc | f3 8d dd 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be fd e7 d3 2b 6f 58 ed 38 ea ca 69 | 6d 86 16 ac 43 07 48 99 00 00 00 1c 00 00 40 05 | d5 22 0b 27 af fe 9d a6 39 5d 9b 5a 2f 89 ab 28 | ee 3e d4 45 | libevent_free: release ptr-libevent@0x7f4994038cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #192 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 23 46 b6 9d 6a cc 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | ab 23 46 b6 9d 6a cc 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.637751; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #193 | libevent_malloc: new ptr-libevent@0x7f4994038cd8 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 83 f6 ab 60 39 5a 1d ed 21 4e a3 21 bf 70 3c | 5f e0 3e 29 d2 6d c6 49 2f ec 46 6e c3 9c f6 f9 | a6 45 f9 2e 0f 25 0a 07 cf 07 66 f3 65 61 e7 9c | ca 56 a8 39 ff ae 24 2f 40 c2 6c 75 0b 4e 6d 31 | 33 3f 7d 10 a2 a4 f3 80 46 71 2e 25 49 52 90 00 | df ef 75 32 b2 a3 57 67 e4 cb 72 8a a5 46 d4 47 | eb fe 55 e0 e1 6b 24 cf c0 2c e9 6e dc 24 4f 62 | a5 d9 9e 40 cf de bf d1 bd e4 91 f0 25 8b eb 7b | 18 07 0c 82 5a d5 05 e8 2d 4f 8e b1 06 6c b9 38 | 53 f4 3b b1 d0 91 1e 3b 05 07 85 24 be 23 7b 80 | 59 ab 5e 1f 34 74 2d f7 7c 07 e0 68 e5 6d b0 76 | 09 d0 ff 51 33 34 00 f5 02 ca b6 18 18 33 da 4e | d3 03 34 3d ef 3a 34 46 4c f9 8d 39 c1 63 38 1e | 73 2e c7 c9 c8 78 2c 5f e0 71 95 09 c5 8d ea 02 | f8 f7 3b 05 0a cf 9a cd 53 27 df 44 ca b7 88 cf | 29 ae 8e 3d 60 9d c3 cf a6 08 03 9c a3 b0 34 d1 | 29 00 00 24 3d 23 28 4e e3 b0 27 0a 79 f9 19 47 | d2 6e 82 2d 36 33 5f 41 87 e0 4c dd 61 35 16 6d | 3d 7d 0d 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 fa 77 82 1a ce e3 4b 60 8a 9f 59 | de e2 d3 ba 0f 18 bd a5 00 00 00 1c 00 00 40 05 | 5e 0d 3a d3 ac 01 2c f4 40 ea ec a4 4f 67 6b 04 | 64 ea e8 78 | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #193 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 a9 c0 88 98 05 08 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 40 a9 c0 88 98 05 08 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.696075; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #194 | libevent_malloc: new ptr-libevent@0x55564da36688 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 fa 85 fe 85 46 d0 fc b8 a2 8b 3d 26 c3 36 8f | f7 e7 73 fa 0c 22 00 0d 5a fb 03 fc bd 04 5a 89 | 05 13 f3 b9 6e 39 f1 ec bc 47 d3 c6 4e bb 20 81 | 28 b5 b5 87 f1 a5 4e 16 57 34 3d d4 b0 64 07 e6 | 21 e1 0f 76 7f 44 8f 84 44 f4 6e c4 a5 f7 cf 65 | 5c 44 8d bc 21 1c 47 be 48 b2 92 e7 a8 25 9e 9d | 16 09 62 c8 94 fd 5d 77 09 55 21 89 e0 93 26 de | 15 4d 4f c8 4b 85 f3 a8 44 cc 20 49 45 bf 5f df | 34 99 89 22 6f 52 99 0c f8 66 56 c9 3f da 57 0f | a5 65 43 61 64 bb 61 9b 8c a1 33 54 fc 91 3e 2b | d0 7d e0 9b be 74 fc d8 3a e8 a5 7f c5 3f e6 b3 | 8a b5 77 87 99 25 8b c8 48 75 2b 22 c7 e8 e4 1b | 30 8e e2 8d 62 f5 f4 d8 dc 11 3f 09 3d a8 44 14 | 09 e8 16 da 36 65 a6 54 e8 9f 9c c6 21 06 c1 b1 | 2d 24 cf 54 b1 69 18 38 97 99 41 a5 a6 b0 47 29 | dd cf b6 e2 71 cb 94 00 96 3a ff 1b 4b 46 80 ce | 29 00 00 24 95 c4 fe 1b 03 34 56 02 1e 5a ca e9 | 45 3b 1e 54 d0 d9 ab ce 69 31 78 aa 5f 72 d2 4a | c3 6a 61 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 98 3a f2 17 6e 8b 22 5e c0 b4 55 | e2 42 6c ba 87 3b 66 49 00 00 00 1c 00 00 40 05 | f3 5d 98 23 81 de 75 c9 73 41 bb 10 b9 ee 58 f4 | e2 ab f4 0a | libevent_free: release ptr-libevent@0x7f4990038b08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | #194 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 56 43 df 35 04 ae c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | 0e 56 43 df 35 04 ae c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.756456; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #195 | libevent_malloc: new ptr-libevent@0x7f4990038b08 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7a 25 f3 d2 a8 5f 25 69 1c 8d b7 f0 08 c9 e0 ea | 5e 9c 8b 98 7a 83 1c af bb 45 97 b8 9f 6e dc 47 | 45 73 5c 03 36 b0 f5 b5 cb 44 5a 64 de c3 ef d3 | eb 04 b7 39 4b 6e 75 2d fc 8b 60 ce 2a 63 3f 2d | a2 67 dd 8d 50 de d4 44 69 01 1d aa 7a 65 70 20 | 26 94 c5 86 b9 0c 5a a1 0d f3 f8 76 5e 80 5e 9b | 56 69 2b 1f 0a 76 08 a7 18 79 89 5d 28 fc 5a 5a | c9 ae 76 17 6c 3b e4 b3 f5 50 e9 f5 a8 3d 05 da | cd 1f 3c d8 74 f9 58 ba 73 40 51 dd 30 83 e4 43 | be 6b 7e 12 a3 5e ad 42 1c d2 9f 02 fd a0 1e 71 | a9 97 26 8c 6a c4 b1 42 d9 d4 ad f2 b8 e6 ff 0d | d4 7f 68 cc ea 43 31 82 ee 36 49 b2 8a 76 ca af | 7f 79 ed 37 a7 eb 92 e0 6e 6d bd 5b 44 9a 09 89 | 2f c2 6e 42 f3 f6 d1 c6 9e a5 bf e7 a6 4d b8 61 | de f4 8c 25 25 4d 34 c2 22 bc 68 1a c9 00 16 30 | 0d ca 4e 5b e1 bd ec 55 f2 84 25 50 7b fd a3 8f | 29 00 00 24 ed c0 5f 7e e3 70 96 fa 1f 39 8a 24 | c8 bc 9d c7 5f b1 9d 29 5f 29 0a 0f 1a ce b2 7e | a4 46 e2 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf b4 1a 50 f1 b0 33 93 fa 85 f6 b8 | f8 db 30 13 46 61 11 57 00 00 00 1c 00 00 40 05 | c8 c9 fe 7f 85 a7 93 ef 03 0e 1d 2e 9f f9 eb 03 | 87 8c 25 4c | libevent_free: release ptr-libevent@0x55564dae72a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #195 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 5f 02 a9 78 6f ff 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 23 5f 02 a9 78 6f ff 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.817822; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006794 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #196 | libevent_malloc: new ptr-libevent@0x55564dae72a8 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 3a 51 96 b5 eb f0 b4 7b 2e 62 db 02 bd f0 84 | 1e da be b6 9a 03 33 33 da c4 81 cf 57 32 c9 1b | f9 c9 b0 ac 1e 8c 9e 64 cc e8 b2 b3 55 67 cb 80 | 27 8c 32 55 4a b8 9a b6 2c 11 b5 c9 58 52 67 0b | ac 61 96 48 a9 07 4e f6 3e e0 c7 c4 72 03 d5 9a | 9c f3 a6 53 e3 1e e9 0a 8b 06 9c bb 31 a1 d1 2c | a6 fd cc 36 77 97 98 bd 11 a7 88 50 40 84 63 77 | 99 c5 9c 67 e1 48 79 cc 88 14 e7 2e c5 d1 6e 07 | cc 01 2f 19 ff 5d 01 1d c0 e8 55 e4 4d 42 5b 68 | 29 1a 54 d1 fd 68 f7 5e a1 ca b0 b2 41 02 cd 24 | 75 a7 b7 f1 b9 a6 74 7f aa ad 62 df 00 7d e4 95 | 8a be 21 19 87 8c 96 81 ad 7b 2d 80 74 30 f2 92 | c6 8b 57 48 d9 71 f1 3a 55 36 7a c0 69 c2 2d de | ce b1 1d 43 1c 69 e3 f5 5c 7f 91 af b6 60 60 e8 | 24 81 1d 55 f0 22 ae 0d 9d 42 6e c1 29 ba 6c b7 | fe d7 21 30 dd f3 03 bb 4e 78 c3 6c c1 fa 9f be | 29 00 00 24 11 ca f6 cc f8 1b a3 d3 92 5b e0 b2 | 69 af a4 f6 fc 5a 79 40 78 05 f2 9b cc 7f b8 d6 | 56 1a 02 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 8f 87 d5 2d 98 b6 fb 76 86 4e eb | 34 b1 be f9 05 5a b3 be 00 00 00 1c 00 00 40 05 | 44 ba ce 1c 5b 06 e9 00 fa 59 f9 67 eb 52 eb 37 | 76 65 f2 31 | libevent_free: release ptr-libevent@0x7f4984038938 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #196 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 5b 31 7d 90 8a ec 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | fd 5b 31 7d 90 8a ec 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0748 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.879207; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #197 | libevent_malloc: new ptr-libevent@0x7f4984038938 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b 68 3b 31 e6 f7 8a 63 ef 4f ad 6a 2d 65 49 73 | b5 a0 ea 2f 7e 90 1e 3a 71 52 cf 65 74 fa fa 2e | 76 02 b9 75 0e 95 4e e5 cf 11 ae b5 34 b7 4a 37 | 43 91 a4 11 cf 4a d9 c7 02 32 34 bd 9c 32 8e 56 | da 88 41 1b 28 6a 0c b2 38 0d da 73 6c ec 07 6e | 39 30 13 34 08 04 4f 3f a3 22 93 db 64 59 44 90 | 0e 3b cf 0c c4 d7 11 0f f4 01 03 15 16 eb 96 99 | 43 d9 16 a7 30 82 55 e5 02 1b ed 4e b2 2d 85 54 | 43 c2 e9 e3 58 a3 ab 40 20 cd 7d fa e8 b8 c6 f8 | 83 21 f6 53 f3 cd da 3e ab f7 bc 98 22 35 64 d2 | f3 db 36 50 5e 5d 5d 94 89 b4 b4 3b 3e 31 1f 81 | ca d9 d7 64 7c a4 c2 48 9c b3 e6 de 59 63 8b db | 0a a9 dd 6a e7 4c 6f db bf 1c 40 e1 65 fe 15 f8 | 5d 7d af 45 7c 72 ca e2 1e a1 3a f7 88 0f bd 86 | 3e f5 bc a3 5a 07 89 51 71 26 5a cc 14 54 2b 16 | ac f9 08 40 cb 73 79 ba 88 bc 9f b6 57 39 54 3f | 29 00 00 24 b4 c8 63 d5 96 49 bc c3 18 71 ae 92 | 93 3a 35 4d 41 49 9b 24 e2 5b 84 27 fb d4 ff 0c | c0 bb a2 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b dc d1 ff 8c 53 92 61 f5 96 0f 7e | a0 2d 5d d4 4e ad 0d c5 00 00 00 1c 00 00 40 05 | 4a 14 fa e0 f0 9e 79 4f f3 4a 86 fd 1b 7e 0d 8b | 3b 69 28 f3 | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #197 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 99 21 a2 3a 75 9f a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 6b 99 21 a2 3a 75 9f a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10620.940031; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #198 | libevent_malloc: new ptr-libevent@0x7f496c017ba8 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 4b 3a 22 e4 1a 4a 83 7c a0 d4 45 3b 56 00 8c | d0 7d 01 d5 83 ee c0 f6 80 91 42 27 18 cd ad 2a | 05 77 47 e5 a4 33 f8 54 41 a2 a1 12 25 ea d5 70 | 68 98 bf 9e fd 03 99 73 8a b3 39 ca 53 a6 19 c0 | 78 5e fa ff 2b 47 87 e9 5d e3 8d d1 c3 ed 50 61 | ba b2 aa 4b dd e7 e0 11 60 e4 5e 63 93 4d 1d a8 | 1e 15 5f 33 1e f2 74 d6 21 ae 81 68 06 42 8e 7e | 74 c4 3f 0b f4 f0 1a fc fe 0f 54 0b 90 5d b9 c9 | c6 3c 2b 75 bb 13 7f d4 6d 33 80 cd b6 2a e0 59 | d1 c5 7b ef ab 1e 72 7d bf 99 91 18 79 9c f3 ea | 3a b1 67 f4 b2 b7 9f f2 79 d6 6e 07 6b bb 03 ba | c0 40 ad c9 2c 6f 5b df 04 68 c9 e9 5b a8 b6 ed | 3a 9f c7 cd a2 b2 b5 fb de dc 60 f8 4e 8e 32 05 | 0a 38 e2 f1 c1 18 e7 c3 bb c8 f7 e7 3f c9 96 98 | 2e f2 5e 80 c6 13 9a 1f a9 dc 98 f1 7a 66 cf 02 | 3f c5 9e 78 3d e9 01 dc ad bc 63 29 3c 3e e2 4d | 29 00 00 24 84 e2 25 1c 2f 78 28 61 b6 b7 a0 3e | 70 06 da 04 43 32 39 eb c7 59 b5 85 fa 8a e9 37 | 90 93 9a 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 21 ec 1c 6d 6c 77 6d 46 0a 30 fa | 2d c6 7b 6b e9 d7 70 4d 00 00 00 1c 00 00 40 05 | 39 e0 f9 5b c0 65 39 b2 10 4d 0a 66 8f 92 e8 b0 | f9 de 29 00 | libevent_free: release ptr-libevent@0x55564da92f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #198 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e c8 4e 17 4e 55 bc dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 3e c8 4e 17 4e 55 bc dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.001384; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #199 | libevent_malloc: new ptr-libevent@0x55564da92f08 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 96 09 3f 5d a8 7f 1d 3c 4b 25 dd a8 02 c5 28 | d0 f8 0b 9b 71 c4 b5 2c 54 3a da 3c 58 64 d8 8a | 05 9e 95 79 3e d7 7e bf 04 07 96 9e d3 40 51 02 | ba b0 30 1f d5 70 1a 21 6e 39 ba 82 71 7d 03 1d | 8d 62 8d 65 8b 11 07 04 8b 6e a5 78 12 45 8e 10 | 20 05 7f f1 3b 99 73 f9 86 41 11 0a 17 79 f2 cd | 34 c0 5d 79 35 43 e1 87 9b dd fa af fb f3 d7 48 | 99 4a ef 7e db 43 18 a0 3d a3 2f d8 a2 a0 41 46 | b6 48 ec 24 fc f7 70 ff ab d7 66 3f c3 45 a4 81 | e3 f6 e5 07 6e eb 7e d5 37 a2 4a 08 7d 8a 84 05 | 5a 74 a2 66 71 c2 f3 db 2f 6c 62 35 ac d1 0a 17 | 57 08 2e bd 86 3c 0e d3 90 9b 07 e4 19 35 a7 88 | e3 15 f0 b1 d2 c6 ae d8 25 e1 cd 45 ba 64 3b 52 | d0 84 98 42 d3 e6 8d 6c d0 4e 0d 93 ac af 72 1b | 51 b7 ce d0 dd df 2c 99 81 be 1b ba cc a2 cb 7d | bc 66 55 d4 d1 fb b9 ba b2 fa b6 f0 6e 67 db e1 | 29 00 00 24 a1 d0 15 82 03 b1 3e 89 93 be 33 83 | fe d9 a3 0e 08 ff fe 17 e8 be 60 5e 84 bd b6 18 | 3a a6 ca a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 31 5f f4 01 ec 8d cd 53 dc 8e d9 | b8 68 6f 4a 69 c3 d0 37 00 00 00 1c 00 00 40 05 | 30 26 0e 52 5a c0 90 2d 5b 54 bc 0c a4 4f 2d a7 | ac be f2 1c | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #199 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 70 42 e3 d1 6a 13 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | b4 70 42 e3 d1 6a 13 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.060737; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #200 | libevent_malloc: new ptr-libevent@0x7f49ac022b28 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4d 19 d6 c6 9b 7d 92 ad 49 5c ed 86 65 60 | 61 fb 5d 73 c3 62 e5 fc 65 dc b8 be a1 46 a4 c8 | 79 f9 ba 4c 66 83 20 64 b2 88 68 02 6b 79 93 cb | 77 01 4b bb 39 12 e0 2f 7b 32 1f 24 36 d7 1d 39 | ab 36 6e d6 e3 af 33 2c eb 2b 26 dd 0f 67 f2 61 | 92 41 35 41 0a 1a 0f 57 18 1a 2d 21 6f cf d2 7f | 16 72 74 52 41 3d 63 6d cc 64 97 b6 97 a7 08 f7 | 33 80 65 26 3e 2e 69 08 a3 ac 6f 64 17 f4 19 2d | b0 74 76 f6 25 bf c0 d1 ee 3b f6 f2 e7 ce 3c 16 | a1 1e c0 4d dd f5 4f 91 38 25 6f d5 4a e5 e2 41 | 1c b3 81 51 bc 02 37 ca d4 59 87 de 0e 43 04 a5 | 47 4f 9e ea e2 e3 29 a3 64 c4 e6 f2 c8 d6 b0 3c | 96 89 02 af 1f a4 5a e5 7a c3 c3 3c c8 ad b3 91 | e4 b9 1c bd 0a ef e5 b5 bd 34 f7 01 5e 29 2d bf | 35 ca 94 30 c6 77 0b 2b 46 9e a1 5a cb 4e 2a 60 | 63 27 f5 31 47 94 21 dc da 21 d4 73 a3 60 cc ef | 29 00 00 24 4c 50 84 25 3b 94 49 e6 03 99 3e 31 | 35 c8 f6 88 27 86 e0 4c 1b 1a 5d 52 16 98 97 fd | 0a 05 ba 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 cd 99 b0 f6 fb 21 d2 65 eb fa 0f | 51 ee 08 31 c7 ed fb 80 00 00 00 1c 00 00 40 05 | 76 ea e4 c4 e5 7e dd 52 8b fc e6 c7 8d 7a 35 3f | 20 0d 50 df | libevent_free: release ptr-libevent@0x7f499c0333b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #200 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 01 09 8f 8c 74 cb 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 5f 01 09 8f 8c 74 cb 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.119036; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #201 | libevent_malloc: new ptr-libevent@0x7f499c0333b8 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 5f a1 85 4f 38 45 40 14 55 a2 5c 64 ff 86 89 | 96 06 07 28 93 f5 c3 ec 73 bd 43 5e 60 0d e1 23 | 7e e7 32 d7 78 4a 9e 2a 44 67 4e d6 a6 fe f5 f6 | df 14 9f cb a0 e3 10 55 86 97 39 ab 21 2c ba 70 | 3e ec ff 34 e1 d4 73 27 29 db 6c 2b 61 e4 8b f6 | 2e dc 9f 8d c0 b8 dc 4d 9e 86 bd ca b1 cd 1d 51 | e0 31 0c e9 4d 5a c0 f1 4e 26 1d 84 76 0d fc 09 | eb 9e b5 46 b5 de 1e 45 31 21 fb 8c 22 2f 3a 1c | 1a 9e 99 d9 c8 88 db ec cc d9 cf 01 65 f3 a3 c2 | 3a 35 37 c8 17 b4 85 3e b5 76 c9 ee 22 98 20 14 | 2b 3f 65 0f 57 2a 89 75 20 ca 06 87 38 ac 12 23 | 7c 8b 11 87 44 ac c4 b9 1d cf fa 57 81 61 8c 03 | 2b e3 b8 a1 97 c5 5d cf 44 5f 43 a8 fe eb 9d 2d | 72 a1 c1 80 5c a4 0e a8 55 67 73 3f ec 0c ae 71 | cb e1 82 60 0b f5 8f db 19 29 cf 59 4a fe 0d 99 | 8c 6c a1 97 12 54 da c1 aa 07 0d c2 4c 17 2d a4 | 29 00 00 24 43 55 48 40 bf 10 ac 5a 44 bd 02 7a | 57 54 c5 76 fb 6e d0 a1 e9 47 b1 83 32 35 ae 9e | dc 8b f9 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 4d cb 2d bc 9a 4a ec a1 b3 34 06 | ff cb 9c 53 be 1a 97 dc 00 00 00 1c 00 00 40 05 | 8e d2 89 51 6d d3 a5 b6 ce 2e 77 4b 91 06 71 30 | 29 1d ec 22 | libevent_free: release ptr-libevent@0x7f49a4022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #201 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 8d fd 96 99 b6 a7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 1e 8d fd 96 99 b6 a7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0693 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.178533; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006215 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #202 | libevent_malloc: new ptr-libevent@0x7f49a4022a68 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 68 31 5c 9e 2a c1 45 ab f0 73 21 34 cd c7 6d | 22 86 2b 1d 09 4a 17 89 4e 91 78 be 24 f5 08 8d | e0 8a b5 c5 3a cb 13 c5 dc 92 00 a1 0e 83 28 c7 | 83 ca ab 49 70 b7 5f 0b 0a 11 d4 5c 0c a4 48 1f | ae 57 77 b8 0b c8 34 58 3f b7 dd 95 74 25 0d b5 | 8f 94 16 30 04 21 63 a8 c3 74 86 84 e1 21 6b 08 | bb e7 57 60 8f 8d 2a b0 1a 6f f5 97 b4 19 a0 b5 | 42 71 b2 4a c5 26 ad ec a3 e0 27 21 14 65 de 77 | a1 aa 72 5e 36 82 b4 ea 8f 3e a6 61 d5 c3 24 b8 | 59 77 3a 9a 58 10 bd 80 0b 3d a6 8c 51 cf a9 ae | c9 60 10 1c 18 20 ef a1 72 47 0e 00 1d 81 6d 74 | 63 1c a3 6a db 1f 01 1f 36 ff 7b bb 98 f3 35 d8 | e0 cd 6a 4e 92 96 69 7c f0 e9 0b bf a8 eb a4 db | 8b 02 90 a8 55 05 1d 28 a1 3b 64 13 e4 cc a6 a6 | a5 ba 8c 2a 23 44 9c 87 9a 4b bb a1 b4 c0 d4 32 | df 7a 79 e8 12 8c 1d 15 9c de 93 cc d4 f9 58 d5 | 29 00 00 24 4c 25 30 46 0f a7 2d 68 96 35 45 76 | 0a 19 fc ab e2 6b 06 b1 4c c3 3a 01 d9 f1 1a 2c | 58 b7 22 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 21 6d 9e dc 3e 1e dc 42 42 d5 b6 | fb d9 b1 a9 9d 52 cb e1 00 00 00 1c 00 00 40 05 | 00 60 64 17 c3 60 32 03 22 91 44 9d bf b0 18 19 | ae be d9 a7 | libevent_free: release ptr-libevent@0x55564da9a3e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #202 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 f6 d3 a5 59 8b 18 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 44 f6 d3 a5 59 8b 18 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.266862; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #203 | libevent_malloc: new ptr-libevent@0x55564da9a3e8 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 42 85 8c a8 8e 8e 8f f6 09 71 a2 43 32 ce 58 | b9 ad a7 b3 b2 01 2e 6f 56 72 2b 96 39 c5 aa e2 | d3 b0 76 14 f0 50 65 2c 62 05 c0 2f e0 0b b2 a2 | 15 36 07 90 14 b4 eb 4c 34 d4 04 f7 20 c3 95 95 | 94 97 1e 9e e6 01 30 dd 49 e4 c9 03 30 bf f8 b3 | 19 77 3b 99 73 31 c6 af 9a 88 f2 b7 c8 fd 3f 29 | 8e 5f 6e 54 44 d6 e3 1c 08 b9 29 23 57 9c 42 7b | e7 0b de a2 52 13 55 72 cf 65 c5 74 6b 40 83 c7 | 11 a9 10 de 10 ad d5 9e 22 7c 31 33 05 9b 3a d5 | ad f2 1e a3 20 5e 7d 4a f6 3d fb bc 60 a3 fe 73 | 67 39 72 a7 b5 40 6f e2 89 0f db 0e 64 69 fc a1 | 30 eb 8f 81 e2 63 52 c3 0d cc 4e 88 7a 08 39 45 | a9 86 32 bd c9 a8 b9 c1 a7 ed b1 22 c1 a1 9c 8c | bc db 6b f9 48 b6 65 83 df 4c 11 b1 79 ae dc 9b | e8 75 92 e1 f8 e4 9f f6 5f 79 63 b1 12 e7 48 dc | 2e a9 5d a5 65 5c 97 df ea 9c 5f a3 bf fc 8b 9d | 29 00 00 24 40 92 dd 62 59 ba a6 36 da 8c 11 f5 | d0 77 5a 17 e3 6b 0e 39 4b 60 38 9c de 3f 34 6b | 56 f1 8a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 b0 3a d6 b2 1c 28 f0 a3 7c 4b | 10 1d 89 dc 3f 93 40 e3 00 00 00 1c 00 00 40 05 | ea 3d 09 bd 26 09 d4 c7 37 15 b8 86 e6 99 58 06 | 56 a3 b0 60 | libevent_free: release ptr-libevent@0x55564da9a308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #203 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 15 03 94 aa c3 e2 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 20 15 03 94 aa c3 e2 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.327256; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #204 | libevent_malloc: new ptr-libevent@0x55564da9a308 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 0d ba 40 5b 88 a5 ef 8f b3 e0 e5 b4 a0 74 db | d0 ab b5 c4 53 c2 72 92 da b9 52 ec a3 1b ef fb | a2 03 0b f0 c4 1d 4c 09 8d dc fa 09 ad 66 93 3a | 45 81 5c d0 9d 87 97 f8 16 19 dd dc 0b 0a 11 6f | 9b 3f e0 e7 5f 85 e6 ff 81 e8 30 88 eb cc 8f 80 | 98 1e 25 68 7f 19 73 73 e0 22 ee 92 76 2f c6 3a | 85 2b c8 32 cd 4f fe 25 c1 62 e3 f6 22 25 d0 00 | 7d 05 88 65 3c 00 e0 e5 d1 b0 43 8b 36 9a 07 81 | 54 e7 d2 2c 13 d3 0f b5 83 7b 5a 49 7d 3a c1 13 | 00 7f 2c 33 f4 fd 44 68 c1 2c fa 2a 64 27 e3 9e | 6b 96 a8 de a3 76 7a 2a 80 10 ac 22 74 05 2c 0d | e6 a6 e1 94 a0 c1 fc b5 56 82 91 db 8a 61 d5 a4 | d3 71 8c 16 4e 53 12 d1 f1 a6 54 07 c5 8b 80 cc | 8f a9 e9 04 d3 a4 2b 7c c9 24 11 1e 4f b0 10 43 | 59 8d e5 17 81 89 b9 0e 41 53 c2 70 23 26 67 7e | 15 60 b9 f5 2e a5 df 9c 36 46 b6 bb c7 16 0a d3 | 29 00 00 24 b7 e3 96 bc 96 95 42 ce 1d 47 a7 7b | 3e 35 04 75 7d c2 92 3c 16 df 7d cf 4c b2 8c 87 | 0e c7 81 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b bd 48 bd ea 80 31 1d f4 22 7d 05 | eb 3e 72 e8 68 67 a1 87 00 00 00 1c 00 00 40 05 | 06 a3 b4 63 1c 6f 6e b0 c6 df 86 ed d6 ca b1 b2 | bf 6b ba dd | libevent_free: release ptr-libevent@0x7f49b00282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #204 spent 0.206 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 9b d2 68 04 54 94 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 41 9b d2 68 04 54 94 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0918 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.387714; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #205 | libevent_malloc: new ptr-libevent@0x7f49b00282c8 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 32 97 6b a8 cf 08 43 da e2 a8 27 e2 fa 2e 52 | d4 65 93 10 5a e9 f5 c7 f2 43 21 f3 4e c5 26 b0 | 5b fc 4e d5 bb fd 7f c1 78 a5 6f 1f a6 b8 25 44 | 40 f8 37 86 a8 61 6f c6 63 42 25 ca 3c 25 bc cc | 98 75 d6 44 b0 41 de 1a 65 07 19 d6 24 22 27 0d | 4b 58 18 1f cc db ae af 9f 21 71 7c 1b cd bc 47 | c5 63 36 b9 25 b7 8c a9 be 7c 6e 81 c7 e0 4b 62 | 6e f0 c4 c2 5a 7e ce e8 0c be fe 61 d4 e8 86 f4 | 47 fa 75 e8 98 41 e4 a2 b2 7b 88 39 bb 6f 99 d0 | 46 79 a8 42 3c 31 ae e0 04 9d 1d 85 a8 26 f9 1b | b8 dd bb 72 57 4a 90 d7 0d c7 ae 83 3f 35 cc 86 | ff b1 43 09 70 77 f8 9b df ac 93 1e 8a 18 11 08 | db f7 f6 8c 27 d8 fa 79 61 22 07 cc d2 f5 42 18 | 8f 26 b1 4c 35 67 fb 1d 05 a8 22 78 d7 52 c0 72 | df fa 6c 23 62 fc d1 15 35 f7 f3 a1 66 84 b1 4c | 3b eb 57 86 34 f6 8a 21 fe 31 9c d7 5d a6 27 f7 | 29 00 00 24 0d 29 19 e9 9d bf 4e 42 32 59 f6 50 | b9 04 35 a2 dc e3 76 5e 9b 34 5f 6f 15 c7 42 15 | a3 49 34 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 c5 45 b4 81 d5 36 cd a7 bd e2 16 | a8 1c cf 5a 5d 72 85 6c 00 00 00 1c 00 00 40 05 | e9 7e 4e cd a2 a6 f3 f8 42 f8 f7 dd 16 98 57 37 | ab d7 98 bf | libevent_free: release ptr-libevent@0x55564da2daf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #205 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 41 77 87 fd d2 74 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 65 41 77 87 fd d2 74 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.449164; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #206 | libevent_malloc: new ptr-libevent@0x55564da2daf8 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 b1 c6 3c 82 c0 8c d9 aa bc bf dd 8c 83 eb 48 | fb 02 20 1a 60 81 07 30 87 ff 1c 44 01 61 df db | 86 6a d4 ee e6 8f 51 49 9b 85 92 52 7e 6f 36 84 | 91 1e a3 dd be b7 e1 18 e3 37 1f b2 3a 9e f5 1a | 0b af ec 9f f9 f5 87 61 9d f9 6b 2d db 3f f9 e9 | b1 04 3d 89 48 67 f5 f3 5c bc e8 a9 6c f4 df 37 | b6 ec fc c9 f4 77 db 80 16 87 ef 61 02 af 05 f9 | fe f0 1d 91 14 3f 30 d1 d9 04 be 6c 34 28 0d de | f4 c5 06 1a 81 62 15 b6 40 b5 67 85 b4 7b 56 c3 | 34 2a a8 8f 98 47 ee ed 8f cf 12 45 ee 10 d0 52 | 7a f6 e2 00 b0 00 11 6e 1a ea 37 63 0b 84 1d b1 | 97 9d 2d df c4 b8 5f 20 e3 bd 97 ef 8b 10 f7 0e | fb c4 38 e7 fa 28 6c 62 f1 ff 90 b0 d8 b8 df c2 | a6 11 4e fc ee ec 3e 29 64 77 63 0a c8 f9 34 b4 | 21 2f 01 a6 cb 2d 9a 7c 49 cb fd d1 f5 c0 e3 83 | 75 9a 5f 80 f0 1f bb 5d 90 ae d7 c5 95 14 53 ff | 29 00 00 24 50 34 47 b5 79 f9 6b 03 18 cc b4 cb | 2f ee 7f ff d1 88 7d 23 24 54 29 68 b0 76 1b 0f | 8c 9b 7d 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4d 61 8f 99 69 f9 03 22 ce 6e 76 | 1b 4b 9a 3c 6b 04 47 7f 00 00 00 1c 00 00 40 05 | 61 83 0f 2d ff 22 7c 00 52 09 9a b7 21 ef 91 77 | 03 1a f2 38 | libevent_free: release ptr-libevent@0x7f499800ce98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #206 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 59 69 a7 34 f8 b3 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | c5 59 69 a7 34 f8 b3 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.079 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.506564; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #207 | libevent_malloc: new ptr-libevent@0x7f499800ce98 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 d5 40 97 98 9c 24 d2 c7 1b 59 c7 31 fe c8 94 | 58 4f 8b 6f 6c 81 f1 0a 2b 9f 94 ad a1 2e 96 bf | ee fc c4 67 a6 8f cd fa 31 dc a0 d1 52 68 7e 4d | 0c 79 28 77 81 8b 9c 0e 11 44 e9 4c 02 a7 79 d0 | 5a c5 68 db 3f 0c 1c 22 e4 28 f5 9b e3 9e e9 b4 | 80 2d ed 07 01 3b 3b fd 46 b7 a9 67 9a 08 1f a8 | 1d 9f 6d 40 85 b3 fc 4e 85 5d 4e bc 73 e6 9b 43 | e2 80 5a 1f 55 11 cf 17 c3 c6 fd 5b a5 5c f7 81 | 67 ac 4c a8 db 3b bc 6c bf 5e 6f 0c 48 66 d8 2f | 0a b1 f3 73 32 c2 4b 93 f5 a4 c7 2c b1 8c 12 b0 | 1c b5 5a 0f 9c 97 54 b2 9e bc 44 86 6e 01 e6 71 | 4c c3 4f 17 49 81 50 98 c9 b6 76 8c c1 d6 3f e7 | 5e ed 06 69 8f 2e df aa e9 b9 e1 92 79 e0 11 7b | 1d 7d 39 f9 24 ee e8 4c e8 17 27 a1 c5 18 77 a9 | ba b9 38 c0 7e 0e 0c 82 4f d2 77 2b 39 a4 b2 9a | e0 8d d7 1a d9 1d b1 7b 9f ed 4e 08 b9 a9 c9 33 | 29 00 00 24 e7 79 b4 8a 22 28 26 ab 60 96 c7 d1 | f1 c8 53 97 d4 89 01 68 49 85 5e f3 7c eb 71 44 | 85 df d8 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 86 cb e1 c5 30 73 cf 08 25 3e e3 | af 33 ce 50 a0 96 ee 66 00 00 00 1c 00 00 40 05 | 49 29 f9 cb 0a 90 ca b8 02 05 1b 6e c5 f4 d2 fb | 6c 5e 45 3a | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #207 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 35 23 fc e4 c1 3e c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 72 35 23 fc e4 c1 3e c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.567975; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #208 | libevent_malloc: new ptr-libevent@0x55564dac16c8 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 6a ba 97 24 d4 87 44 7d 43 20 0b b3 fc ea ad | 18 61 50 da f6 2b 23 1c b8 15 f0 fd 19 9e 25 dd | a2 e5 72 08 fc ce 7e 6a 37 44 cc 06 4c 2f 9f c0 | 3e df a5 e7 7a c0 00 98 e3 d7 1d 05 ed 27 20 bd | 51 8a d7 b5 85 a1 6e dc d8 e3 dc 3e e4 bc c6 e0 | b8 f9 a1 22 dc 6e a4 74 e4 cf 63 61 9f 34 8c 19 | 33 c7 a0 4a b8 7a df 26 78 3e 54 40 33 e0 ba d2 | b8 80 82 9a 55 70 10 2a 21 3b d5 1a c7 af 6c 37 | 98 65 68 e3 47 8e f8 ef 33 55 87 7f 76 e9 e6 4c | 78 92 bc 85 8d 8d fe 69 72 d1 4a 75 94 0f cf 10 | d9 7b 9d b1 64 76 ba a8 02 0e 0d 3f a8 cf d7 4e | 89 b5 cd 37 09 da 14 c0 b9 7b f5 3d 7d 1f 36 23 | 15 24 1b 73 5d 67 55 9a 98 6e 8a c8 cc 5b 01 00 | 5d 5d 3c d0 95 ac 4f 76 f5 e7 2b 86 7c ad 92 9e | ca 63 7f 63 98 24 74 77 9f f4 ac f7 c7 37 86 78 | a8 60 67 a1 aa 5b 51 11 c5 58 42 0d 35 ad ff 79 | 29 00 00 24 3a 86 7a 11 e5 68 03 62 97 6b cc d4 | b8 8a ca 58 b5 d2 1a e7 33 e9 a5 04 3c 51 6f ad | 18 f7 35 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 6c da b0 a0 f3 32 39 07 9f 3f 9b | 00 5a 57 54 7b 6d 7d 2a 00 00 00 1c 00 00 40 05 | f4 62 86 46 20 cb 54 0e 01 96 48 72 4c c6 1b 09 | de 86 42 48 | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #208 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 30 ae d5 69 11 3d 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 9a 30 ae d5 69 11 3d 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.629373; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #209 | libevent_malloc: new ptr-libevent@0x7f499c0179e8 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c1 4a e0 e6 6b 27 f4 15 93 40 2e c2 37 eb c8 | 89 d2 71 9b a8 86 31 da ac aa 08 62 ca 12 10 b6 | 4b 86 cf 10 6d 84 2a f4 81 46 ba 7e 1b 86 0b 36 | 78 b3 91 04 db f8 f5 7d a6 32 7b 1a d1 cd 9a 71 | cf f8 15 42 76 c0 77 f7 df fe da 84 33 d5 86 5f | f1 9a 35 a1 be 51 b3 b5 d4 43 14 e9 fb d6 0f ba | e4 90 eb d4 fe c6 df 52 fe e8 e1 87 a7 7e 75 b1 | 53 fe a1 25 08 95 11 5f 36 0e 1f 9d c1 61 8d 60 | 74 13 4e e7 81 e0 f4 d7 42 d0 1f 17 19 83 ca 66 | 37 76 ee 8f f8 29 fc 4f dc b2 af c6 53 0e dc 33 | 7e 6c 3e 68 f6 3c a4 ea a5 4d 7c c4 e2 b6 c0 9f | 68 df 8a 49 04 6d 8f 95 1b 97 6d 2a 0b d1 a1 7b | bf 74 5b fb 93 9a fa fe e0 cd 0b 0d 3f 5c d8 fc | 76 39 5e 3c 35 89 1c 32 00 21 1a 9f 9f 3a 02 f9 | f9 f4 81 eb 57 ab 1f 76 38 50 39 44 3a d3 ef 66 | 81 e0 f8 a6 f0 2a 31 17 79 8c 66 eb 80 40 68 cb | 29 00 00 24 3b 89 0a 68 e4 41 ce 65 b4 56 95 9b | 00 26 b0 f8 74 e2 1f f8 97 68 97 1f ba 93 1f 80 | 85 54 1a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b bb 78 16 60 fe 57 1a df f2 7b 11 | 39 1a 0e fa 1e 07 d8 64 00 00 00 1c 00 00 40 05 | 2a ed d8 a3 ab d9 b2 5b 62 f6 14 dc 61 47 ea fe | 1b 96 78 aa | libevent_free: release ptr-libevent@0x7f4994028448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #209 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd da 21 2a f0 14 ed af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | bd da 21 2a f0 14 ed af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.690765; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #210 | libevent_malloc: new ptr-libevent@0x7f4994028448 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a4 a9 a2 5b 24 1f 0c 7c 17 74 c9 5f 9f fa 57 | cd 92 02 20 47 06 8f 25 f7 45 5a 6b 81 79 88 6a | 84 a7 97 de 4c f6 1f 54 df b3 27 24 67 d4 f6 b3 | 11 73 eb c9 c3 9d a1 31 cf 5c 5b 63 bb ec 7e 9a | d5 4b 36 f7 47 f4 39 60 7b b5 81 6f 00 63 a3 69 | 03 cc 5d 49 67 4c 30 b3 7b b8 88 28 b2 d8 fd cd | ae 18 0c 80 80 6c d1 79 25 52 f5 fb ad ba 7f 2d | 2e bf 7b 3d e8 2a 8d a5 80 9e 89 c2 97 1e cb b5 | 54 86 64 6c 7f 12 43 2a 11 5b 27 5a 92 01 b6 75 | c5 92 79 c2 7d 4c 1b e5 6e 9c 46 c8 7b 90 18 e1 | 7a 3d 11 eb 98 af d7 b9 d9 87 38 e5 db 68 f0 40 | 21 8c 8e c5 8c f7 22 32 88 72 97 e8 0f 09 29 d0 | 2b b7 96 f8 20 a4 d1 bc 4d ab 94 d8 9b 2e aa 51 | 99 c7 8e 73 1a 06 de 49 6c 10 57 74 2c c4 0a d3 | d7 d6 dc 44 36 77 a9 c2 5a 50 5e 43 f5 62 f3 08 | 3a 38 9a f8 57 8c ef 0a e3 65 4d 50 79 3c 7a bb | 29 00 00 24 8a 32 4a 6e 19 f1 ea 41 93 77 64 2a | 39 0f 92 73 a1 ed 8f 0c 7c 51 bb 34 0f 97 2e d1 | 25 c4 de 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 bb 2e 24 1b 61 8e 36 da 39 83 db | 21 32 af 79 ac 29 27 a0 00 00 00 1c 00 00 40 05 | bb 6d 82 c3 8a 7d 1a 67 08 d2 4d 7d da 7f ad 4c | 5c ab fb 46 | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #210 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 6f 88 d4 bc 72 e4 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | a7 6f 88 d4 bc 72 e4 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.748067; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #211 | libevent_malloc: new ptr-libevent@0x7f49a8022bf8 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 1a eb 22 bb 10 c5 0d 20 57 8c 95 fa 41 68 cb | ef 6a b0 6f 1b 55 35 f7 74 6d f0 d0 8d 11 73 ae | 3f 3e 86 a5 0a 17 2c a7 a8 f1 13 95 b0 44 39 c2 | 1d f7 26 a5 4d e8 8b 3c da b7 7b ad 0e 51 45 d7 | 4a c7 00 6c f7 c2 15 a8 83 11 62 87 3a ec f5 e7 | 88 24 f4 80 2b f4 b1 43 8b 2f 2e 8f 6f 91 c8 f2 | 58 4f f7 b5 ca 3e 9c e7 f4 4d 91 43 c6 cd 33 f8 | 9e fe 31 80 27 e5 c9 87 4f 9d ac 2d 6c 14 4e d6 | 14 f8 70 8d 9e 50 a8 14 c1 b5 8e f1 31 8d 0e b6 | c1 70 a5 b1 a3 66 c2 81 55 dc b2 e3 c0 4d 6a a7 | 32 ea 4f a1 8a e1 e1 40 e0 ff 34 e2 c1 8b 81 a1 | 33 dd 11 28 0d 8c 75 d4 2f 03 f8 00 f6 fa 10 fe | 3f 71 f6 1c b3 23 fe cd b6 d5 45 bd 84 e2 21 a2 | a4 26 d2 f1 42 bc f4 c3 3c 6e 14 43 e4 f1 3a 98 | dd 82 55 16 52 52 d9 90 e7 ea 4e 95 79 fa c9 79 | 70 4f af a2 12 23 03 c6 c6 51 04 ab c0 b7 7a d2 | 29 00 00 24 c4 2a ca 61 91 75 ef e0 5f d7 a0 3e | 85 59 a7 0d da c2 cc 55 b8 c5 ee 12 1f 5c 3b 90 | 91 5d 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d ca dc 16 17 a4 9f f2 cb a0 1e | 15 d2 98 59 65 a6 11 a7 00 00 00 1c 00 00 40 05 | 8d e8 22 b8 c1 3f 27 b7 e4 9c 07 4e 34 d6 56 bd | 4b a6 92 f1 | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #211 spent 0.319 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 d6 fc 69 5e 90 74 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 49 d6 fc 69 5e 90 74 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.83062; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007142 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #212 | libevent_malloc: new ptr-libevent@0x7f499c022a68 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 77 10 ce 21 b4 2c 05 d1 6b 32 c7 81 00 56 f4 | e8 0f bf 39 10 87 95 17 95 4a 36 f7 a2 6a 68 eb | ef 8d a8 c9 d5 cb 65 8c e3 c9 7c 61 21 dd 0d 3d | 97 49 30 ea f5 2a 99 34 31 56 80 20 25 72 9e 9b | 12 d3 c9 c7 af 5e d8 62 6a e6 2d 5f 6c 0c 6b 8e | 41 ee 54 67 f2 48 c5 b3 34 0d 24 31 6b 4f 89 b1 | 77 df 7a ca b7 33 f9 a3 fb 60 22 7b 3e 2a 59 9c | a8 84 48 18 bf b8 26 47 77 3e 4a 63 33 79 9c cd | b7 20 aa 2b 59 08 c0 5c cd fc 71 62 a4 29 ca 9b | 72 47 24 cc b4 56 ee 93 1c 38 18 ee 05 ed 99 90 | 70 1e bc 37 79 6c ec 84 88 e7 b8 4e c8 ee e6 1c | ad 2c 34 fb 82 4f 31 de 02 53 f7 67 cf 55 67 8a | 9a c9 f5 6e 62 6b 8c da e0 75 8d ea ad 77 b8 c6 | 8d ef 46 da 0d 00 30 6c fe b0 45 c5 8f d9 82 f9 | 90 74 7b 8e 1d 0b dd be 43 95 29 74 b1 21 e1 eb | 41 9d a2 76 b4 38 2a 90 70 2f f8 b2 7c 99 e8 c3 | 29 00 00 24 37 c3 0c 6c 9f 9c 74 34 ff e1 97 75 | 2c c7 76 04 4c c4 2a df 58 dd 59 8b 1a 79 33 62 | 06 f4 5d 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 53 8c 83 65 8c 63 d9 be 1a fc 73 | af 62 d1 28 b3 00 ee ed 00 00 00 1c 00 00 40 05 | fb 68 32 bf a4 91 fc ed f1 46 96 86 18 e4 aa 15 | e6 42 85 54 | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #212 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 2f b9 b0 ef 4f 15 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 8a 2f b9 b0 ef 4f 15 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10621.92295; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.003836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #213 | libevent_malloc: new ptr-libevent@0x55564da661a8 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 a2 08 34 2e fc 7f 7b b3 86 67 58 a9 76 66 62 | a1 cb 54 2f 68 2c b8 4f 99 13 91 39 01 d1 23 1f | 9f 39 03 71 83 14 c4 02 30 b4 f9 ac 6a 56 7a 7a | 36 08 c5 ac 56 64 88 f5 43 10 7f bb 09 5a 20 ee | 82 5c 1a 82 05 35 87 e2 77 67 42 ae f4 70 5e b1 | 9e 4a 6b 4f 12 c2 cc 30 6f 4f c8 db 7f 93 dc df | 7d 0f 77 5b f3 60 c3 a6 d6 53 db 80 cc 59 29 a3 | f8 2a b8 f2 81 c4 57 aa be 3d 75 4f d8 21 fd ea | 04 da aa e4 c7 51 36 2f a0 72 5b 1a 7c 03 47 f5 | 6a 40 47 d2 d5 2f c3 4f 2e 27 02 90 b9 49 7a 88 | 4d 12 61 01 d7 ff a4 01 fb e6 66 95 37 6b e4 5d | 36 17 5a 8b ca 33 e8 2f 3f a4 a5 0c e9 6d 55 f8 | 30 d0 a6 f5 73 eb ac 4c ce 09 97 00 5d 82 f8 e7 | 77 7e e1 2b 47 9c 5b 59 99 4c ae 25 2f aa 04 08 | 8f 17 b3 80 4b be 8c 91 3e 2f 88 91 ad 29 0f 50 | d8 2c 60 72 a7 b1 80 43 b3 14 e4 af 09 96 fc c2 | 29 00 00 24 34 6d 84 c6 e4 74 9f e2 04 42 7b e9 | d2 b7 a7 84 ea 7c 63 ef 6d 20 73 f9 64 c8 a3 26 | 8d 19 f1 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 bf 05 f5 c2 1e 19 4d ed b9 b8 86 | d5 87 03 4a 10 9b c9 e1 00 00 00 1c 00 00 40 05 | 88 18 5f ef b0 d7 02 8a 55 c8 22 50 23 6e f1 49 | 0f 5e e7 ab | libevent_free: release ptr-libevent@0x7f49b0033238 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #213 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 27 b0 69 f3 87 41 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 9a 27 b0 69 f3 87 41 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.01028; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #214 | libevent_malloc: new ptr-libevent@0x7f49b0033238 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 ea 6b 63 27 19 6d 40 3b 83 4d 7c 50 ea 9c bc | d3 c3 fb de 3f 01 49 c4 7e 71 09 9a 85 5b 71 64 | 37 73 05 41 77 79 10 ee 83 1f 16 b7 0a 36 43 f9 | 48 26 d8 f1 6a a5 b3 5e 17 11 0a 30 39 fb e2 77 | e4 6a c3 5e 0c cd 5b 0f 17 5c 15 82 d2 7e c2 aa | 49 9b 7a ea 3a e1 58 d8 7b cf b5 9a 6a 02 16 65 | 48 5d 48 ba b3 31 c0 c0 1f 72 4f 7d f5 19 cd e9 | ce 07 e2 85 09 33 20 41 df d6 58 c8 4f ed 5a 76 | 35 e6 25 38 30 b9 c2 d6 88 d7 60 20 07 d6 91 31 | 85 94 aa 5b a6 4a 46 47 e8 f6 a2 07 d6 6c 65 dd | e1 8b ee 29 8a e4 89 16 65 41 6e c6 61 85 cf 10 | 10 14 65 a1 eb 8d f2 07 61 26 3f 0f 0b 81 a3 fb | ee f8 fb 3b b1 72 b7 4c 14 2c 05 f9 86 81 54 f3 | f1 21 d9 50 43 8e 07 c8 86 2a 93 bd ab 50 2b f6 | 6a 19 a2 38 fd fc 2c d3 70 df 02 8c df 62 02 7c | 11 34 33 32 1a eb 2b a3 93 cd ae 24 b5 16 a4 c3 | 29 00 00 24 3e bc 3d ef dd 5d b0 55 b7 fc ca ab | 79 5b c0 e2 55 f6 6b 7e 41 ca 66 47 e2 1a 82 98 | 17 05 f3 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 06 40 29 53 60 c1 70 6d ad f7 43 | a2 1d 91 a6 c3 69 ec 9a 00 00 00 1c 00 00 40 05 | 99 31 f6 ba 7e 49 56 06 8e 62 ce fa f5 59 3b 42 | 1d 13 6c e0 | libevent_free: release ptr-libevent@0x55564daad218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #214 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 81 bf ce 9d e2 78 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 76 81 bf ce 9d e2 78 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.068673; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #215 | libevent_malloc: new ptr-libevent@0x55564daad218 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 cf 50 e0 4e 48 8f 9d 6a ea eb 12 f3 8f 86 e3 | 50 19 07 e5 d0 37 2b 6a d9 74 a7 5a fd 21 15 79 | fc 8d 1e 21 a7 46 c4 17 b6 fe c6 d3 5e c0 51 ff | 4b 2e 4e 6a d4 1c 88 7d 18 3e c7 4d e6 c7 f7 31 | 02 ac 54 1f 4f 00 13 63 0c 16 28 68 aa bc 35 21 | c1 af a9 62 49 86 62 58 7a 6b e2 08 0f a0 04 46 | d2 31 e2 83 58 64 de aa 63 5d 22 a1 54 b3 32 11 | ef b6 b7 7c 09 e2 d9 52 1f b5 b4 a1 24 07 f0 ac | c5 6f bb 6b eb e0 33 b4 6a b5 91 e9 db 74 e3 ab | 74 e0 77 2b ba 98 96 08 fb 91 01 68 cb b6 f2 8f | 8c 29 04 94 1b 64 2c e9 0e 2e 00 dd a3 cf eb 5a | fb 60 a0 b0 64 70 7a ae 32 69 25 c8 17 5d d2 82 | 7c 0e cd 30 a2 cb b6 37 3b 84 7d a5 7d 86 d8 c9 | 33 08 39 9e f5 c5 98 64 c3 3b be c3 30 a3 b9 39 | 61 08 1c ea 83 da b4 c4 4e e8 72 ae 0d 39 eb 00 | 97 3d e5 b3 43 3c 2e cd 6d c5 57 66 53 24 b4 e8 | 29 00 00 24 5f 7e a7 c3 71 dd 25 66 29 4a 11 6a | b3 08 8e e1 39 a1 d2 8d b9 8e c1 a0 4e d4 10 4d | c5 5c 2f 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 40 88 f0 70 f7 9a 79 e5 9a f3 ba | 3a 43 8a 1c f3 85 81 55 00 00 00 1c 00 00 40 05 | d5 14 e3 9d 8f 9a 40 88 f0 65 32 31 e3 0c 4f 08 | 3e c6 dd 6e | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #215 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 04 b9 07 a6 64 56 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | b1 04 b9 07 a6 64 56 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.130007; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #216 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 43 48 aa 4c 5b a4 5e e4 a4 4b 74 05 72 7f 8a | fa 2c 12 a1 72 c2 68 a3 8b 18 e9 ee d6 9f 62 92 | 27 10 52 2d bc 6a 56 b2 a7 a4 d7 8a 53 3f 59 51 | 3d ec f1 9c 30 f1 16 4f 53 e9 bd cf d2 c8 86 5f | d9 5d b0 e2 6a a1 7b b9 c0 30 83 a7 a8 86 4e 55 | 3f e9 73 52 dc 91 df ef dd cc 1d f8 20 df a2 a0 | a0 03 f6 e0 54 e0 f4 10 63 2b ec 44 09 04 c7 0c | bc 82 f8 88 5a 77 1c 33 56 98 e8 18 64 90 b2 2b | cc 75 96 ae f9 44 81 b5 a4 14 da 01 a2 c5 1c 45 | 55 b3 75 8e fd 7a 5b f5 7e bf 02 96 e9 57 32 31 | c8 a7 01 41 6f ea 39 a8 76 89 64 d8 02 29 7e 62 | d4 8b 62 c1 f4 c0 08 be 14 e4 26 96 d3 5b a0 4c | 6a fb 87 4e b5 27 eb d2 af bd dc 8d e3 25 3a ad | 95 bd f7 d5 d9 c0 90 42 6c d3 a4 46 5c 70 89 af | 05 ab 16 4a 88 86 0d 4a 2f f2 a1 0d 33 3b ea cd | 1b 3f 26 0f e0 76 3a eb 85 97 67 8b 61 cd 14 fc | 29 00 00 24 c3 ef dd 1d 61 b6 93 f7 7c 63 ff aa | 99 44 27 af f4 5e 19 0d 36 cf b4 55 33 8c 90 2c | 9d da a8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 ce 31 14 58 d9 4f 27 60 ea 38 80 | 7c c6 dd 24 4a fb 3b 29 00 00 00 1c 00 00 40 05 | 34 59 82 d1 30 3a 30 ad 58 25 10 1e e9 d3 1d 15 | b7 72 0f 22 | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #216 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 3d 33 bc eb 92 1d f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | 39 3d 33 bc eb 92 1d f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.19133; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #217 | libevent_malloc: new ptr-libevent@0x7f49a00179e8 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2d 22 dc f9 35 fe 2d e4 8a 18 31 69 38 f3 cf | 4e df 22 c3 1e e4 67 5a 39 32 f4 c2 74 50 52 3c | 0d 32 ff c4 d6 ac 8d 7b 66 a6 10 0d f5 8d 3c 13 | 09 22 d1 59 9c 61 ca e3 4e 25 73 9c b6 7a a1 e2 | f3 c4 aa 43 6c d9 06 ae fc 4f 15 a9 ab 86 09 7d | 88 c1 fc b2 c1 16 1a ba 43 ee 96 23 63 5a 02 dd | e7 2a d9 8d 90 44 7d a0 b7 ac 5d 0e e1 b9 3f 6a | ce 2b 45 d6 65 60 da 90 a8 cc 4d 81 8a 11 fd f1 | 9d 8a 1d 54 5a 9f 93 7b 92 9a a3 98 67 8a 7c 23 | 84 7f 3a bf 5e 5c d1 71 94 24 31 0e 4d 87 75 30 | 5b ef 15 24 d5 49 14 71 42 87 72 24 4d 13 e6 35 | f4 74 60 59 28 05 e0 5a 1d 91 45 cd 80 84 a2 c0 | f0 24 77 c2 3a 76 47 86 08 de 6c 6f 62 8f aa 75 | 96 9a 7a 2e 4d 74 c5 fc 42 57 69 4b 13 4b 08 e5 | 76 a0 65 16 ec 60 4e 01 a9 bf 40 64 b0 09 5c 01 | 31 7e 4b e9 ce 87 c8 2d 4b aa 6d 33 01 5b 1b d4 | 29 00 00 24 20 10 f1 8d 2d ce 38 86 8f cd e5 3c | a5 51 f4 e1 56 04 0b 59 6d 0b d0 84 a3 1c 01 96 | 4e e1 57 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 dc c1 3b f9 35 ec d8 74 30 cd a4 | 44 5d e5 8f 17 75 e9 cb 00 00 00 1c 00 00 40 05 | a7 f2 73 bc 9a 15 3c 77 a7 b1 c2 bd c9 ed 6b f4 | 79 df 29 a5 | libevent_free: release ptr-libevent@0x55564dab17b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #217 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de fe 6f a9 6b 4b 29 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | de fe 6f a9 6b 4b 29 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.255706; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #218 | libevent_malloc: new ptr-libevent@0x55564dab17b8 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 80 bb 94 f0 47 ca 4d f0 95 fd cd 07 a7 9f e8 | 9d d0 75 43 d2 9a 63 9d da a9 0a 0d 85 1f af a9 | 60 63 6e d9 d1 6a 4c 3c a6 d4 b9 4f 8a b9 0f 25 | 1e 7c 4b e6 f8 16 f3 60 2d b2 3e 57 24 46 bd ff | f2 eb 69 d0 c1 5c 8f 23 7e 2e 20 97 74 50 0d 6a | 56 29 42 a9 68 ef 24 c6 83 3a fe e6 42 a7 89 77 | c5 14 8d 1f 10 43 f6 b5 84 bc 00 87 6c 49 e9 bf | cc f5 b6 dd 16 5f 6e 32 45 43 92 63 5e 92 0e ad | ef 59 32 cc 86 b2 a1 74 f8 b1 71 3e 1a 37 17 6b | 65 c3 2f 45 d6 35 53 6f b4 b7 e1 1d 3a 10 05 70 | bb f6 1f cd e3 4e 6f 18 98 66 f4 cc fb cb 4a 44 | c8 e2 b7 20 8c 77 be ad c1 d6 98 f9 f8 bc a4 a8 | 52 91 5b ff 43 55 07 be 71 92 2c de 27 77 c2 9f | a3 bd 97 5f 4e 46 64 c7 a1 08 78 b4 6b ea d2 43 | 66 3a 54 47 83 16 8e 1e f8 58 f6 a7 24 5d 55 50 | 23 3c 99 5b cf 10 47 1b 8d f6 c4 31 fe 5a 99 c2 | 29 00 00 24 89 c4 c6 f6 a3 15 0a 98 d5 b4 f3 f2 | 35 ad 86 76 2e af aa de 1b a7 48 91 e7 80 8c af | c5 0c 53 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 fe 68 db 34 a3 27 94 fe d7 3f 1b | ef 98 48 3f 17 31 9d bb 00 00 00 1c 00 00 40 05 | 63 5d 35 4b c9 3a 9c 76 de 87 26 00 37 ce fa 92 | 0c ee 3f e9 | libevent_free: release ptr-libevent@0x55564da57968 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #218 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 fb 9b 3f 78 e1 ba 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | b7 fb 9b 3f 78 e1 ba 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.315119; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #219 | libevent_malloc: new ptr-libevent@0x55564da57968 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 98 57 73 89 2e 04 2b 7b 2d e5 b5 cc 2a a9 e8 | 4a 49 3c 7c ca bd 58 fe f6 7b 1a b2 9b 58 e7 ee | 48 f6 58 50 d1 3f c3 ad be df 23 b4 a1 a5 bc c3 | ec ca 29 2a 35 a4 51 c6 a8 61 2a b1 3c 8a 6c c0 | 20 3a 22 d3 73 ad eb 2d 38 2e 56 1a 4c 73 eb a7 | 79 10 b0 05 5c 43 19 c5 32 2a 15 0a 5e ae c7 14 | 63 52 55 f5 27 a5 01 83 12 99 56 e8 26 b1 58 2a | ef 14 d1 bf c0 fb 94 fa 1c 07 c6 4a 1c 85 cc 4d | c1 f2 ff 2f 3a 66 46 b7 ba 37 fc d2 eb 5e 56 7e | 16 8e cc d4 eb 1e ea 30 5c ae e5 3f 02 0c 0a 44 | 2d a8 d1 cc 1b 94 bb ae ca 38 b3 59 66 10 5f f5 | 75 5e 26 15 43 28 c0 ba 45 c1 42 cd 71 d3 e7 74 | c5 9b b7 eb 31 73 b7 f8 43 45 72 4f ab b9 ad 5c | 51 d2 d1 11 7d fb 32 68 41 c9 b2 43 38 a8 bd 09 | 98 32 97 36 35 b9 d7 1f 28 84 0d 13 a3 95 24 2b | d0 41 1a 6b 41 d9 01 e1 fd 84 4b a1 6e b4 1d e9 | 29 00 00 24 85 53 12 de 0b fd 7f fd c1 4e cf 71 | 21 30 01 e1 d0 d2 3d 2e cd 72 a1 5d 97 0b 77 8a | 14 25 17 a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c 66 05 ee 75 ba 27 08 ac e9 f3 | 8c 75 cf 69 d1 7f af b0 00 00 00 1c 00 00 40 05 | d6 d3 9d 1c 8b 50 28 56 0f 0a d1 bd 15 e5 b8 61 | 92 01 4f 7a | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #219 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 91 59 ba e6 e9 fc 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 37 91 59 ba e6 e9 fc 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb998 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.375404; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #220 | libevent_malloc: new ptr-libevent@0x7f49ac028338 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 67 9c a2 24 4d c2 15 62 58 5a 6d 75 18 fb 36 | 04 f2 02 a4 16 ca 80 d8 ce 9e 27 60 51 21 14 9b | 6f f0 51 6e 67 8b c0 7a 32 af 16 c6 0f 5e f2 60 | 7d 65 78 cb 03 2e 70 42 9f a9 b6 66 b0 9a a5 c0 | a4 f3 da aa 4e 5f 39 3b e0 7a 39 b9 e0 4b 10 8c | b9 f0 d7 5f f5 14 ef 73 78 e2 c3 f9 95 d8 bb 3e | 85 8a 00 d5 ed bb e7 2c e4 56 f4 57 8e a3 b2 ca | b4 37 c8 c9 17 ac 4a c7 35 cd b0 ec 2d 8c 46 79 | d2 9c e0 c5 c9 8e 2d 21 2b 09 d3 5d 69 34 25 98 | 37 02 00 5f f2 bd d6 71 e1 69 71 bd 7a 91 36 52 | 12 85 26 85 c3 6e c7 0f 76 69 79 a0 87 b8 b6 1b | dd c3 c8 1f d5 3c bb f5 73 c1 9e c7 0e 99 0e 81 | 05 aa 2f f8 ac d1 c7 7b e6 c7 f5 a4 f0 c2 6e cf | a0 f1 e8 1c 83 c9 34 80 e1 15 8e f6 46 4a 9d 1c | 0b 33 e8 04 32 d0 dc 36 93 2f 59 ae 2e fc c3 07 | af 58 7a 24 c1 00 72 e0 d6 d2 79 7d 1c 46 45 ba | 29 00 00 24 1d 91 2b f9 57 c6 ae bc ff 23 39 b1 | 27 49 04 ee d1 17 68 2f a9 ba 01 11 1a 29 23 20 | 2c 8f 7a 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 5f 45 f3 63 51 13 21 b6 f2 a9 36 | ad 1f f2 db a6 38 fb e9 00 00 00 1c 00 00 40 05 | dd be 5e 7f d4 34 13 14 c0 7c 55 84 e7 24 25 76 | 68 fd 3f 0d | libevent_free: release ptr-libevent@0x7f498003e3c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb998 | #220 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0b 6b 98 b4 09 34 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 80 0b 6b 98 b4 09 34 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.43485; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #221 | libevent_malloc: new ptr-libevent@0x7f498003e3c8 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7a 8b 69 10 8d 32 f1 4b 8f 34 b8 f0 89 c1 39 | ce fd f2 0a 2c c8 6a 4c 81 55 71 5a 9e 7a e3 56 | cb 80 ad 92 bf 06 1c f0 81 1e c0 e4 6c 42 49 4c | 69 5a 1d 83 44 3f 31 96 8c 92 24 80 8e 7c d7 d3 | 25 c8 00 66 55 10 1e 2d 0f a4 51 e9 34 ef 54 58 | eb 62 be 06 e4 ac 29 a6 ff d1 e4 52 a8 ca 20 b9 | 17 68 da 7c 1c 69 aa 03 3b 3d 18 e0 2b eb 96 ef | b7 c3 bd d0 fa 27 40 f7 6c 3b c4 bf bd 6e 27 ed | 40 b5 6b 09 6c 45 ca 0f 53 07 c2 c1 0c a1 44 d7 | 6a ba 2a 54 bb 21 b1 ae f7 93 b6 4e 05 ac 8f 62 | cb ba 73 21 db 4f 13 71 89 35 0d f1 10 e4 17 d1 | b4 69 a3 06 27 94 16 ba 19 7f ff 42 8f f9 8f 40 | 67 1d 22 d9 51 2e b0 fc 2d 67 88 3e 4c b2 5f 1a | ca 60 31 13 5a 64 64 80 d7 d7 c7 3f fc 8e bb 67 | bf 59 2b 4b b4 ac 86 c8 a2 af 50 af e7 9b 98 98 | 2e c2 33 b2 e3 a3 b4 4f 82 13 8e 8f 33 c8 f5 3d | 29 00 00 24 12 dd 33 b6 44 1a a0 66 2f e2 17 69 | 8d 6e 54 23 ab a3 53 99 e0 d0 bf 28 00 0c b0 86 | 96 6d 31 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 a2 87 77 5d 85 f3 4b fe 42 4c 99 | 36 0c 13 1b 3f a4 3e 71 00 00 00 1c 00 00 40 05 | ba ca 55 62 16 db 2f 8f c5 5d 71 fd e9 89 f5 96 | a6 e3 14 96 | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #221 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 5c 52 89 5c 0d af bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 79 5c 52 89 5c 0d af bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.528379; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005925 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #222 | libevent_malloc: new ptr-libevent@0x55564da5bf58 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 49 45 73 b6 c1 14 46 d1 a1 aa bc 90 3a ee 8d | ca 84 c3 ff 6e cf 82 0d bf 07 18 c2 0c fa 35 d1 | ab 9b f3 95 eb e9 f7 50 8b d5 c7 f0 e9 a4 22 94 | 5e fb 5c 89 c3 92 90 68 75 03 6f 17 62 b1 52 b7 | 68 fb e8 77 6a d4 c9 37 e6 e6 07 82 19 f8 34 b8 | 52 fa 2c 0c b3 bc b3 3d 01 d7 79 80 d2 3d 27 7e | 17 8e e4 13 e2 2f 95 50 45 62 4d c7 88 40 b5 8d | 19 8b ff 07 89 49 b4 34 02 5c 55 4d b4 e1 fb 9e | 76 c4 0d de 4d 39 43 46 e1 d5 11 d9 51 42 e9 46 | 34 77 20 f8 39 a2 c5 dc b2 fd 92 ef ca 9b 79 8f | de 3a 01 34 4a 9b 7f 72 e2 38 f1 0a 52 41 04 68 | 31 81 58 ed c8 59 a1 45 3f 2c 68 1b f7 50 2b 8c | 33 04 f0 69 6b 1c 72 ba 7e 49 db 71 74 21 11 e2 | d8 db b5 f5 cb 3b 7c 79 b7 02 54 0f d3 91 02 64 | b2 f0 58 f0 af 87 7f 99 ac 66 5e b6 32 aa ca 87 | 65 88 5e bf 35 c2 5f 3e f8 f8 4e 32 2c b4 6b a6 | 29 00 00 24 06 e2 29 fa c2 58 b4 e2 b4 d2 e6 4f | 8a ef 4a 00 82 6c b0 41 38 f9 bb a0 24 be 3a 22 | 65 e6 f3 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 87 40 f0 ab 92 94 39 81 a5 fe 60 | f1 b5 74 ac 6b 3f 71 2a 00 00 00 1c 00 00 40 05 | c3 3d d1 58 04 0f 3b 10 aa 16 97 2d d6 31 e3 4d | 54 38 dc d1 | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #222 spent 0.508 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f4 ea a9 b2 2c ae da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | e8 f4 ea a9 b2 2c ae da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.294 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.622522; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #223 | libevent_malloc: new ptr-libevent@0x7f499402dcb8 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 66 af fc 3b 86 5a 4b 64 e6 0f 55 93 23 77 1f | e8 3f a3 ec 32 ee 1b 1b 5d 16 10 71 31 a1 18 23 | 16 98 6f 48 1c 5a 19 66 23 4b cb d1 01 0c 4c a0 | 41 01 df c1 e0 4c 55 70 ef 83 3d 27 8c 63 c3 b4 | 2b 5b a4 a6 bb 01 4b bb bc 3e 5a 7c 58 4b 0e 8e | 83 31 e4 37 f2 e8 52 af f6 65 27 7b 95 46 32 04 | 36 8a 24 7e 93 a8 3b 4c 26 ff 41 3f dc 65 c1 23 | 7f a8 18 e1 3a 81 2c 29 27 ae f0 4f 17 32 c2 a4 | 9a de 98 8b af a4 43 43 30 f7 a5 22 6a 2e 78 7b | e2 ea af 2f 72 74 e9 d8 ca df cc d3 d4 e8 79 f1 | 60 5f 37 a9 54 94 30 c5 e5 c4 aa 3c 1e 9a 0a 00 | 25 db b5 ce 8c 1c bb 9a 5d 0e 3e 61 a7 b4 40 4e | 2e 47 a4 86 c7 2b bd 58 50 eb 47 ab 70 da 5f 22 | 53 29 26 7f 1a 07 c3 9f 18 a1 23 89 d9 aa f1 e6 | 3f 24 b4 74 9c ba 4f b3 4b 22 86 35 53 3d 7b f0 | dd 2c 5b 75 c0 a9 e8 c0 9e 6a 21 54 60 7d 28 0c | 29 00 00 24 56 be f6 7e bc b3 bd e2 72 69 65 46 | 8d 1d c8 3a 33 c4 f4 1c e4 b4 d8 18 1c ee 02 f0 | a5 0e 45 0c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 6c 2c 52 54 47 2b f6 37 fe 85 9b | 69 d8 df 15 25 52 30 7b 00 00 00 1c 00 00 40 05 | 00 e4 c9 b1 99 6d 02 8c e2 8a 8f 03 4c 2a dd 9d | 99 e5 2d 07 | libevent_free: release ptr-libevent@0x55564daba2f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #223 spent 0.38 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 36 3f 22 d1 66 63 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | a4 36 3f 22 d1 66 63 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.168 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.723286; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #224 | libevent_malloc: new ptr-libevent@0x55564daba2f8 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 87 b7 2d 32 ff a8 61 09 ef 1d 21 ff b8 b0 41 | cc 91 12 a5 70 6e b1 d9 2c 95 97 6a 39 1a 1a 25 | 60 cc e9 d2 4d bf 0e 4c 7d 47 91 62 f7 e3 f9 09 | 93 66 a9 17 ab 01 84 b8 d7 10 55 74 9a 0e 19 e5 | 14 0a 23 c7 25 20 d9 1f 7b ca d7 97 ac 4f 4d 25 | 64 f8 50 c0 b7 f2 df d6 f3 2e 76 16 04 93 b3 87 | db e9 e9 6e 78 38 29 b9 03 72 5d a5 74 4d 32 f6 | 7c e4 20 47 b7 07 d0 70 26 25 b7 28 82 5e e7 10 | 78 bb 24 0f 23 7c f9 31 71 c2 e8 a3 61 1e 63 ec | 32 37 e6 66 58 1a 65 aa 1a cb 9e 71 db 12 e7 89 | 92 b6 24 70 58 f9 2a 27 0f a2 8c 2e 03 c3 2f 7b | 22 60 e7 bd 8b e8 fa 91 eb 54 15 f9 91 ce 76 0a | d1 72 e3 4a b7 2c ec 14 c9 e5 7e 75 c1 22 fe be | 2c b2 f5 4d 82 f2 e8 4a e3 8f b0 73 7c 2e f7 38 | 92 ba 1f 0a 21 c6 f1 52 32 42 7f a5 9e 4d d9 73 | b4 15 5b 0e 82 2a 16 20 ea 71 16 3b 09 79 a4 9f | 29 00 00 24 1d 4a 38 eb 1e 25 40 91 85 3e 74 64 | b2 f7 fa 83 fb 10 98 09 d7 ae e3 8d 45 4b 71 d9 | 3e ba c0 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 38 1e 4a 4c a3 55 9a 24 75 99 19 | 75 f9 63 05 7b 46 72 66 00 00 00 1c 00 00 40 05 | 97 04 00 0c 0b 85 f8 09 3e 8d d3 d7 a0 e0 e4 c4 | ba c4 2a ce | libevent_free: release ptr-libevent@0x55564dabba78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #224 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 b3 85 05 64 cd 24 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | 21 b3 85 05 64 cd 24 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.818707; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #225 | libevent_malloc: new ptr-libevent@0x55564dabba78 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 df e4 07 ca 61 c9 ca e8 d4 fa cd d2 22 ab a0 | 5a b7 d5 9d 6b e2 14 25 50 bd 0e 0d cd 6f 67 20 | a1 15 a9 22 eb 4f 22 8a 19 60 10 2e 11 51 70 f0 | c0 a1 11 f7 c5 bf 57 9e 41 7d a9 c3 15 3a bf e9 | 10 f5 9d b2 d1 9b ad 94 12 dc cc 7e 1a 6d 8d fa | 53 c0 d1 21 4b c3 a6 e5 b1 ee 37 b5 a9 49 79 8b | 80 25 d7 b8 07 62 cb e8 68 92 2d 25 c6 3b 3f 78 | 2c a6 38 d0 94 f1 ef 59 95 de 46 21 e3 9b 1e 14 | 38 ec 72 97 e4 35 8e 99 59 7f 9b 50 f0 2a 72 a3 | cf 84 29 96 e0 ad 3f d0 1f 02 2f 2f d1 bb 7a e8 | a5 e4 35 99 e3 67 ad e3 3b ca 7c 99 41 cf ec 61 | 61 72 75 9f 6f 27 18 7e a9 87 4d 98 d4 aa e8 a5 | 4e 48 5f 27 5b 8f 7a 12 69 ad b7 6c 96 27 0d 6b | 41 b6 a3 26 6d 85 a9 aa 57 b7 d1 80 50 5e 68 32 | f7 83 28 50 57 5f bd 5b 43 dc cf 5d 36 94 b9 f9 | 4c fe 4c b7 13 ea a3 4d 90 e4 be 8d f4 fb bb 5e | 29 00 00 24 5b 6c 92 af 25 3f ec 9c 76 b3 cc c3 | 18 89 45 9a 05 f9 e0 6e 43 6c 6b bd a5 94 ce 8f | 46 e3 e6 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 24 f4 db 39 5a 7e 0a e0 3b 50 a4 | 11 1c 67 9f 5f a1 7a b7 00 00 00 1c 00 00 40 05 | dd db 10 ce e6 ff b6 33 1d be f9 3e a1 a9 3c 9f | 02 aa cb 1e | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #225 spent 0.363 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 ce 6e c3 a2 bf 2b e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | c1 ce 6e c3 a2 bf 2b e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.892274; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #226 | libevent_malloc: new ptr-libevent@0x7f497c022b28 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a f6 af 07 0f 5f 09 d0 d5 6c 8a 97 b4 bf 1d bb | 5b d7 b5 e9 55 2f 26 00 a5 2d 83 c1 1d e8 0b 11 | 92 1e 37 17 42 60 c2 95 af 88 d1 81 06 9c d7 ef | 66 fd 91 47 5d b8 8f 75 db 61 49 32 3e 51 d6 56 | 8c f4 88 3c 4d c4 22 a5 56 74 8a e5 05 d1 0a 44 | 52 39 ac a1 13 14 aa b3 19 38 54 70 ef b0 d2 75 | 4a 5a d8 96 58 fc 3b 70 aa 33 22 5a 35 92 5f 73 | 90 7e e2 bb 31 10 64 5e 28 32 0f 8e f5 3e 10 53 | 72 25 73 c8 7e 72 a8 ee 98 e7 26 28 55 f3 42 b6 | 49 3d 78 8b e8 80 44 18 5e 18 fe 8f 09 5b 72 67 | e7 df f7 b1 40 d0 33 e9 ae c2 4e ba cb e6 1e cc | 64 5e 07 24 15 50 73 0c 15 6d 90 6a 73 8c c2 db | 85 f0 6c b4 36 c4 ee e4 39 55 6e 3b c2 e1 a2 54 | 7f a4 8b b4 bb ce a0 2c d9 cf ac 04 d6 4a ae fb | d6 18 27 99 f4 0c 59 25 6c 08 39 b3 4b 77 52 95 | ea 26 81 61 9a ea 24 30 4f ee 39 68 c3 cb 52 c5 | 29 00 00 24 79 d9 1e cf 01 3e f8 b3 7b 90 29 11 | bc b2 2c 3b 4b 77 27 d4 38 68 eb 58 de 39 2d ce | 01 2b 30 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad 5a 41 6b 38 04 58 8f bc 27 e2 45 | 9e d4 06 1d 34 41 83 10 00 00 00 1c 00 00 40 05 | 3e 47 be 7a 48 97 b3 1d 69 5d d1 5d 2a d5 bb 02 | d5 0a 17 02 | libevent_free: release ptr-libevent@0x55564da91708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #226 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 b1 04 a6 0a 5e 58 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | d7 b1 04 a6 0a 5e 58 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10622.963672; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #227 | libevent_malloc: new ptr-libevent@0x55564da91708 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 87 2d 3e 47 d3 91 a4 89 8d 8a 08 70 10 86 cf | 35 07 9f 08 23 2a 33 5d 69 87 19 b4 46 6a 8d b2 | 53 f5 04 27 f4 94 0c 67 71 a6 cf db c4 f4 c7 0c | b0 cb 71 9a 19 ce 9c 6f b4 1c 5c 6f 10 d5 f9 b6 | 6b 68 b3 33 5a 36 67 2f 07 82 4a 6f 6e e3 cb 65 | 30 67 64 18 97 b8 a7 2b 94 e0 8a 1e 9c 09 b3 cb | 04 8e 33 ba 5f d4 f3 34 b2 e6 b2 8d ba 87 df c4 | 06 cb f3 46 6f 1e 8c df c8 c3 6f 2e 10 13 d5 45 | 84 b2 90 63 fb a2 04 e4 79 77 d3 fe 21 53 e7 19 | 76 d8 6f 40 32 7c 5e 12 b1 b1 c2 3e 76 49 9d ff | 1e e8 ee fa fa 1a 52 fb 4b 8e a1 60 22 cb 5f 04 | c3 b7 5b c5 ad 0b 99 12 3a 79 bc eb e1 8a 86 9f | dc df 75 32 f6 bb fe 09 92 52 e1 b2 7e b0 aa 1d | fc 08 84 03 fa 49 af a6 00 da 9b de 7a e3 92 23 | 05 f4 3c 6a 1c 4c 89 d5 1c ae 3f 68 08 94 a8 fb | 61 bb 9f fa 53 19 11 9d a4 df af 9e 23 ea 49 44 | 29 00 00 24 c3 a8 6b 45 ee f4 06 19 6a 71 b9 ea | e3 b4 08 ea 8f ef 6f 99 22 74 bc 62 6e f9 a1 27 | 0a ae e2 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 41 3c d4 1e bb 22 0c b9 18 35 3e | 6e 6b c4 94 d5 2e 60 a3 00 00 00 1c 00 00 40 05 | 89 b8 22 af c7 45 69 06 af 44 4a bb 66 31 e7 0d | ba 35 94 ed | libevent_free: release ptr-libevent@0x7f49a8028468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #227 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 9b 6c 0e d0 29 0e b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | dc 9b 6c 0e d0 29 0e b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.030003; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #228 | libevent_malloc: new ptr-libevent@0x7f49a8028468 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 1e 7b bf 6d 85 e0 56 d7 17 ca c9 26 e2 07 eb | 14 82 31 03 1f 1c d7 22 bb e4 30 e4 da be 50 f4 | 97 86 75 75 bc 36 dc 91 1d 2a bd 45 a5 7a 77 da | 46 2c 85 98 42 33 a7 27 f9 c0 c5 df 0f 36 19 70 | 9b ad e9 9c b9 31 8e 1c f8 2d 9a 2f c5 d3 4e 48 | 6a 6a d3 ba ba 67 5c 89 1b 78 90 93 b1 3c f3 e7 | 99 34 6d 1e e9 a3 76 78 50 93 ff da 7b a7 56 b8 | 09 40 a1 bc 18 26 67 2b 5b 44 40 ca b2 cb 94 7f | 9f ab d3 51 e8 3a 5c e1 f3 f0 72 88 d9 60 8d cc | a9 3f 49 a6 46 fb d2 85 fe a4 1a 34 7e d2 db 86 | c1 2c 7e a7 80 55 df 20 1e 62 ec 18 20 46 fd 1a | 71 ba 0f b2 47 be a0 7d 93 d2 90 50 fb 33 2b d9 | 9a 7a c3 3c d4 97 2d 1a a1 86 e3 26 27 db b2 10 | 91 90 bd 65 3f 36 e3 c8 d0 1c ec e6 17 ff 7c e7 | 99 9f c3 7b d8 f7 b3 09 b0 61 19 23 9c e1 1e d8 | df 10 34 54 91 70 0c 0a 8c 5f 85 00 a3 36 cb a4 | 29 00 00 24 5e 84 6b 7f 69 c1 52 cd fd 6a 27 a6 | 7c 51 f9 50 b9 3f ac 23 30 b4 0a 1b fa 9b a0 eb | 5b 5d 65 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 2b 10 6b bb 30 31 48 36 47 a7 34 | 6f ea 2c dc af ea 15 b3 00 00 00 1c 00 00 40 05 | 35 d5 2b fa 76 da 2f da 9e 58 5a 00 b8 4f e5 40 | 50 43 03 d5 | libevent_free: release ptr-libevent@0x7f49b401a408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #228 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 fa 7c 28 a5 4e e6 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d4 fa 7c 28 a5 4e e6 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd128 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.093284; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #229 | libevent_malloc: new ptr-libevent@0x7f49b401a408 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 d5 28 c7 2f 2d 24 20 08 cd 3a bb ab d3 5e 7e | 3c ec 0c 3c a9 0f 92 c3 81 92 f3 68 38 4c 35 5b | 9f 73 cf 2a 36 32 d9 b2 35 c7 76 75 b5 48 cb 3b | 35 d0 fe 9d d0 50 11 9d 2d b7 d2 3d b1 c9 63 9d | a6 b1 28 81 9f 52 5c df 72 fb 61 a5 4b 8b 92 e5 | 12 28 52 81 81 78 0e ff 6d f4 69 95 d1 79 d1 24 | ff 23 4e 08 8f c3 a3 64 fe fd 7b 41 c1 74 16 08 | 2b 73 46 54 7f 9b 46 c6 30 44 e4 d7 e0 e3 a7 b0 | 4d 14 2b 84 f9 2b 11 cc cf 37 77 b3 e9 fd 75 cd | 8f 72 d0 eb 9d 3c 7f 94 a5 a3 4b 9c d4 ee d7 db | 77 0c 27 6f b5 16 4e 94 6b 10 ff 9f 45 7c 78 25 | 74 c0 aa 4c c4 5f 0e 2d 52 c2 89 b8 48 ad b3 a2 | 5c ee 84 8d d5 e4 d6 34 5c e2 cd 75 e2 a6 1e 2a | 9e e1 3c 22 db 54 bd f0 a9 37 85 81 09 f1 c2 ca | 6a 3f 75 5f d9 7b bb d8 b2 75 aa dd 10 a9 9e d6 | f4 fa f7 39 a0 6d 91 b2 be 9e ca e3 b1 a4 c6 3f | 29 00 00 24 44 a4 d0 68 75 a1 62 7f 49 d3 96 e7 | cd 1b 25 e0 1e d5 43 64 70 87 d2 78 db cb e5 de | 5f 2e e7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 1d e4 80 a9 54 83 05 8c 3b 57 47 | a2 0d 8c d1 bc fa 3a 68 00 00 00 1c 00 00 40 05 | 0e 87 fb 21 c1 23 59 12 0d 48 33 6a f7 ba 46 ad | 25 42 4c 3f | libevent_free: release ptr-libevent@0x7f49a8043d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd128 | #229 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a ca 64 ce 32 ae f7 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 7a ca 64 ce 32 ae f7 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.157653; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #230 | libevent_malloc: new ptr-libevent@0x7f49a8043d28 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce b2 f2 09 2a 23 f4 c0 00 e0 4e c8 2b c7 11 e0 | 59 b0 ac a1 69 af 48 49 98 fd 7b 80 67 95 21 a2 | 13 99 45 bf 07 57 bd d0 f6 44 79 c4 c2 2d cd 8d | 21 49 97 d5 ba 32 57 b8 35 9b fc 6f cc 76 a0 99 | da c0 ed 4d 1b ee 3f 8c 66 67 3d 6e 23 a2 9c 2e | aa 0a dc 1f 5b 2f 2a 76 13 78 b2 eb 0c 92 04 c5 | 62 2b 9a ec 29 26 a9 b3 79 7f ea 5a 8a f9 99 5b | f6 c0 92 e9 8c 9a 9f cb 02 08 57 64 5c 13 06 0f | 08 14 c5 1c c7 de fd 88 39 9d 3a ae 48 c8 08 bf | f9 d4 e6 c3 7b aa be e1 27 c4 bf ea 9e 49 c3 d4 | 13 ea 41 b6 17 b4 1d a2 03 fa ec 4b 55 f4 ca 50 | 0a 9e 85 3f 3a ee fb c8 cb 9c 42 9a c7 91 cb 45 | c0 df 5d ea 56 24 22 e1 e6 59 a9 a0 44 24 ee e3 | 27 93 19 67 29 54 fa 0f 31 d7 6f d7 ce ae 2d 95 | 34 82 1c df 2a 66 d2 83 93 8e a6 f9 10 1a 37 5d | 7f 3d 8c d2 d0 3f 98 02 40 d8 a6 3f c8 ea 3f 1e | 29 00 00 24 20 14 a5 6a 03 ed dc 23 b3 3c b4 f8 | d5 e9 fd b7 52 b8 8a eb 6f f7 2c e9 d9 c8 4c 1c | d3 76 19 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 b7 50 55 24 55 81 83 c4 20 e0 d2 | 76 a0 92 28 e9 c5 8d 18 00 00 00 1c 00 00 40 05 | a8 b7 f9 03 53 52 a7 43 dc 7d ee 73 ef e6 2f 67 | 12 03 a6 d9 | libevent_free: release ptr-libevent@0x55564da98cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #230 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 2d c2 6b cc ad 2a 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 72 2d c2 6b cc ad 2a 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.227945; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #231 | libevent_malloc: new ptr-libevent@0x55564da98cd8 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 41 2d fe 80 4b ec c0 07 9c d3 c2 e5 7b 43 85 | 30 ac 8a 1f 53 76 3b 3e 39 44 06 69 2c 63 ef 2e | dd d8 b3 eb 4a 87 49 78 79 f5 05 41 6e ff ee 5c | 28 76 ac aa 2c 1d a4 f4 48 33 b5 be f2 99 ef f8 | 21 d0 08 5e 22 a8 b4 2d 4d 14 06 99 bd 8b e3 60 | be 01 61 27 ff f5 13 86 73 2c dc 0f 36 28 70 15 | 78 e4 7f db f8 4b 0c 36 6c 39 9d ae 81 e4 36 c7 | 3c 98 70 a8 ac ac c2 c8 a8 fe 95 af c7 8f 44 80 | 84 eb c9 5c 3a 3a 34 94 fe d4 8d 34 f4 f2 77 5d | 3b 79 47 c6 1a 20 9d 2b a2 26 a9 16 ff 00 b1 ec | f2 b2 3f fa 42 08 0a 1b 6b 97 43 89 52 c9 72 2f | f6 af 4a d9 ab 23 cf 2e 36 9a fa 82 7f 89 4c 58 | bb 9a 9f 21 46 f7 22 45 ec 41 fc 2f 26 6e 29 28 | 9e 06 22 36 5a 68 65 01 bf 08 3b 19 9d 1c 9d f7 | d7 ff 44 9e 9d 0b e8 58 7f ba 50 9b 0b 5b 93 70 | 50 02 9b f0 dd 42 fe 47 28 ce 9e 3b d5 d7 74 73 | 29 00 00 24 ce a2 8c fa 6b 46 32 6a dd 09 2b 18 | 2e f6 a6 a4 d6 1c 46 22 70 6e 69 62 31 03 57 d4 | 88 33 38 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 7b 88 35 3d de f8 5a f8 5b 31 52 | ea 3d 84 96 d0 be eb fc 00 00 00 1c 00 00 40 05 | 7c 39 a6 58 8e 3c 8d 86 57 2d 01 c6 0a cc 0e 67 | cf 22 c3 a3 | libevent_free: release ptr-libevent@0x55564da63318 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #231 spent 0.0996 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 47 c1 c6 8f 70 66 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | 05 47 c1 c6 8f 70 66 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad16c8 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.296235; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007876 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #232 | libevent_malloc: new ptr-libevent@0x55564da63318 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 9f 27 c1 2b 39 e5 20 2a 47 a0 f7 db 66 c7 fc | dc d4 48 a5 8b bd f6 e3 77 8e 5c 43 d4 e0 56 8a | 8b 2e e5 fb ee a4 bd 1b 77 b1 83 e1 27 a0 39 fd | af fa 7e 51 d3 b3 6a 62 78 07 eb 6c 70 62 33 86 | 4b d9 a0 c9 f0 6a 38 b7 dd d8 9f 0d 47 b9 66 d4 | 43 5b f2 dc 92 09 fa 1a e8 ea ed d0 d5 ca 60 6b | c4 51 35 6d 4c 1c f9 6c 7d 50 0b c9 09 9d 2f 1d | 4c d9 fe 2e 87 3b 69 85 9b 8d ff c2 32 e6 22 e0 | d2 fc e5 81 99 d1 8b 58 46 06 94 35 5a c4 9e b1 | aa 60 87 dc 6e f4 86 52 f1 db b3 65 3c a7 df 7e | 4b c9 61 44 ba 6d 20 24 e4 e0 0e 7a 01 d9 29 94 | 79 dc a7 c7 69 2f f2 37 6b f6 22 22 60 be 26 ff | 2f 0b 13 d6 7f ff 43 47 ef bb 7d 42 2a 8d ef 2e | 9b 51 89 cb 57 c2 2c 7d 74 9a 8d d6 6f f5 a2 b1 | d9 5b a6 57 19 0b b3 20 6a 1f 6d ec 1c 7d 34 55 | c1 b4 32 dc 59 ef f6 02 80 82 28 9d de f0 f0 7a | 29 00 00 24 36 d9 ea 85 98 77 e7 57 8f ba 9b 52 | 61 24 fa 08 38 5b e2 bd 17 88 d0 bc 88 0d 4c 64 | 49 27 cd 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 27 61 dc ee b4 cf 3a 81 97 a8 12 | 8c d8 e4 bb 22 c3 90 56 00 00 00 1c 00 00 40 05 | 57 cc b8 b6 11 85 d2 9d 26 ce 02 b1 bc db ed fe | 8a de 5f 8f | libevent_free: release ptr-libevent@0x7f4994043db8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad16c8 | #232 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 f5 e8 96 e6 c5 00 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 79 f5 e8 96 e6 c5 00 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.360589; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #233 | libevent_malloc: new ptr-libevent@0x7f4994043db8 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 6f 84 6c a4 ad 0d 03 7b 53 e6 06 1d 2c f8 de | f2 64 0f 87 a1 c0 e1 f2 d8 74 e9 41 e7 f0 b9 d1 | 55 f7 0e 73 40 8a 32 af c3 ee 54 9b bb 88 c0 64 | 2d 8e a2 ca 7b a0 74 9c a6 ae f8 d4 bd fe 26 f4 | c6 45 26 69 91 d4 b0 18 6e 15 30 c9 fd e3 e1 0d | a3 6b 95 06 5e 44 f2 c7 74 d0 5c 65 4b 41 b5 7b | 6d 1f 69 f8 e2 ca 32 83 33 4e 15 4b 8d 38 4e 78 | 73 be 24 04 4f 6a 56 9a 16 cd 61 9d b1 bb 92 0d | 86 df 63 e3 2e 07 b7 99 33 cb 76 4e 34 d8 cf 71 | 7b 2d a8 da 43 83 f4 26 98 3e 9d 43 9c 83 90 96 | 0a 4d 11 14 77 ca 6e 71 82 42 7b 4d ee ed 46 d8 | 88 cc e8 e1 11 a4 cd 15 e8 7c fe 2c 1d e7 4b d8 | 14 71 5c 8f bc 23 5b 76 bd 70 89 dc 5c 6a c5 95 | 62 5f 44 7e 01 a6 15 7b ff c5 8d 1d b4 11 5f be | 30 0f e2 bf 17 3e 83 50 8a 13 6b 37 20 e2 8a 37 | d7 b7 b7 87 eb be 4c 80 9e 06 d2 05 44 95 b8 85 | 29 00 00 24 99 b8 cb 27 13 b9 44 e6 64 0a f8 be | 74 25 e2 7a e0 63 46 03 5c e4 f7 fb 91 b3 75 6a | 97 1d 36 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 6a c5 13 51 69 ac 98 aa 0a d4 29 | b3 d1 a6 6f 74 d9 45 f3 00 00 00 1c 00 00 40 05 | ae d5 6d 06 90 b8 d8 ea 33 0a 7e 22 08 95 28 c2 | a2 41 5d 8f | libevent_free: release ptr-libevent@0x55564da9d1c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #233 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 a2 b2 7b 70 7c cd 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 33 a2 b2 7b 70 7c cd 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0877 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.425003; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #234 | libevent_malloc: new ptr-libevent@0x55564da9d1c8 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 b5 57 86 29 ca 9e d5 1e 81 4a 85 e2 e3 fe f0 | fe a7 80 ad 93 07 05 33 5c 7e f5 6a 07 80 4b 12 | 17 7c 3a f0 b7 23 8e 17 1a 07 06 e7 d7 7d 9f 98 | 00 ea 79 6a 5b bf 26 46 9b 45 51 56 25 aa 69 3a | 31 35 fe 1e 7d 38 16 82 32 9d 6b e2 1e f6 d1 64 | 83 b7 ce 4e 8c 3e 4d 3f 25 e8 af f8 90 d5 5e 9e | d6 1c bc 7a 41 c3 db e6 64 e9 cd e0 6d 3e a5 a6 | 47 39 27 a8 eb 27 8e 68 5d da 6e 99 a9 47 9c 18 | 8a a7 b3 6b 9a 04 1d 74 14 e1 54 5a 57 9c 9e 17 | c7 fa ea 97 f7 26 a4 1b 5d 5f 17 cb e4 09 44 c6 | 2c 35 be 36 04 0e 45 8b b7 dc 10 b3 a3 aa 12 37 | 1a 18 e7 79 11 b7 85 1a 2a 6e 99 b9 5a 49 69 0a | dc 47 19 db 83 1b 92 56 74 df b0 ee f5 b5 16 77 | bb 5d 2e fe 77 b9 66 2b 67 52 99 96 0e 55 3a d9 | ea e6 b1 75 42 75 99 19 d0 80 c4 20 4e 87 1d 8b | 9f b4 8f 1c d8 0b 9d 44 0a ff c3 96 04 92 75 61 | 29 00 00 24 1d 7e 8d 3a 45 73 cb 19 dd d4 eb c4 | 43 57 71 92 dd a4 c0 b3 21 de 52 f9 02 ee c6 92 | fb d4 09 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 f3 fa 1d 56 d0 81 fe 81 f0 96 9c | 4f 96 2d fa cc 50 47 64 00 00 00 1c 00 00 40 05 | 99 95 93 b0 a1 69 3a 65 bf 4f b5 0c 09 5e ad 24 | d9 84 13 c3 | libevent_free: release ptr-libevent@0x55564daca298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #234 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 42 29 d3 ef 1c 58 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | 99 42 29 d3 ef 1c 58 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.489313; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #235 | libevent_malloc: new ptr-libevent@0x55564daca298 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 e1 d6 d8 f6 9e c4 5d 7f 1c 8c 9c b2 77 fb 4e | b9 d7 d6 3a a2 2a 8e 7c de d6 0f 7b a8 68 af e2 | 54 0e 16 4b d3 52 55 cd 88 3d b7 58 fd 15 ec bc | 59 c7 3b d6 87 87 a1 87 b1 ff 0c 19 20 49 9c f4 | 03 60 b1 ae 54 17 db ce 8a 20 c6 b6 bc fc 13 3d | 29 91 18 0b fc 52 60 8c fd 12 69 5d 86 76 11 74 | 46 fd d2 58 b1 fe be ff c4 c4 c6 5f 83 d7 cf 34 | c3 01 c8 7a 91 80 b7 ef 74 5c a3 62 f5 60 6a 4c | cf d1 fc d5 e1 e3 e5 03 d2 64 c5 4c c2 71 f8 bb | b4 d9 6e 2c 96 ff 80 02 58 58 ea a9 0c db 1c 88 | 0f 1b 7b b0 98 ce 52 9c 62 89 2d 5d 9e df 9b c0 | 69 96 c6 57 b9 61 03 d4 ef 9e 8e 04 60 f9 d8 dd | 76 af 39 59 4e 67 d6 8f 7d f1 0c 92 7e a5 45 5a | 4c 03 16 41 01 ee 32 b2 16 19 d3 18 f6 9b e0 b6 | 3e 00 c4 9c 5b 47 b2 39 38 6c 15 b6 1c a2 24 00 | 06 33 ae 2a 98 c5 04 ef 04 fe 24 77 ea 9b 67 ce | 29 00 00 24 a1 f3 98 2c 4e 26 e9 6b ef a6 65 fe | 00 84 6a ff e7 4e 18 31 75 d0 4d 6f 26 78 b5 49 | 18 f0 e9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 17 86 50 e3 f8 b4 0a 4f 2a 4f 7d | 73 f1 76 7e a3 4a cd 8d 00 00 00 1c 00 00 40 05 | fc df 4d 93 9e 5c 1e 3d 9d 16 a5 3a 60 66 f4 cf | 6b cd c7 5a | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #235 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 58 ca f2 cb c5 86 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 07 58 ca f2 cb c5 86 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.552615; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #236 | libevent_malloc: new ptr-libevent@0x7f49ac0121d8 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 49 21 f7 72 29 3d fd 39 d5 ec be 95 15 3d 5b | 95 69 d7 ae 45 89 cf b2 89 ac 8e 62 e5 5f 48 e1 | 2b 77 a3 ac 8a aa 97 a1 b4 1c aa 61 e4 47 d5 a2 | ba 50 bb 45 81 7e 4f 1a 00 0b be 71 6a 08 03 19 | 26 e5 eb ca 72 29 a1 9c c7 3b 00 10 61 8b 2f 00 | d9 2e 2f 62 3c d8 32 55 f6 0c 79 8f 9d bc 9d f4 | f4 e9 8a fb cc 48 28 fe 67 b7 2f 67 d2 30 12 70 | 78 d3 f6 cc 76 b7 cb 87 c3 b4 84 71 e2 d0 30 2e | 12 57 ed a8 80 f0 8f 76 f4 eb 50 03 69 74 1b ed | ad 46 14 34 21 d6 68 a3 88 6c e9 4a 62 2a ec 63 | b9 26 64 7d c9 35 7f 9f 87 f2 69 40 22 99 4c 5b | 72 f5 59 64 b3 a7 56 e0 a2 f5 ec 99 27 b3 39 18 | 61 60 85 ce 27 62 06 4a 7e f7 9a e3 35 2f 45 c1 | bc 81 fa c2 5f 09 29 08 69 b6 e3 f1 20 8b f5 74 | 78 e7 8c 64 a0 12 4e 8c 3a c5 d5 46 69 b5 0d 1c | 0f c3 c4 71 7d 51 b4 8d dd 7e b3 ab d5 e5 87 9d | 29 00 00 24 fe ba 94 06 0b ce ad 6d 1e 5b 11 ef | b8 eb b2 c4 e6 bc 3b 03 4d b4 e1 7a 7c 2c 32 e4 | ff 17 a3 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 7f cf 08 25 75 3b 9c 3b 5f a0 64 | b8 8a 20 48 8b 6a 60 d6 00 00 00 1c 00 00 40 05 | 20 4e 34 21 35 17 ec 24 14 9b 85 37 50 e1 db 55 | 5e f8 96 08 | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #236 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 15 ec 5f 0b 6e 0b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | e3 15 ec 5f 0b 6e 0b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0781 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad8af8 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.618052; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00734 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #237 | libevent_malloc: new ptr-libevent@0x7f499401d368 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a be d1 7b 39 c3 95 c7 cf 5f eb e6 52 69 88 54 | 1a e8 68 c5 82 8f ca 0c b0 b5 02 10 9d 3c 21 c6 | 7a 74 a4 ca a9 75 d5 66 58 08 0c 45 12 ee e8 6a | 6e 03 bb c1 a5 0e 98 48 ec a1 5f 77 1e 89 2f 26 | 2d d9 c1 57 9b 35 19 fc 99 4c 6e d5 42 e6 84 3c | bf 5c 26 30 cc 4c 3c cc ac 6d ca 95 19 de a7 0b | 5c 34 73 d7 a8 53 f8 d7 ae 68 00 12 4c 6b 49 2a | 33 15 10 cf 87 54 ed 8f 09 e2 55 3e b9 12 52 c2 | fd 2b 7f 7b 1c f2 f2 57 5b 0a bc 27 6a b0 99 1c | 00 0c 12 93 de 4f 34 bd ed 44 69 0a 30 3b eb 11 | 74 2a 41 a7 7b ec e6 a1 6e a0 2d 4b 70 3f 55 e6 | 2c 55 82 65 43 75 67 99 b8 99 2f 28 14 f3 2f 25 | 33 ec b5 57 05 ca 3a f1 5e 91 d2 75 d2 06 87 a8 | 95 bb fb b9 e6 05 a4 70 2f dd c1 55 52 a0 49 e8 | 53 81 93 5d c2 03 3d 3f 12 17 f2 73 2b 0d 4c 6c | b1 5e 43 ed 94 8c bb d0 74 e4 7b 90 16 fe a3 ea | 29 00 00 24 5e 75 9c b5 28 7f 99 22 30 69 98 d9 | 42 4d 43 04 cd 94 0d ce bb 10 f2 64 53 58 25 3f | c0 84 6d 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 37 64 5a b4 0c 2c f3 0a 64 52 b6 | 7c e4 5b b6 9f 4c 5f ff 00 00 00 1c 00 00 40 05 | 1c 36 8e 9a 9f ba a3 27 00 32 56 1b a6 16 c3 47 | 19 be 0d c9 | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad8af8 | #237 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1d 39 ff 4c e8 31 6a 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 1d 39 ff 4c e8 31 6a 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada278 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.682361; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #238 | libevent_malloc: new ptr-libevent@0x7f4988017a98 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f6 4f f3 cc a6 8d 1a d2 a4 b3 6f e3 f7 b2 ac | 8c 37 9e 4e 63 ae 95 65 68 3c b3 8c 13 ff 35 95 | ca a3 9d ea 93 c9 f5 48 aa 4b fa 4b de e9 db 5c | 9c 2d a0 ab 4d ba 54 28 fc 51 38 83 36 45 c2 bf | 2c d4 e3 2f 85 db 25 90 b9 af fb da bf c8 54 e6 | 3e b2 57 6e 12 3f 7c 15 82 81 8f c5 47 4b 62 8b | 0c 9c a7 87 50 d2 a9 f3 bd 06 b6 27 cb 73 3d 5f | 5a 40 ed 60 94 d8 10 3a f2 45 7f ea 94 e5 cc b9 | 92 d7 d1 8f ab 13 82 e1 50 d2 e3 86 65 37 e2 81 | 89 99 8d d3 05 ae 71 ab 3d 4d e5 e2 b2 37 2e 93 | 32 a0 c2 fd 49 bb 67 ba 35 d1 d1 d4 f1 4f 30 83 | 25 71 19 4f 3c 44 7d 25 ac 03 14 16 b8 3c b8 84 | f6 9b 2a ee c0 0c 16 a6 bc 1a fa a4 6b f8 1f 56 | 05 cf 59 cb b8 c9 b3 24 bb 7e 44 56 3e a9 32 63 | b2 40 31 0a d9 5e 8a 03 98 50 c0 db 20 a5 30 ab | eb 34 a9 b7 9a ad 56 27 65 5b ad b2 2e fc e9 f0 | 29 00 00 24 ab 65 21 ad ca 2e b6 cd 65 b9 aa 6c | 89 75 89 c4 7e 3c f3 b7 40 36 f9 78 27 3f 84 2f | e4 25 c4 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 1a 05 c0 f1 31 c9 fe da ce 51 76 | 05 4c 09 17 27 cb 7b 33 00 00 00 1c 00 00 40 05 | d9 4a bd 6e 19 a6 41 9d f3 14 af f1 e5 66 ad aa | 36 55 de 07 | libevent_free: release ptr-libevent@0x7f497c043c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada278 | #238 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 04 4e db f7 b3 e5 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | 54 04 4e db f7 b3 e5 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadb918 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.742716; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada278 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #239 | libevent_malloc: new ptr-libevent@0x7f497c043c48 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 c6 a2 e9 8c 08 c1 17 ec 4d 16 cc b4 6c dc 1e | 26 2a 99 85 00 d1 02 b7 6a 62 d1 fa 1a 70 6a 01 | a9 76 90 94 8f 97 63 04 7e 28 bc 69 6f 83 82 78 | df 5d 92 a6 43 0d 5e 4a a7 13 63 32 b4 c2 93 a1 | 20 63 4f 4f 6f e6 a5 52 11 7c bc 47 de 0b 16 22 | fc 6b 78 ed 12 46 40 7f f9 d3 00 d8 61 69 1c 4c | f2 b8 05 74 37 bc 7e 6b 04 15 c4 41 d8 5a 5c 48 | 16 37 9c c9 60 9a d3 15 d4 56 eb d2 fc 49 e1 6d | 5a 02 46 88 84 2a 64 a1 a1 81 5b 1f 8c 69 1d 7b | 21 97 36 fe 19 10 19 f5 2a 9a df 90 3c 7a 14 07 | cd 56 f1 f8 f0 24 0b 79 1f a1 f3 d2 f6 6f 97 a7 | ec e5 41 d4 46 a7 ce 5b bf 80 30 d6 de 35 a8 a6 | 06 2b 1f ed 9e a6 b1 b7 17 3d 25 8c 23 7b c5 7d | 3c 6a 42 a5 ce 9a 63 e3 9f 7c dd 4e 32 ab f3 f2 | a7 93 2a 1b 5a b5 02 43 08 92 c2 62 55 06 ed 9a | 30 3e e1 97 16 63 d6 80 60 e5 9d c3 07 45 b3 a0 | 29 00 00 24 f3 56 4d 65 71 cf 57 08 47 b9 2f af | d4 09 91 d1 1d 09 b8 bc e5 56 d4 1d b5 89 58 83 | 14 18 94 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db b6 d4 63 49 a4 30 05 5d 5b 95 e5 | 7e 40 d5 ac 10 c3 d7 96 00 00 00 1c 00 00 40 05 | e9 cb eb 1f f4 6f 3b 48 be 87 3b 3c 0c 7f 5c 1e | bd 78 26 4a | libevent_free: release ptr-libevent@0x55564dabfec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadb918 | #239 spent 0.477 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 63 b2 ca f0 cc e7 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b7 63 b2 ca f0 cc e7 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.804407; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadb918 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #240 | libevent_malloc: new ptr-libevent@0x55564dabfec8 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 60 d2 c8 3c b9 c4 48 4b b0 2f 28 d1 56 e0 81 | f2 58 dc 87 b3 1b e8 26 5e 22 94 4b 24 c2 ad ef | be 36 1f 24 3c 0c 63 fb 54 cc b3 34 9c 83 e3 48 | 96 c8 2d f1 44 9b b0 30 e8 f7 e3 ed 0d e1 8f 0a | 72 14 14 fb 99 45 94 9e 19 e6 ec ec e4 75 ba b4 | d5 04 7a 14 f5 d1 f0 bd 77 1c 4d 05 31 34 42 30 | e1 d5 90 94 db 22 55 e9 e0 25 5b f1 de e8 cb bd | b4 14 f1 7b 2c 48 e9 59 11 35 4f 29 9b e8 55 2b | 18 dc 63 97 ba f9 71 82 f9 4c cd 37 f4 25 3b 42 | 01 66 a3 e8 86 93 8c 6b c2 2b e4 5d cf 38 b6 be | 15 d3 6d 9b 1f d9 22 bc e7 c2 80 35 b9 f0 a0 05 | 64 03 e6 3d 81 6f 77 2a 42 8f 2f fc dd b8 a5 5e | c7 7d 91 dd c1 d2 12 6c 30 89 f0 85 ac b0 b0 a9 | 3b 33 53 b6 a6 17 db 74 c7 0a 6c 0f 54 df 42 01 | d6 f8 e2 3f 3c e9 12 1f a9 92 ad 66 b5 80 ce 72 | 38 a5 bc 5e 3f a2 21 29 32 ec a9 8c 7b f5 f3 f7 | 29 00 00 24 1a b7 39 c3 f0 55 93 2d b4 ed 6f 12 | 1c e0 4c 9f a3 0e 04 78 f1 b4 9a 02 e7 48 ee 93 | 61 a0 19 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 2c dc a6 dc 14 e0 aa 78 20 4e ae | 44 56 54 2c 7a f8 d0 b3 00 00 00 1c 00 00 40 05 | 33 a0 9b db d6 7c 28 78 1c 19 ca cf d5 d9 5d 40 | 23 2f de 88 | libevent_free: release ptr-libevent@0x55564da37d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #240 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 38 83 15 4d 49 9f ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 53 38 83 15 4d 49 9f ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.870781; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #241 | libevent_malloc: new ptr-libevent@0x55564da37d98 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 49 be a7 d8 2d c9 c3 7f 87 05 c3 06 a7 65 c5 | 82 45 1d 8e 5a b0 3d 7f aa a0 02 f7 96 a1 73 ef | bb ea 83 28 03 50 0d 69 11 5e b6 64 13 e6 ec e4 | 4b c5 8e 4e 13 1f 92 96 e9 9c e8 09 c8 61 3b a0 | a5 65 1f 8c 98 e8 cf ce 12 68 3b 68 31 ae 1d 56 | ec db 53 ae bf 5b 2b 70 a4 ad 55 bc 9b 13 33 7f | aa 6d 82 46 21 93 92 d8 e5 88 a9 c3 46 66 d4 a2 | 16 8b d5 33 9f f7 a7 59 20 fe c3 03 8c 05 11 71 | 06 0f 8f 5c 30 1e 8b e2 73 01 4c f2 81 ab 04 f2 | c9 25 89 6a f3 ca 3e c9 98 d0 6b 7f 9d da 6b 21 | e5 fa 79 81 bf aa 31 0e ae 46 8c 1e 9b d8 37 50 | f6 bc 2a fc 04 82 74 f0 67 69 08 40 d1 a9 3b ed | 04 02 aa c2 32 7e df 64 66 73 10 15 69 99 26 ad | a4 3b a1 e3 a0 1f a6 e9 b8 de 7f 2c 11 78 80 1c | 5e 60 61 f4 24 3d 9c 01 63 5b 7e fe aa a4 6a 3c | 3d 48 94 68 3c a2 4e 9b 06 42 fd f3 28 70 6d bb | 29 00 00 24 27 32 67 11 e5 d8 df 0a 44 2c ad 21 | 3d 67 e6 fc 32 ea d4 07 16 54 6c f5 f0 3b 16 06 | 8a 4b 3b e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 ea 9a 52 7f 3a 1e a5 5e 6c 08 d5 | 2c 87 73 de 60 c8 dd 35 00 00 00 1c 00 00 40 05 | 86 ac 13 0d fc 18 ab 6c 1b 36 3a 6f e0 9a 8d 5f | 7e c2 be aa | libevent_free: release ptr-libevent@0x55564d986f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #241 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 72 0a 38 4d dc 78 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | d8 72 0a 38 4d dc 78 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.935084; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00829 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #242 | libevent_malloc: new ptr-libevent@0x55564d986f58 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 ff 81 ad 13 22 13 61 d5 e7 5d 61 d5 67 3d 57 | c6 83 4d 3c 7d 34 c2 3b 4d f1 bf 0a e6 f6 0b f4 | 20 84 a0 05 d6 08 8a 42 4a d6 0c 10 2f c2 d8 f5 | 67 97 64 ae 5a d2 fa 13 2c 25 59 d4 d1 a1 c6 80 | 3a fc 2e d6 a9 11 af d8 1b 6a 54 95 19 ef fc 38 | 3f 05 eb 9d e7 7b a9 d2 d5 2d e2 96 4a 93 52 3b | 77 2f 0f 6c a1 85 ba a9 f1 78 e0 36 5b 3c 40 df | 80 13 61 08 20 2a ea 90 c8 a2 cd d3 47 b5 99 66 | 11 e7 bd 5b 90 a5 16 13 df 5b 63 f7 d4 39 56 a4 | 95 73 be 6b 57 92 77 f1 8b 02 b1 fc e1 2f dd 3f | 02 82 52 bb 92 df 67 88 ca 8b a1 7a 11 e4 ec 11 | 85 5a 18 37 f2 3a 72 6f 2c 88 34 aa ac 9f 22 5b | f3 95 d2 e5 21 4f a6 a2 27 56 49 0d ec d8 30 a2 | 93 a6 eb 4f 34 23 69 ef e2 f6 1a 6e 07 82 17 94 | 66 f8 36 4e 19 a3 ff 0b 18 56 00 df 09 65 40 34 | 46 90 1d 49 fe c8 d7 10 a3 25 8d 98 d9 e1 17 b3 | 29 00 00 24 36 2b a9 53 43 47 3c a6 73 19 99 01 | 12 c9 cc b6 4f 4f fe de 96 d4 04 0e b2 a2 c9 97 | 84 00 d9 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 55 04 41 5a a4 51 07 c9 57 74 4a | 05 c5 00 f5 b0 b7 b4 41 00 00 00 1c 00 00 40 05 | 91 35 7a 8d e1 e9 c4 5c 94 0f 18 d5 8c 06 3d 01 | 00 ed 3c 6c | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | #242 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 06 00 17 91 9f b9 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | da 06 00 17 91 9f b9 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10623.996456; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #243 | libevent_malloc: new ptr-libevent@0x55564dab2ec8 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 ae 4a a9 9f 42 8c 76 df 85 62 36 8a 87 0c e7 | ea ee 29 a3 d6 ef 37 e4 de ad 78 50 44 23 8a 95 | 8a 46 4a 00 b3 7b 58 f4 44 16 50 61 5d 78 9f ff | 75 8c a1 90 d5 2d 01 d5 71 d8 09 0c 45 ea 4c b8 | 20 ef 97 e1 26 b1 64 de 72 79 80 bb 01 07 33 da | a8 4f 6b 1e 1a d9 c3 b2 a1 52 a2 d8 7b 9e d8 1b | 71 d4 b3 60 fa 77 f6 f8 65 21 47 60 b8 bc 08 2c | 66 82 b4 5e f7 eb ff f2 39 3d 99 50 bb 1e 18 24 | 9f 0b e8 92 10 58 f9 5f c8 f3 08 9b 0d 40 16 bb | 96 7e a7 83 f7 58 d3 7d e0 d8 11 e9 4c 88 04 24 | a3 43 06 f3 61 47 ce f3 44 e8 d4 83 90 71 c6 c7 | cc 70 88 5d 67 dd 80 b5 b0 9d 57 3b 55 25 e6 63 | ee 94 55 70 71 24 a2 a3 f6 91 d0 31 d5 31 40 64 | 61 bf d1 48 1b f0 d7 29 6b 7d ab 5b d4 c5 83 42 | 14 23 f9 d7 e8 b4 e3 65 93 fd e0 e3 20 6e 7e 6c | b7 69 05 db 19 87 ae ac 3a 29 1d ee 39 d3 4b 84 | 29 00 00 24 88 6f e7 1d 28 72 47 bf b4 5b 12 1e | 30 fc 02 b1 63 f5 5c 70 f8 99 73 52 5a bd ae 17 | e6 76 c6 69 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 4a c8 12 13 6a b2 87 02 d8 60 6b | 8b 30 51 9c 74 d4 9f a9 00 00 00 1c 00 00 40 05 | 0a ee d4 33 b9 7f d7 24 6e 95 ee 8e b6 56 d4 59 | 74 1a e9 4f | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #243 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 07 95 81 ab 47 9a 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | b1 07 95 81 ab 47 9a 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae2c98 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.060855; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #244 | libevent_malloc: new ptr-libevent@0x55564d991478 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 9c ca 9c 5d 0e a8 66 2b af 02 13 00 db fa bf | 51 d0 52 0a da 57 62 46 c6 b6 3c 65 f1 a8 42 59 | ea bc 10 e1 c5 d6 8b d7 2f 3f e8 ad 76 da ab 24 | 0d b7 a3 15 88 f8 bd 1c 3b f9 5c d5 24 12 be 14 | 33 a0 98 8e b8 6c 3f 3c 07 c5 bd 08 56 b4 d8 ff | 4c 94 20 3b 42 4b 7f 15 3c 68 cb d4 c4 16 47 f8 | 09 73 ff a5 76 2d 19 f5 3e 19 eb 6f 17 1b 25 1d | 37 72 c0 39 13 0e d0 f7 e2 8a 35 94 84 4d e3 2c | d5 cd 3d 4e 88 7f cf 16 cc 54 f4 7b 83 31 96 49 | 5c d1 8c c0 fb b3 49 3e 65 d0 54 95 3f 5c 6f 5b | e5 6a 88 5a a0 90 d4 17 fe 07 d9 ca 50 16 3b 3a | f3 9d 78 52 37 9f 5d a8 74 0e 91 65 31 6c bd 14 | de b7 65 9b 97 78 95 7a 2d c5 16 96 86 c9 2c c8 | d7 9a 0a 87 93 3c 4e 4c 06 d9 a3 2a 4d 19 b8 e9 | 3f ce 4d 12 1e 9a 0d 81 9a 3b 91 57 81 76 df ca | 13 14 f9 31 ef 79 12 6a 91 e2 51 23 9d f6 e8 92 | 29 00 00 24 53 30 07 71 24 3d 4d 97 0c 26 9a e6 | 93 3f 94 ef 87 6d 4c 6a 2b 62 3b 99 0a f1 a3 1c | 62 6c fd fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e3 42 f9 29 03 d1 13 78 b6 bf 67 | 57 46 2f e2 a2 e2 5f 8f 00 00 00 1c 00 00 40 05 | 3f 5a 5c fd cb 17 01 9f 67 91 05 7b 06 e1 b0 b0 | 89 9e 25 45 | libevent_free: release ptr-libevent@0x7f49b40465a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae2c98 | #244 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 37 69 e3 5d 15 b3 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 2d 37 69 e3 5d 15 b3 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.126191; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae2c98 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #245 | libevent_malloc: new ptr-libevent@0x7f49b40465a8 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ea f6 85 72 19 e3 a6 4c c8 3f 37 0f 2d 2c d0 | 8b 5b 85 5a f2 90 1e 43 53 27 86 fb 65 57 4c fd | 83 1c 4d c4 78 8b bb ac 46 40 f4 69 59 d3 0c 21 | cc d2 e0 5a ce e1 5a 5b 15 5b f2 a2 e5 f4 f6 b4 | b4 ae a3 59 1c 48 c9 33 af 52 74 fc 4e b0 1d e1 | fe ee 10 fe 1b cb 6c cf 02 0d e3 64 0e 1d e8 67 | cc 8d a3 9c 76 f7 64 f7 b9 3c 50 c4 a7 e9 35 98 | 14 4d 5a ac 37 cc 53 91 d8 5e b9 8d fa 8e f9 a7 | 70 a1 7b 55 59 83 d4 a0 66 d8 0b 80 f9 5e 2c 6e | df 3f 9e 45 d3 95 c5 87 aa a3 27 d7 d4 10 ff 2c | 95 d6 c2 53 e0 4f 32 0d 89 39 ed 72 ec 29 54 96 | c5 73 cd 24 65 1c 45 80 d5 eb 8b 6e 89 f0 70 f0 | 5e c6 21 e3 54 a0 45 68 3e b5 65 61 4f 63 f7 d5 | 39 cb 91 03 fe 33 a2 4d aa 33 bd 12 e0 7b ce f4 | 2e 3d 91 2a 58 37 6b 12 89 ce 93 ba 34 e7 ad 0e | 46 7f 16 cf d5 64 d1 8e cf f5 86 26 85 b1 94 8d | 29 00 00 24 78 7c a1 ed 0b b3 d6 c5 b0 6c 96 37 | fe 72 ba 8d f9 b6 4e 85 37 bd 03 8e 23 ae d3 f2 | b8 34 c5 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ce ca e3 32 0b c9 de 11 4f e4 a0 2e | 34 97 ba f3 b9 b4 7e 5f 00 00 00 1c 00 00 40 05 | 6c a6 04 0f fc 61 64 22 f4 e2 08 62 e2 ca 28 26 | 09 4a 0d 18 | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #245 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 c7 f4 3b b8 1f df 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 77 c7 f4 3b b8 1f df 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.194613; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #246 | libevent_malloc: new ptr-libevent@0x7f49b001d368 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 51 00 84 b7 16 34 67 77 4e 54 ef 6d d0 9e 7b | 2d 18 68 d3 f7 9c 74 7c 5e 47 6f e2 a1 b1 90 82 | 5b 42 48 2a ab 23 a8 8b e0 87 e6 12 75 00 82 ca | 84 0c 3f e8 53 56 64 c0 6b a2 56 10 96 16 3f 0b | e3 bc ba 7b 42 99 a7 1b fd ac a1 c3 23 12 a5 4d | 8f d0 c1 4b 87 19 4a 60 84 e0 1d e2 75 0a 7f 62 | a5 b8 c0 d5 60 78 70 6b b6 9b f0 58 22 65 60 85 | ba c3 2f a7 a7 f1 b3 02 25 e3 1f ea 82 bf 5e e2 | ce 51 82 93 1b 65 64 20 51 9c 89 77 35 f3 f7 74 | 7f dd 90 42 a5 67 36 d1 7c 7f 7f 18 d2 59 c3 ac | ad 40 be a8 f5 e3 db ca fd d1 a4 d1 32 e1 de ad | 3c 8e b3 34 e7 eb df e1 0f 32 ae 00 81 45 fd c7 | 4a 7d 97 95 ee 81 4a 48 57 8e d2 30 37 1c f3 c2 | bb c9 7b d4 d1 15 60 a0 ed 43 06 6f eb d6 4f 3c | 0a 6a ba d7 ad ca db a0 12 92 d8 59 39 1b fb 7b | 7c aa ef 69 57 15 89 51 82 77 b2 09 fd 35 a9 2d | 29 00 00 24 1d 20 11 94 69 02 a8 f8 2e 41 1f 9f | 7d 8c 56 49 70 2b 2d 4c 5a 43 19 8d d7 7a a9 06 | 3a b5 53 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 26 df 98 f1 c4 fe fa 1e 3d d7 c0 | b2 18 cc 42 6a d5 0a 40 00 00 00 1c 00 00 40 05 | 7b c4 60 d5 2f 31 37 4d d2 02 0b ad 92 de a3 30 | 25 3f ac 20 | libevent_free: release ptr-libevent@0x55564dabd188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #246 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c2 c3 f7 24 b4 1a 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | 69 c2 c3 f7 24 b4 1a 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.259002; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #247 | libevent_malloc: new ptr-libevent@0x55564dabd188 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a2 24 40 2c ab 27 83 a1 39 66 6e 41 43 bb ee b3 | 18 61 4f 46 d0 bf 2e d9 e5 6d 77 e0 6c 87 eb c4 | 63 ae 09 56 a5 7b 52 2a e7 ee 43 45 a3 ae 32 a0 | fa 51 7e e8 46 bf 29 df d4 24 76 eb 7a 18 c0 60 | 21 75 b9 31 79 44 53 bc 43 2d 31 c2 3f af 1a 0c | 4c 63 9e 18 f5 42 95 c0 c2 1a 4d 37 09 63 59 bc | 24 65 5e 6f 92 d9 57 63 58 89 3a ee e8 7f 4e 2d | c1 f4 5b c8 1d 75 d9 25 e2 61 4d 73 de 17 21 09 | d1 4c fd ee 1a f1 66 54 cc da 69 92 86 85 27 aa | 1e 1a 17 dc 16 f8 08 d1 a0 a2 3a e1 e4 b0 26 4e | c6 08 e2 17 33 6d 93 0c ec fa af 00 d6 4c 54 f0 | 8e a6 b1 e6 a3 95 9c e1 f7 aa 3c 97 9a 2a b3 5a | 62 9d 00 32 ad 03 63 0d 82 44 36 ee 85 e7 c1 ac | 28 c1 e4 74 48 84 64 9f be 70 d4 e3 2e 2d ff 65 | f6 db 7e 84 64 4c f8 80 28 7c e2 b2 19 47 0b 35 | 09 0e 4c 45 cf b6 a5 40 a8 30 0c b5 39 77 ce 6c | 29 00 00 24 83 1b fc 7f 35 28 96 82 2f 3c 58 53 | 9c 8b ad e5 97 9b a3 6a 49 2e 5e 9a f8 3a 1d 15 | af 18 0c 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 56 7f a9 b5 8f 5d e1 10 27 ea 91 | 30 9c 06 c1 21 6c 35 7f 00 00 00 1c 00 00 40 05 | 4e 99 23 6d e9 27 6f 0e cd fd c0 40 0d bb 2c 64 | d8 62 3b 3a | libevent_free: release ptr-libevent@0x7f4978028358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #247 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 43 d6 68 29 45 8d 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 25 43 d6 68 29 45 8d 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0822 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.323405; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006416 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #248 | libevent_malloc: new ptr-libevent@0x7f4978028358 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae a7 e3 29 de 2f 49 d1 a5 b3 56 59 b1 20 96 e3 | 5f df 0c 45 40 74 18 a1 65 94 ed 9f 62 b7 f5 1f | 85 19 65 5e ec 04 bc 38 31 ee ca eb 76 19 2c 02 | 99 d8 7e 89 50 f7 0b b5 e4 8f dd 59 01 ac 11 3f | 33 93 38 33 72 3d 76 07 5e 07 c8 37 27 cd 8a eb | c2 23 e5 df b1 ee a5 48 06 f2 6f be 7f 23 d3 31 | 8a 1c cf fc ca 7a 80 ac 0f 61 20 9e 1f ba 3c db | 15 b7 7d 0b 50 05 07 db 71 41 b0 9f a6 1a 67 1f | 30 c8 b8 8c c5 29 4c c8 5f db 33 5a 24 70 05 c4 | c5 2f 5e 0f ab 0f 5b d7 f3 27 00 5f bf 49 97 b5 | 6d 81 9b 5f e1 6b 19 45 c1 b7 f4 2a a7 d9 c6 2a | 5b 40 40 a3 19 42 63 1c 2a 0b 44 b1 fc 57 87 b6 | 51 3d 0a f8 94 de c9 05 36 ea a5 e4 b3 ef 73 40 | 72 65 fb a3 6c 9a c3 15 94 be 46 e0 02 a1 aa e1 | 0a c5 f4 bf 0d 73 37 86 3c 4e 4d 9f 07 4f 90 7f | ec 39 ee fb 84 59 f9 1f c2 d4 95 8e b8 ae 0c a7 | 29 00 00 24 5d 5e b5 5a a4 6b 09 49 e5 e5 fe 4e | d6 14 74 fc 53 70 22 d8 8c 94 08 05 05 7d 9a cd | 29 d5 aa ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 58 de ff fb 89 83 db eb 24 01 76 | c3 fd 95 90 ea 65 b5 54 00 00 00 1c 00 00 40 05 | 2d ec 4e f0 c9 36 a1 c2 32 da ac 22 d2 3b cf 5a | a1 54 64 9b | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #248 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 53 90 91 21 06 45 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 48 53 90 91 21 06 45 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.386808; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #249 | libevent_malloc: new ptr-libevent@0x7f49a40282d8 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 42 72 16 60 69 47 e0 5d 54 b2 06 42 44 14 a9 | f3 a3 46 69 fb 3b af 44 fe 39 7b 61 ec 23 f2 06 | fb db 05 0d 85 b1 54 8c 78 79 93 33 6e 50 c5 af | 7d d9 19 fc d1 1e 3b 14 85 01 03 2d 2b 09 58 7a | c4 bb a9 4e 7f 1f d9 d7 90 ce 2c 32 a1 d6 ef 9b | cf fe 7c 3e 8c 8c 95 a7 7a ec 20 78 2a ef d4 5e | f7 06 7f 55 0b 2b a3 6b d1 97 e9 39 4d 1e df 9e | a9 46 85 e3 6c 37 cb cf b1 6e d2 f6 d6 c9 f8 2c | cc b9 31 fa 4d 0d 6e f0 21 46 f2 fd 51 3d 7c 56 | b7 ef f6 9d 4c 3f 38 2e ef f3 d8 0c d2 b3 a9 f2 | dc 8f 6f a5 5a c3 0a f4 3f 54 fb 20 ed c1 a0 b9 | 76 ce b1 59 dd fc e9 33 48 54 8c 5f 2f b1 61 50 | 8a 0b 61 a3 01 05 f2 f4 0d 0f 73 52 99 04 99 6d | 6c fc ac 0e cb 86 a1 2c f9 f9 d6 e6 04 0d 4b fe | 98 9c 6e ce aa 33 bb d8 9d 5f db 4c 40 8a 06 38 | 39 a0 d8 cc ef ba 52 0f e9 8f a0 51 10 43 41 23 | 29 00 00 24 fd c9 a9 43 c2 11 16 05 b0 1c 9c ce | db f0 82 31 94 27 c2 25 ab b0 f3 15 d2 7b 2b 68 | 04 bb cf 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 e5 1a a4 e0 9d 3d e4 c5 6b 5f 00 | 6d af ba 79 f8 4c 99 26 00 00 00 1c 00 00 40 05 | a9 53 e2 fd d9 d6 c7 51 65 75 e4 bb 7e 18 d7 6c | 38 88 ad ed | libevent_free: release ptr-libevent@0x55564da5d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | #249 spent 0.528 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 7b b2 13 b1 62 f1 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | 53 7b b2 13 b1 62 f1 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.452574; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #250 | libevent_malloc: new ptr-libevent@0x55564da5d668 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b5 ee 35 0c 8c 22 34 ea b2 58 e3 96 50 e5 92 | 01 6b a3 89 5e 20 85 c0 aa 50 dc f5 39 b3 2e b6 | ba 03 a0 1b e1 d0 be d3 30 07 f5 e8 36 52 b1 45 | 1a b8 a2 2b 1a 43 55 93 bf ac 63 30 8c 57 ae ba | 29 5b b7 ce f6 54 c3 4a 80 7a 98 90 ca 0c 9b 74 | 93 41 c5 6e 4b b7 47 dc 06 3d a7 2d 1b 1d df 44 | ec 93 7c 78 e1 6f 2a 23 81 5e 4c 4d 57 ce 6d 8e | ae ec f6 c9 02 ef fe 79 be 33 03 ae 41 c7 92 f4 | 81 75 c9 d2 79 5a 15 a6 c9 70 7e 2d 6a 1a 59 c2 | 08 7c d6 4b ba ae b9 d1 b9 06 02 85 d1 c1 3a 27 | 38 27 39 d6 4b d6 c9 b2 b5 41 88 ce 4f d7 c6 eb | 5e 7e 81 28 4a 9d 2f cf a6 87 e1 19 eb 3a 08 22 | b5 46 41 8a 5b 23 ac 03 b1 6c c6 ef 54 74 94 40 | 36 d5 32 09 c9 8e bf 95 d2 85 c7 30 1c da a0 60 | 22 2f 07 3e 0d 2e 44 01 fc 35 47 68 bd ce e8 04 | 30 71 aa 76 a1 87 a4 6f 23 73 e7 02 73 5c 3a 23 | 29 00 00 24 1b 6c f1 5c d9 db c3 92 a2 0c 8c 48 | d8 3f 92 d2 2f e0 37 4a 54 28 32 20 74 ed 33 99 | 50 a3 3f 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 24 08 82 71 ed 0c 22 7f 92 62 8f | 7b a2 71 47 90 d9 68 52 00 00 00 1c 00 00 40 05 | 6b 4a 07 68 d3 c5 1f 68 3b 57 1b a9 1d 83 1f e3 | 91 c5 93 7a | libevent_free: release ptr-libevent@0x55564da5ed78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #250 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b3 f5 9f 3d 17 ff 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | d9 b3 f5 9f 3d 17 ff 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daece78 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.514856; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #251 | libevent_malloc: new ptr-libevent@0x55564da5ed78 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ae 4b 55 3c 12 84 49 4e bf 98 fb 6c 39 c3 f2 | a1 8c 69 97 a2 7c c1 d2 11 df 29 4b f0 be 66 09 | 99 c5 38 51 4a ba 75 a7 aa c4 8a 04 da 7d 6f 99 | 38 68 1d 51 b0 f8 bc ea 2e 80 a2 e3 80 f3 0c b6 | ee db 59 12 75 0b c9 09 68 dd e2 5f 67 29 38 26 | 0c 0e 7a 57 38 d3 74 04 47 29 ae 7b 94 70 cb 59 | 78 31 c7 51 59 1a 9e 63 85 98 14 e0 1d 50 5c bb | 71 65 0a d9 c8 cc 89 cc 32 4d 77 67 3f f9 0d 32 | 39 ce 17 ab da 9d d7 b2 0f 21 0a bd 2e ae 60 cc | d4 d4 10 89 d7 d0 0e 18 b9 c7 3d 18 37 66 f3 6a | 2c fd e7 69 08 24 da 27 67 6f 9a 98 36 6f fd d0 | 45 1a 16 f7 07 3d d7 cd 99 59 cb 4c b2 4f be ba | 71 05 db 33 1f 12 03 a7 26 e7 c5 76 59 42 26 92 | c7 85 e0 01 29 4c b1 03 af ed d1 69 0f c6 84 f8 | 5f ae ec 44 07 de 39 36 77 3d cb b7 67 93 e9 ae | 7d b9 e7 a2 dc b7 1d 46 fb f4 7e e7 9f c6 52 ab | 29 00 00 24 39 27 23 ef 10 68 27 17 33 d0 9b 1d | f8 af 44 ad 34 e0 54 74 a4 14 64 18 7e e5 dd 21 | f2 f6 50 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 69 d9 a2 76 51 6e 8e 02 2e 49 90 | 2c 5c c9 eb 39 d5 be 75 00 00 00 1c 00 00 40 05 | fb c2 08 3f 07 22 61 32 47 50 ca 74 06 3d b4 7c | 05 e4 71 c1 | libevent_free: release ptr-libevent@0x7f4994049628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daece78 | #251 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 37 f2 d0 67 1a 0a 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | e5 37 f2 d0 67 1a 0a 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 7 | retransmits: current time 10624.575154; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daece78 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #252 | libevent_malloc: new ptr-libevent@0x7f4994049628 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 23 75 62 6e 25 38 ef b7 c0 61 52 0c 81 2c 51 | 50 02 4e 3e 68 e1 d6 29 11 af e9 c6 04 0a 01 1f | 91 5c 94 33 d6 5d 97 2e 63 20 8f 3b 6a f4 28 fe | 93 72 47 e0 84 e4 28 f6 14 ad f0 8c b9 30 cd c5 | 3b a6 b8 91 63 30 6e 67 d1 a0 0a 7c 39 24 20 cc | 1b 2c 72 fa 7d 16 e5 b6 ae 94 fc 54 bc d9 3f 90 | 09 7b a7 d6 26 8a 00 54 26 d6 f5 ac 03 29 db 8c | d7 87 54 46 de 11 8d ab 79 7c cc 91 da 58 d1 d7 | db c2 bd 59 1b ad c1 ce 94 eb cb ea cf 32 97 4c | 3a 56 7d 86 c4 76 2f f9 0e 4b 8f c4 8d b5 8f 74 | 39 25 eb a9 4b de 42 a5 8d a3 b2 98 4d ba 3f 33 | b4 5f 7e 29 55 d5 19 6d 17 9f 49 e8 d8 68 fb de | 1b ae 69 f0 66 40 37 49 d9 e9 26 48 ad 86 a8 26 | ca 58 91 40 4f 04 17 a1 ef d4 37 10 ba 7a 2c bf | 0b a1 dc 8b 94 19 10 fc ba dc 1e 13 34 4f 12 de | c2 08 28 ea 56 39 86 5c 3c 98 e8 82 74 06 04 36 | 29 00 00 24 be 26 d2 2a 5a ab aa fc ac 80 74 cb | b5 86 03 88 91 37 51 7f e7 89 87 22 c4 21 9d 3e | d3 c1 e6 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 52 9c 3b b1 f5 35 58 af c5 b0 1c 28 | 15 ad 31 b6 25 ff 60 ab 00 00 00 1c 00 00 40 05 | f7 18 81 fb 6a ad 98 6f 35 8e c5 8f 00 d1 ed 31 | ed c4 9b 99 | libevent_free: release ptr-libevent@0x55564dace8a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #252 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 4d 4e e2 da b9 00 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | c8 4d 4e e2 da b9 00 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_PENDING_DDNS | FOR_EACH_CONNECTION_... in connection_check_ddns | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | elapsed time in connection_check_ddns for hostname lookup 0.00006 | spent 0.0669 milliseconds in global timer EVENT_PENDING_DDNS | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00328 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10639.985822; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012113 exceeds limit? YES "road-eastnet-nonat-1" #1: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-1" #1: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #253 at 0x55564daf0998 | State DB: adding IKEv2 state #253 in UNDEFINED | pstats #253 ikev2.ike started | Message ID: init #253: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #253: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #253; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-1" #253: initiating v2 parent SA to replace #1 | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 253 for state #253 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #253 | libevent_malloc: new ptr-libevent@0x55564dace8a8 size 128 | #253 spent 0.152 milliseconds in ikev2_parent_outI1() | RESET processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #1 ikev2.ike failed too-many-retransmits | pstats #1 ikev2.ike deleted too-many-retransmits | #1 spent 2.51 milliseconds in total | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 14 resuming | crypto helper 14 starting work-order 253 for state #253 "road-eastnet-nonat-1" #1: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #1: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #1 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 253 "road-eastnet-nonat-1" #1: deleting IKE SA for connection 'road-eastnet-nonat-1' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-1' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-1 | State DB: deleting IKEv2 state #1 in PARENT_I1 | parent state #1: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49bc046648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | in statetime_stop() and could not find #1 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 253 time elapsed 0.0008 seconds | processing global timer EVENT_REVIVE_CONNS | (#253) spent 0.785 milliseconds in crypto helper computing work-order 253: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 253 for state #253 to event queue Initiating connection road-eastnet-nonat-1 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #253 | libevent_malloc: new ptr-libevent@0x7f49900491c8 size 128 | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-1" | stop processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:349) | spent 0.103 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 253 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #253 | **emit ISAKMP Message: | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | ikev2 g^x 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | ikev2 g^x 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | ikev2 g^x fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | ikev2 g^x 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | ikev2 g^x 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | ikev2 g^x 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | ikev2 g^x 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | ikev2 g^x 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | ikev2 g^x c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | ikev2 g^x 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ikev2 g^x ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | ikev2 g^x f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | ikev2 g^x 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ikev2 g^x ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | ikev2 g^x 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 e8 07 ac f0 | IKEv2 nonce 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 7a 4f 29 e6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d3 10 73 8d c2 b0 5b eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 01 | natd_hash: port=500 | natd_hash: hash= da dd bd 77 c5 6b 31 65 18 90 fc b8 37 4c f9 9d | natd_hash: hash= 83 6a fa fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da dd bd 77 c5 6b 31 65 18 90 fc b8 37 4c f9 9d | Notify data 83 6a fa fe | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d3 10 73 8d c2 b0 5b eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | natd_hash: hash= b2 85 55 b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | Notify data b2 85 55 b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #253 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #253: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #253 to 4294967295 after switching state | Message ID: IKE #253 skipping update_recv as MD is fake | Message ID: sent #253 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.1:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | state #253 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55564dace8a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f49bc003878 size 128 | #253 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10639.98762 | resume sending helper answer for #253 suppresed complete_v2_state_transition() and stole MD | #253 spent 0.587 milliseconds in resume sending helper answer | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49900491c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0815 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.105028; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008033 exceeds limit? YES "road-eastnet-nonat-2" #2: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-2" #2: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #254 at 0x55564d982518 | State DB: adding IKEv2 state #254 in UNDEFINED | pstats #254 ikev2.ike started | Message ID: init #254: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #254: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #254; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-2" #254: initiating v2 parent SA to replace #2 | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 254 for state #254 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f49900491c8 size 128 | #254 spent 0.268 milliseconds in ikev2_parent_outI1() | RESET processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #2 ikev2.ike failed too-many-retransmits | pstats #2 ikev2.ike deleted too-many-retransmits | #2 spent 3.14 milliseconds in total | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 15 resuming | crypto helper 15 starting work-order 254 for state #254 "road-eastnet-nonat-2" #2: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #2: PARENT_I1(half-open IKE SA) => delete | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 254 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #2 "road-eastnet-nonat-2" #2: deleting IKE SA for connection 'road-eastnet-nonat-2' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-2' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-2 | State DB: deleting IKEv2 state #2 in PARENT_I1 | parent state #2: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 254 time elapsed 0.002654 seconds | (#254) spent 2.63 milliseconds in crypto helper computing work-order 254: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 254 for state #254 to event queue | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b8046fb8 | scheduling resume sending helper answer for #254 | libevent_malloc: new ptr-libevent@0x7f4984046588 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | in statetime_stop() and could not find #2 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 15 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-2 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-2' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-2" | stop processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:349) | spent 0.164 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 254 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #254 | **emit ISAKMP Message: | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | ikev2 g^x a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | ikev2 g^x f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | ikev2 g^x 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | ikev2 g^x 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | ikev2 g^x d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | ikev2 g^x 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | ikev2 g^x 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | ikev2 g^x d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | ikev2 g^x 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | ikev2 g^x 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ikev2 g^x ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | ikev2 g^x fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | ikev2 g^x 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | ikev2 g^x f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | ikev2 g^x c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d4 42 99 42 06 69 a3 05 c0 fa ef 33 7c 49 2c 5b | IKEv2 nonce d5 52 b2 60 63 21 13 77 12 b6 64 c7 08 fa fb b9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 67 3e 0c 64 12 56 91 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 02 | natd_hash: port=500 | natd_hash: hash= e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 a9 68 32 7c | natd_hash: hash= a0 13 65 e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 a9 68 32 7c | Notify data a0 13 65 e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 67 3e 0c 64 12 56 91 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | natd_hash: hash= 15 a9 66 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | Notify data 15 a9 66 5d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #254 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #254: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #254 to 4294967295 after switching state | Message ID: IKE #254 skipping update_recv as MD is fake | Message ID: sent #254 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.2:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | state #254 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49900491c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f49b4003878 size 128 | #254 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.110115 | resume sending helper answer for #254 suppresed complete_v2_state_transition() and stole MD | #254 spent 1.51 milliseconds in resume sending helper answer | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984046588 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.167692; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009493 exceeds limit? YES "road-eastnet-nonat-3" #3: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-3" #3: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #255 at 0x55564d983698 | State DB: adding IKEv2 state #255 in UNDEFINED | pstats #255 ikev2.ike started | Message ID: init #255: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #255: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #255; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-3" #255: initiating v2 parent SA to replace #3 | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 255 for state #255 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f4984046588 size 128 | #255 spent 0.284 milliseconds in ikev2_parent_outI1() | RESET processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #3 ikev2.ike failed too-many-retransmits | pstats #3 ikev2.ike deleted too-many-retransmits | #3 spent 2.3 milliseconds in total | crypto helper 16 resuming | crypto helper 16 starting work-order 255 for state #255 | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-3" #3: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #3: PARENT_I1(half-open IKE SA) => delete | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 255 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #3 "road-eastnet-nonat-3" #3: deleting IKE SA for connection 'road-eastnet-nonat-3' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-3' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-3 | State DB: deleting IKEv2 state #3 in PARENT_I1 | parent state #3: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 255 time elapsed 0.002715 seconds | libevent_free: release ptr-libevent@0x7f49b0049338 | (#255) spent 2.71 milliseconds in crypto helper computing work-order 255: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | in statetime_stop() and could not find #3 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 16 sending results from work-order 255 for state #255 to event queue | scheduling resume sending helper answer for #255 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49880465f8 size 128 Initiating connection road-eastnet-nonat-3 which received a Delete/Notify but must remain up per local policy | crypto helper 16 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-3' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-3" | stop processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:349) | spent 0.192 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 255 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #255 | **emit ISAKMP Message: | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | ikev2 g^x bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | ikev2 g^x 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | ikev2 g^x 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | ikev2 g^x 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | ikev2 g^x a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | ikev2 g^x 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | ikev2 g^x 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | ikev2 g^x 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | ikev2 g^x 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | ikev2 g^x 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | ikev2 g^x 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | ikev2 g^x 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | ikev2 g^x 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ikev2 g^x ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | ikev2 g^x 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 fe cf 12 0f | IKEv2 nonce c6 89 63 53 55 66 6b 21 6e 20 f9 45 0c 95 cc 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c 6a f2 a5 e4 93 d7 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 03 | natd_hash: port=500 | natd_hash: hash= ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c a5 eb 91 30 | natd_hash: hash= fe 49 be 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c a5 eb 91 30 | Notify data fe 49 be 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c 6a f2 a5 e4 93 d7 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | natd_hash: hash= e3 64 fc 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | Notify data e3 64 fc 24 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #255 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #255: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #255 to 4294967295 after switching state | Message ID: IKE #255 skipping update_recv as MD is fake | Message ID: sent #255 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.3:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | state #255 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984046588 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f49b8003878 size 128 | #255 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.172922 | resume sending helper answer for #255 suppresed complete_v2_state_transition() and stole MD | #255 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49880465f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.225352; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006572 exceeds limit? YES "road-eastnet-nonat-4" #4: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-4" #4: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #256 at 0x55564d986388 | State DB: adding IKEv2 state #256 in UNDEFINED | pstats #256 ikev2.ike started | Message ID: init #256: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #256: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #256; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-4" #256: initiating v2 parent SA to replace #4 | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 256 for state #256 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f49880465f8 size 128 | #256 spent 0.141 milliseconds in ikev2_parent_outI1() | RESET processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 1 resuming | crypto helper 1 starting work-order 256 for state #256 | pstats #4 ikev2.ike failed too-many-retransmits | pstats #4 ikev2.ike deleted too-many-retransmits | #4 spent 2.77 milliseconds in total | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 256 | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-4" #4: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #4: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #4 "road-eastnet-nonat-4" #4: deleting IKE SA for connection 'road-eastnet-nonat-4' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-4' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-4 | State DB: deleting IKEv2 state #4 in PARENT_I1 | parent state #4: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 256 time elapsed 0.00067 seconds | (#256) spent 0.667 milliseconds in crypto helper computing work-order 256: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 256 for state #256 to event queue | scheduling resume sending helper answer for #256 | libevent_malloc: new ptr-libevent@0x7f497c0467b8 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #4 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dadd108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | in statetime_stop() and could not find #4 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-4 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-4' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-4" | stop processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:349) | spent 0.0621 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 256 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #256 | **emit ISAKMP Message: | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | ikev2 g^x f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | ikev2 g^x 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | ikev2 g^x 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | ikev2 g^x 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | ikev2 g^x fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | ikev2 g^x 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | ikev2 g^x 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | ikev2 g^x d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | ikev2 g^x 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | ikev2 g^x 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | ikev2 g^x 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | ikev2 g^x be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | ikev2 g^x 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | ikev2 g^x 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | ikev2 g^x 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 e9 ff 2b f2 | IKEv2 nonce 50 bf 46 2d 48 5b cd 18 f5 67 41 24 24 c6 54 09 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 2b 92 95 5f e9 dc 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 04 | natd_hash: port=500 | natd_hash: hash= 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 35 cd f9 70 | natd_hash: hash= 92 a0 50 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 35 cd f9 70 | Notify data 92 a0 50 f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 2b 92 95 5f e9 dc 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | natd_hash: hash= 21 55 e4 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | Notify data 21 55 e4 8f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #256 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #256: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #256 to 4294967295 after switching state | Message ID: IKE #256 skipping update_recv as MD is fake | Message ID: sent #256 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.4:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | state #256 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49880465f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f49ac0065b8 size 128 | #256 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.226678 | resume sending helper answer for #256 suppresed complete_v2_state_transition() and stole MD | #256 spent 0.311 milliseconds in resume sending helper answer | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c0467b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.290856; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010275 exceeds limit? YES "road-eastnet-nonat-5" #5: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-5" #5: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #257 at 0x55564d987b98 | State DB: adding IKEv2 state #257 in UNDEFINED | pstats #257 ikev2.ike started | Message ID: init #257: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #257: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #257; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-5" #257: initiating v2 parent SA to replace #5 | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 257 for state #257 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f497c0467b8 size 128 | #257 spent 0.0808 milliseconds in ikev2_parent_outI1() | RESET processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #5 ikev2.ike failed too-many-retransmits | pstats #5 ikev2.ike deleted too-many-retransmits | crypto helper 3 resuming | crypto helper 3 starting work-order 257 for state #257 | #5 spent 2.96 milliseconds in total | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 257 | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-5" #5: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #5: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #5 "road-eastnet-nonat-5" #5: deleting IKE SA for connection 'road-eastnet-nonat-5' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-5' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-5 | State DB: deleting IKEv2 state #5 in PARENT_I1 | parent state #5: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #5 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 257 time elapsed 0.000593 seconds | libevent_free: release ptr-libevent@0x55564dade818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | in statetime_stop() and could not find #5 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#257) spent 0.587 milliseconds in crypto helper computing work-order 257: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 3 sending results from work-order 257 for state #257 to event queue | scheduling resume sending helper answer for #257 Initiating connection road-eastnet-nonat-5 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f4980046638 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 3 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-5' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-5" | stop processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:349) | spent 0.0691 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 257 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #257 | **emit ISAKMP Message: | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | ikev2 g^x e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | ikev2 g^x f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | ikev2 g^x 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | ikev2 g^x 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | ikev2 g^x 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | ikev2 g^x 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | ikev2 g^x e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | ikev2 g^x e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | ikev2 g^x a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | ikev2 g^x 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | ikev2 g^x 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | ikev2 g^x 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | ikev2 g^x 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | ikev2 g^x 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | ikev2 g^x 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f7 cb fc a5 12 74 07 5e 69 fc 20 9a 02 45 6b 00 | IKEv2 nonce ce 47 18 1b b2 92 43 02 64 d8 50 6a 81 39 e8 1a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 17 e0 b6 36 89 4f ef 1f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 05 | natd_hash: port=500 | natd_hash: hash= bf 98 df 6d 1d fc 97 54 32 1c af 26 90 79 98 b0 | natd_hash: hash= 39 22 96 df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 98 df 6d 1d fc 97 54 32 1c af 26 90 79 98 b0 | Notify data 39 22 96 df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 17 e0 b6 36 89 4f ef 1f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | natd_hash: hash= 40 3e 57 a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | Notify data 40 3e 57 a2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #257 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #257: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #257 to 4294967295 after switching state | Message ID: IKE #257 skipping update_recv as MD is fake | Message ID: sent #257 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.5:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | state #257 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c0467b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f49b00065b8 size 128 | #257 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.292047 | resume sending helper answer for #257 suppresed complete_v2_state_transition() and stole MD | #257 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980046638 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.350246; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008261 exceeds limit? YES "road-eastnet-nonat-6" #6: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-6" #6: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #258 at 0x55564d9892f8 | State DB: adding IKEv2 state #258 in UNDEFINED | pstats #258 ikev2.ike started | Message ID: init #258: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #258: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #258; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-6" #258: initiating v2 parent SA to replace #6 | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 258 for state #258 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f4980046638 size 128 | crypto helper 17 resuming | #258 spent 0.0775 milliseconds in ikev2_parent_outI1() | crypto helper 17 starting work-order 258 for state #258 | RESET processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 258 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #6 ikev2.ike failed too-many-retransmits | pstats #6 ikev2.ike deleted too-many-retransmits | #6 spent 2.5 milliseconds in total | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-6" #6: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #6: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #6 "road-eastnet-nonat-6" #6: deleting IKE SA for connection 'road-eastnet-nonat-6' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-6' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-6 | State DB: deleting IKEv2 state #6 in PARENT_I1 | parent state #6: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #6 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 258 time elapsed 0.000595 seconds | libevent_free: release ptr-libevent@0x55564dadff28 | (#258) spent 0.594 milliseconds in crypto helper computing work-order 258: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | crypto helper 17 sending results from work-order 258 for state #258 to event queue | in statetime_stop() and could not find #6 | scheduling resume sending helper answer for #258 | libevent_malloc: new ptr-libevent@0x7f4974046768 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-6 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-6' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-6" | stop processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:349) | spent 0.0617 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 258 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #258 | **emit ISAKMP Message: | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | ikev2 g^x 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | ikev2 g^x 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | ikev2 g^x 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | ikev2 g^x 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | ikev2 g^x a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | ikev2 g^x f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | ikev2 g^x a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | ikev2 g^x 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | ikev2 g^x c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | ikev2 g^x e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | ikev2 g^x 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | ikev2 g^x 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | ikev2 g^x a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | ikev2 g^x 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | ikev2 g^x 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a a4 83 09 fb 96 80 0b f0 98 a3 15 2c 5c b6 8e | IKEv2 nonce 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 be 75 e9 f4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 bd a1 e3 2d 8a ba 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 06 | natd_hash: port=500 | natd_hash: hash= 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d a9 dd 3e b8 | natd_hash: hash= 5c 85 02 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d a9 dd 3e b8 | Notify data 5c 85 02 39 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 bd a1 e3 2d 8a ba 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | natd_hash: hash= e6 08 81 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | Notify data e6 08 81 4d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #258 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #258: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #258 to 4294967295 after switching state | Message ID: IKE #258 skipping update_recv as MD is fake | Message ID: sent #258 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.6:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | state #258 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980046638 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f49a40065b8 size 128 | #258 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.351387 | resume sending helper answer for #258 suppresed complete_v2_state_transition() and stole MD | #258 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974046768 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.410581; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007761 exceeds limit? YES "road-eastnet-nonat-7" #7: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-7" #7: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #259 at 0x55564d98a9a8 | State DB: adding IKEv2 state #259 in UNDEFINED | pstats #259 ikev2.ike started | Message ID: init #259: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #259: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #259; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-7" #259: initiating v2 parent SA to replace #7 | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 259 for state #259 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f4974046768 size 128 | #259 spent 0.0785 milliseconds in ikev2_parent_outI1() | RESET processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #7 ikev2.ike failed too-many-retransmits | pstats #7 ikev2.ike deleted too-many-retransmits | #7 spent 2.33 milliseconds in total | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-7" #7: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #7: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #7 "road-eastnet-nonat-7" #7: deleting IKE SA for connection 'road-eastnet-nonat-7' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-7' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-7 | crypto helper 18 resuming | State DB: deleting IKEv2 state #7 in PARENT_I1 | crypto helper 18 starting work-order 259 for state #259 | parent state #7: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 259 | stop processing: state #7 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49bc02ae48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | in statetime_stop() and could not find #7 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-7 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-7' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-7" | stop processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:349) | spent 0.0918 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 259 time elapsed 0.000568 seconds | (#259) spent 0.569 milliseconds in crypto helper computing work-order 259: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 259 for state #259 to event queue | scheduling resume sending helper answer for #259 | libevent_malloc: new ptr-libevent@0x7f49780466d8 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 259 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #259 | **emit ISAKMP Message: | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | ikev2 g^x 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | ikev2 g^x 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | ikev2 g^x 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | ikev2 g^x 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ikev2 g^x ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | ikev2 g^x 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | ikev2 g^x 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | ikev2 g^x 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | ikev2 g^x 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | ikev2 g^x 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | ikev2 g^x 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | ikev2 g^x 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | ikev2 g^x 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | ikev2 g^x 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | ikev2 g^x 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 02 8b ee d9 | IKEv2 nonce 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 f6 3e 58 c9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ed 3d 88 78 18 69 13 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 07 | natd_hash: port=500 | natd_hash: hash= 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e e3 80 95 f5 | natd_hash: hash= 86 40 ed d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e e3 80 95 f5 | Notify data 86 40 ed d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ed 3d 88 78 18 69 13 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | natd_hash: hash= 54 f7 3e 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | Notify data 54 f7 3e 03 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #259 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #259: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #259 to 4294967295 after switching state | Message ID: IKE #259 skipping update_recv as MD is fake | Message ID: sent #259 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.7:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | state #259 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974046768 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f49a80065b8 size 128 | #259 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.411692 | resume sending helper answer for #259 suppresed complete_v2_state_transition() and stole MD | #259 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780466d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.477915; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008279 exceeds limit? YES "road-eastnet-nonat-8" #8: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-8" #8: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #260 at 0x55564d98c7b8 | State DB: adding IKEv2 state #260 in UNDEFINED | pstats #260 ikev2.ike started | Message ID: init #260: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #260: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #260; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-8" #260: initiating v2 parent SA to replace #8 | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 260 for state #260 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da4ef18 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f49780466d8 size 128 | #260 spent 0.144 milliseconds in ikev2_parent_outI1() | RESET processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #8 ikev2.ike failed too-many-retransmits | pstats #8 ikev2.ike deleted too-many-retransmits | #8 spent 2.68 milliseconds in total | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-8" #8: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #8: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #8 "road-eastnet-nonat-8" #8: deleting IKE SA for connection 'road-eastnet-nonat-8' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 19 resuming | crypto helper 19 starting work-order 260 for state #260 | add revival: connection 'road-eastnet-nonat-8' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-8 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 260 | State DB: deleting IKEv2 state #8 in PARENT_I1 | parent state #8: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #8 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | in statetime_stop() and could not find #8 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-8 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-8' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-8" | stop processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:349) | spent 0.0923 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 260 time elapsed 0.001204 seconds | (#260) spent 1.2 milliseconds in crypto helper computing work-order 260: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 260 for state #260 to event queue | scheduling resume sending helper answer for #260 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 260 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #260 | **emit ISAKMP Message: | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | ikev2 g^x 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | ikev2 g^x 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | ikev2 g^x 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | ikev2 g^x 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | ikev2 g^x e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | ikev2 g^x 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | ikev2 g^x a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | ikev2 g^x 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | ikev2 g^x 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | ikev2 g^x bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | ikev2 g^x 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | ikev2 g^x c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | ikev2 g^x bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | ikev2 g^x 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | ikev2 g^x 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 c8 e9 00 33 45 0c 93 6a 43 22 1f bb 1b 4a 83 | IKEv2 nonce 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd 48 12 ca c4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8e a9 ed b3 58 22 ab 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 08 | natd_hash: port=500 | natd_hash: hash= 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 b0 e6 ad 0a | natd_hash: hash= c4 05 96 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 b0 e6 ad 0a | Notify data c4 05 96 1f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8e a9 ed b3 58 22 ab 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | natd_hash: hash= 24 fc db 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | Notify data 24 fc db 0c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #260 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #260: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #260 to 4294967295 after switching state | Message ID: IKE #260 skipping update_recv as MD is fake | Message ID: sent #260 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.8:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | state #260 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780466d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da4ef18 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 | #260 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.480205 | resume sending helper answer for #260 suppresed complete_v2_state_transition() and stole MD | #260 spent 0.691 milliseconds in resume sending helper answer | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c01d3b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.09 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.488501; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | libevent_free: release ptr-libevent@0x7f49bc003878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #253 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0965 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.539951; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009441 exceeds limit? YES "road-eastnet-nonat-9" #9: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-9" #9: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #261 at 0x55564d98dc18 | State DB: adding IKEv2 state #261 in UNDEFINED | pstats #261 ikev2.ike started | Message ID: init #261: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #261: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #261; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-9" #261: initiating v2 parent SA to replace #9 | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 261 for state #261 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f49bc003878 size 128 | #261 spent 0.0812 milliseconds in ikev2_parent_outI1() | RESET processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #9 ikev2.ike failed too-many-retransmits | pstats #9 ikev2.ike deleted too-many-retransmits | #9 spent 2.9 milliseconds in total | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-9" #9: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #9: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #9 "road-eastnet-nonat-9" #9: deleting IKE SA for connection 'road-eastnet-nonat-9' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-9' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-9 | State DB: deleting IKEv2 state #9 in PARENT_I1 | crypto helper 0 resuming | crypto helper 0 starting work-order 261 for state #261 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 261 | parent state #9: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 261 time elapsed 0.000532 seconds | (#261) spent 0.536 milliseconds in crypto helper computing work-order 261: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 261 for state #261 to event queue | scheduling resume sending helper answer for #261 | libevent_malloc: new ptr-libevent@0x7f49bc002108 size 128 | crypto helper 0 waiting (nothing to do) | stop processing: state #9 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4998049398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | in statetime_stop() and could not find #9 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-9 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-9' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-9" | stop processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:349) | spent 0.0592 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 261 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #261 | **emit ISAKMP Message: | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | ikev2 g^x 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | ikev2 g^x 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | ikev2 g^x 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | ikev2 g^x 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | ikev2 g^x d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | ikev2 g^x 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | ikev2 g^x e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | ikev2 g^x 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | ikev2 g^x f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | ikev2 g^x 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | ikev2 g^x 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | ikev2 g^x dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | ikev2 g^x 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | ikev2 g^x 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | ikev2 g^x 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 22 87 29 e1 69 24 01 01 23 34 09 f2 80 7e b8 | IKEv2 nonce 50 31 11 5f 10 2d 8b ba 06 9c dd 0b 70 a9 a8 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ec d5 b1 bb 78 c7 31 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 09 | natd_hash: port=500 | natd_hash: hash= 70 72 d1 44 9d 43 73 12 ae 65 49 03 90 04 a8 1f | natd_hash: hash= c8 de b8 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 72 d1 44 9d 43 73 12 ae 65 49 03 90 04 a8 1f | Notify data c8 de b8 6c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ec d5 b1 bb 78 c7 31 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | natd_hash: hash= fe ff fa 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | Notify data fe ff fa 7d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #261 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #261: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #261 to 4294967295 after switching state | Message ID: IKE #261 skipping update_recv as MD is fake | Message ID: sent #261 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.9:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | state #261 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc003878 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f49a00065b8 size 128 | #261 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.541107 | resume sending helper answer for #261 suppresed complete_v2_state_transition() and stole MD | #261 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc002108 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.600306; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008636 exceeds limit? YES "road-eastnet-nonat-10" #10: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-10" #10: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #262 at 0x55564d98f278 | State DB: adding IKEv2 state #262 in UNDEFINED | pstats #262 ikev2.ike started | Message ID: init #262: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #262: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #262; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-10" #262: initiating v2 parent SA to replace #10 | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 262 for state #262 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f49bc002108 size 128 | #262 spent 0.0827 milliseconds in ikev2_parent_outI1() | RESET processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #10 ikev2.ike failed too-many-retransmits | pstats #10 ikev2.ike deleted too-many-retransmits | crypto helper 2 resuming | crypto helper 2 starting work-order 262 for state #262 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 262 | #10 spent 2.55 milliseconds in total | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-10" #10: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #10: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #10 "road-eastnet-nonat-10" #10: deleting IKE SA for connection 'road-eastnet-nonat-10' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-10' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-10 | State DB: deleting IKEv2 state #10 in PARENT_I1 | parent state #10: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 262 time elapsed 0.000621 seconds | (#262) spent 0.625 milliseconds in crypto helper computing work-order 262: ikev2_outI1 KE (pcr) | stop processing: state #10 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 sending results from work-order 262 for state #262 to event queue | scheduling resume sending helper answer for #262 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 | libevent_free: release ptr-libevent@0x55564dae4488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | crypto helper 2 waiting (nothing to do) | in statetime_stop() and could not find #10 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-10 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-10' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-10" | stop processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:349) | spent 0.0888 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 262 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #262 | **emit ISAKMP Message: | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | ikev2 g^x 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | ikev2 g^x 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | ikev2 g^x 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | ikev2 g^x 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | ikev2 g^x 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | ikev2 g^x 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ikev2 g^x ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | ikev2 g^x c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | ikev2 g^x b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | ikev2 g^x 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | ikev2 g^x 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | ikev2 g^x bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | ikev2 g^x 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | ikev2 g^x af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | ikev2 g^x d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 31 69 80 ba 60 f0 56 9e b1 21 27 22 d5 26 45 c3 | IKEv2 nonce b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a 64 25 db 61 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 1a 10 27 02 c2 2a 58 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0a | natd_hash: port=500 | natd_hash: hash= e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 7b e4 4d 97 | natd_hash: hash= 00 d1 76 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 7b e4 4d 97 | Notify data 00 d1 76 b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 1a 10 27 02 c2 2a 58 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | natd_hash: hash= 90 11 ec fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | Notify data 90 11 ec fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #262 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #262: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #262 to 4294967295 after switching state | Message ID: IKE #262 skipping update_recv as MD is fake | Message ID: sent #262 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.10:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | state #262 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc002108 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f49940061a8 size 128 | #262 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.601936 | resume sending helper answer for #262 suppresed complete_v2_state_transition() and stole MD | #262 spent 0.673 milliseconds in resume sending helper answer | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4002108 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.609118; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | libevent_free: release ptr-libevent@0x7f49b4003878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #254 spent 0.0991 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.661406; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008723 exceeds limit? YES "road-eastnet-nonat-11" #11: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-11" #11: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #263 at 0x55564d9908d8 | State DB: adding IKEv2 state #263 in UNDEFINED | pstats #263 ikev2.ike started | Message ID: init #263: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #263: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #263; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-11" #263: initiating v2 parent SA to replace #11 | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 263 for state #263 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f49b4003878 size 128 | #263 spent 0.0813 milliseconds in ikev2_parent_outI1() | RESET processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #11 ikev2.ike failed too-many-retransmits | pstats #11 ikev2.ike deleted too-many-retransmits | crypto helper 4 resuming | crypto helper 4 starting work-order 263 for state #263 | #11 spent 2.48 milliseconds in total | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 263 | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-11" #11: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #11: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #11 "road-eastnet-nonat-11" #11: deleting IKE SA for connection 'road-eastnet-nonat-11' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-11' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-11 | State DB: deleting IKEv2 state #11 in PARENT_I1 | parent state #11: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 263 time elapsed 0.000611 seconds | stop processing: state #11 from 192.1.2.23 (in delete_state() at state.c:1143) | (#263) spent 0.601 milliseconds in crypto helper computing work-order 263: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | crypto helper 4 sending results from work-order 263 for state #263 to event queue | in statetime_stop() and could not find #11 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #263 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 Initiating connection road-eastnet-nonat-11 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 4 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-11' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-11" | stop processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:349) | spent 0.0748 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 263 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #263 | **emit ISAKMP Message: | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | ikev2 g^x e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | ikev2 g^x f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | ikev2 g^x 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | ikev2 g^x 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | ikev2 g^x e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | ikev2 g^x e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ikev2 g^x ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | ikev2 g^x 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | ikev2 g^x 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | ikev2 g^x c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | ikev2 g^x 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | ikev2 g^x 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | ikev2 g^x a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | ikev2 g^x 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | ikev2 g^x 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 11 cc 25 1b | IKEv2 nonce 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc f8 44 fc f1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 50 85 13 22 31 a3 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0b | natd_hash: port=500 | natd_hash: hash= d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 96 4f c1 b0 | natd_hash: hash= bd d8 6a 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 96 4f c1 b0 | Notify data bd d8 6a 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 50 85 13 22 31 a3 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | natd_hash: hash= b6 3a 52 fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | Notify data b6 3a 52 fa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #263 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #263: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #263 to 4294967295 after switching state | Message ID: IKE #263 skipping update_recv as MD is fake | Message ID: sent #263 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.11:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | state #263 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4003878 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f49980065b8 size 128 | #263 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.662613 | resume sending helper answer for #263 suppresed complete_v2_state_transition() and stole MD | #263 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8003978 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.672812; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | libevent_free: release ptr-libevent@0x7f49b8003878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #255 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.718082; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006601 exceeds limit? YES "road-eastnet-nonat-12" #12: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-12" #12: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #264 at 0x55564d9920e8 | State DB: adding IKEv2 state #264 in UNDEFINED | pstats #264 ikev2.ike started | Message ID: init #264: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #264: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #264; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-12" #264: initiating v2 parent SA to replace #12 | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 264 for state #264 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f49b8003878 size 128 | #264 spent 0.137 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | RESET processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 starting work-order 264 for state #264 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 264 | pstats #12 ikev2.ike failed too-many-retransmits | pstats #12 ikev2.ike deleted too-many-retransmits | #12 spent 2.9 milliseconds in total | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-12" #12: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #12: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #12 "road-eastnet-nonat-12" #12: deleting IKE SA for connection 'road-eastnet-nonat-12' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-12' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-12 | State DB: deleting IKEv2 state #12 in PARENT_I1 | parent state #12: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 264 time elapsed 0.000658 seconds | (#264) spent 0.657 milliseconds in crypto helper computing work-order 264: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 264 for state #264 to event queue | stop processing: state #12 from 192.1.2.23 (in delete_state() at state.c:1143) | scheduling resume sending helper answer for #264 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | crypto helper 5 waiting (nothing to do) | libevent_free: release ptr-libevent@0x55564daabb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | in statetime_stop() and could not find #12 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-12 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-12' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-12" | stop processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:349) | spent 0.074 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 264 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #264 | **emit ISAKMP Message: | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | ikev2 g^x 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | ikev2 g^x d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | ikev2 g^x 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | ikev2 g^x 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | ikev2 g^x 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | ikev2 g^x 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | ikev2 g^x 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ikev2 g^x ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | ikev2 g^x f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | ikev2 g^x c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | ikev2 g^x c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | ikev2 g^x cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | ikev2 g^x f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | ikev2 g^x 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | ikev2 g^x c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b f8 da 14 4d | IKEv2 nonce 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed 49 ed fc a4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f3 0b 94 c7 6e d1 f4 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0c | natd_hash: port=500 | natd_hash: hash= 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 cd 0c c2 fc | natd_hash: hash= 51 c8 02 a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 cd 0c c2 fc | Notify data 51 c8 02 a8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f3 0b 94 c7 6e d1 f4 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | natd_hash: hash= 56 03 d5 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | Notify data 56 03 d5 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #264 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #264: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #264 to 4294967295 after switching state | Message ID: IKE #264 skipping update_recv as MD is fake | Message ID: sent #264 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.12:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | state #264 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8003878 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f498c0065b8 size 128 | #264 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.719511 | resume sending helper answer for #264 suppresed complete_v2_state_transition() and stole MD | #264 spent 0.424 milliseconds in resume sending helper answer | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.727675; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | libevent_free: release ptr-libevent@0x7f49ac0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #256 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0743 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.778027; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006342 exceeds limit? YES "road-eastnet-nonat-13" #13: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-13" #13: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #265 at 0x55564d993748 | State DB: adding IKEv2 state #265 in UNDEFINED | pstats #265 ikev2.ike started | Message ID: init #265: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #265: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #265; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-13" #265: initiating v2 parent SA to replace #13 | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 265 for state #265 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f49ac0065b8 size 128 | #265 spent 0.118 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 265 for state #265 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #13 ikev2.ike failed too-many-retransmits | pstats #13 ikev2.ike deleted too-many-retransmits | #13 spent 2.86 milliseconds in total | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 265 | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-13" #13: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #13: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #13 "road-eastnet-nonat-13" #13: deleting IKE SA for connection 'road-eastnet-nonat-13' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-13' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-13 | State DB: deleting IKEv2 state #13 in PARENT_I1 | parent state #13: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #13 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 265 time elapsed 0.000962 seconds | libevent_free: release ptr-libevent@0x55564dabe898 | (#265) spent 0.954 milliseconds in crypto helper computing work-order 265: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | crypto helper 6 sending results from work-order 265 for state #265 to event queue | in statetime_stop() and could not find #13 | scheduling resume sending helper answer for #265 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 | crypto helper 6 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-13 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-13' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-13" | stop processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:349) | spent 0.0631 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 265 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #265 | **emit ISAKMP Message: | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | ikev2 g^x bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | ikev2 g^x 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | ikev2 g^x 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | ikev2 g^x 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | ikev2 g^x 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | ikev2 g^x a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | ikev2 g^x 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | ikev2 g^x c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | ikev2 g^x 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | ikev2 g^x c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | ikev2 g^x dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | ikev2 g^x 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | ikev2 g^x f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | ikev2 g^x de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | ikev2 g^x 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a 85 bd e3 8d | IKEv2 nonce 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 fa f0 f4 fd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ec 53 fa 50 85 ae d0 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0d | natd_hash: port=500 | natd_hash: hash= 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 7b 6c d9 13 | natd_hash: hash= 96 70 d3 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 7b 6c d9 13 | Notify data 96 70 d3 10 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ec 53 fa 50 85 ae d0 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | natd_hash: hash= 64 db f8 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | Notify data 64 db f8 55 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #265 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #265: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #265 to 4294967295 after switching state | Message ID: IKE #265 skipping update_recv as MD is fake | Message ID: sent #265 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.13:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | state #265 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac0065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f49900065b8 size 128 | #265 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.779801 | resume sending helper answer for #265 suppresed complete_v2_state_transition() and stole MD | #265 spent 0.481 milliseconds in resume sending helper answer | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b00066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.791997; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | libevent_free: release ptr-libevent@0x7f49b00065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #257 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.838296; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00622 exceeds limit? YES "road-eastnet-nonat-14" #14: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-14" #14: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #266 at 0x55564d994df8 | State DB: adding IKEv2 state #266 in UNDEFINED | pstats #266 ikev2.ike started | Message ID: init #266: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #266: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #266; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-14" #266: initiating v2 parent SA to replace #14 | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 266 for state #266 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f49b00065b8 size 128 | #266 spent 0.0785 milliseconds in ikev2_parent_outI1() | RESET processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #14 ikev2.ike failed too-many-retransmits | pstats #14 ikev2.ike deleted too-many-retransmits | #14 spent 2.27 milliseconds in total | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-14" #14: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #14: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #14 "road-eastnet-nonat-14" #14: deleting IKE SA for connection 'road-eastnet-nonat-14' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-14' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-14 | State DB: deleting IKEv2 state #14 in PARENT_I1 | crypto helper 7 resuming | crypto helper 7 starting work-order 266 for state #266 | parent state #14: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 266 | stop processing: state #14 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dabffa8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | in statetime_stop() and could not find #14 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-14 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-14' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-14" | stop processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:349) | spent 0.0592 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 266 time elapsed 0.000568 seconds | (#266) spent 0.553 milliseconds in crypto helper computing work-order 266: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 266 for state #266 to event queue | scheduling resume sending helper answer for #266 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 266 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #266 | **emit ISAKMP Message: | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | ikev2 g^x 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ikev2 g^x ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | ikev2 g^x 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | ikev2 g^x 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | ikev2 g^x 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | ikev2 g^x 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | ikev2 g^x 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | ikev2 g^x 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | ikev2 g^x 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | ikev2 g^x 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | ikev2 g^x fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | ikev2 g^x d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | ikev2 g^x c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | ikev2 g^x 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | ikev2 g^x c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b 07 26 07 90 | IKEv2 nonce 82 2e c7 00 66 4d 44 88 7f 79 3a 31 9f 36 ff 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2d 98 14 2a ed e5 87 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0e | natd_hash: port=500 | natd_hash: hash= 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 cc 3f 69 15 | natd_hash: hash= 7c 02 f6 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 cc 3f 69 15 | Notify data 7c 02 f6 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2d 98 14 2a ed e5 87 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | natd_hash: hash= 03 2f 72 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | Notify data 03 2f 72 54 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #266 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #266: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #266 to 4294967295 after switching state | Message ID: IKE #266 skipping update_recv as MD is fake | Message ID: sent #266 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.14:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | state #266 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b00065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f49840065b8 size 128 | #266 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.83941 | resume sending helper answer for #266 suppresed complete_v2_state_transition() and stole MD | #266 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.852596; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | libevent_free: release ptr-libevent@0x7f49a40065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #258 spent 0.0957 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.898854; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00736 exceeds limit? YES "road-eastnet-nonat-15" #15: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-15" #15: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #267 at 0x55564d9964a8 | State DB: adding IKEv2 state #267 in UNDEFINED | pstats #267 ikev2.ike started | Message ID: init #267: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #267: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #267; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-15" #267: initiating v2 parent SA to replace #15 | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 267 for state #267 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f49a40065b8 size 128 | #267 spent 0.076 milliseconds in ikev2_parent_outI1() | RESET processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #15 ikev2.ike failed too-many-retransmits | pstats #15 ikev2.ike deleted too-many-retransmits | crypto helper 8 resuming | crypto helper 8 starting work-order 267 for state #267 | #15 spent 3.18 milliseconds in total | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 267 | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-15" #15: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #15: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #15 "road-eastnet-nonat-15" #15: deleting IKE SA for connection 'road-eastnet-nonat-15' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-15' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-15 | State DB: deleting IKEv2 state #15 in PARENT_I1 | parent state #15: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 267 time elapsed 0.00056 seconds | stop processing: state #15 from 192.1.2.23 (in delete_state() at state.c:1143) | (#267) spent 0.561 milliseconds in crypto helper computing work-order 267: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 267 for state #267 to event queue | scheduling resume sending helper answer for #267 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 | libevent_free: release ptr-libevent@0x55564daeb848 | crypto helper 8 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | in statetime_stop() and could not find #15 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-15 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-15' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-15" | stop processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 267 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #267 | **emit ISAKMP Message: | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | ikev2 g^x 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | ikev2 g^x 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | ikev2 g^x 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | ikev2 g^x 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | ikev2 g^x bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | ikev2 g^x 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | ikev2 g^x 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | ikev2 g^x b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | ikev2 g^x 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | ikev2 g^x cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | ikev2 g^x f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | ikev2 g^x 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | ikev2 g^x cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | ikev2 g^x d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | ikev2 g^x cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 94 80 92 d3 bb 64 09 bb 75 28 41 ed 17 89 3c b7 | IKEv2 nonce 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 36 e1 b6 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c3 d1 0c 8d 23 87 7c 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0f | natd_hash: port=500 | natd_hash: hash= 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 d8 dd 69 b0 | natd_hash: hash= dc 4b d2 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 d8 dd 69 b0 | Notify data dc 4b d2 08 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c3 d1 0c 8d 23 87 7c 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | natd_hash: hash= de 2c 0a f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | Notify data de 2c 0a f4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #267 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #267: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #267 to 4294967295 after switching state | Message ID: IKE #267 skipping update_recv as MD is fake | Message ID: sent #267 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.15:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | state #267 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f49880065b8 size 128 | #267 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.90001 | resume sending helper answer for #267 suppresed complete_v2_state_transition() and stole MD | #267 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.912191; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | libevent_free: release ptr-libevent@0x7f49a80065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #259 spent 0.0953 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10640.959469; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007139 exceeds limit? YES "road-eastnet-nonat-16" #16: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-16" #16: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #268 at 0x55564d997c08 | State DB: adding IKEv2 state #268 in UNDEFINED | pstats #268 ikev2.ike started | Message ID: init #268: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #268: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #268; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-16" #268: initiating v2 parent SA to replace #16 | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 268 for state #268 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f49a80065b8 size 128 | #268 spent 0.0798 milliseconds in ikev2_parent_outI1() | RESET processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 268 for state #268 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #16 ikev2.ike failed too-many-retransmits | pstats #16 ikev2.ike deleted too-many-retransmits | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 268 | #16 spent 2.3 milliseconds in total | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-16" #16: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #16: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #16 "road-eastnet-nonat-16" #16: deleting IKE SA for connection 'road-eastnet-nonat-16' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-16' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-16 | State DB: deleting IKEv2 state #16 in PARENT_I1 | parent state #16: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 268 time elapsed 0.000997 seconds | (#268) spent 0.973 milliseconds in crypto helper computing work-order 268: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 268 for state #268 to event queue | scheduling resume sending helper answer for #268 | libevent_malloc: new ptr-libevent@0x7f499c004e48 size 128 | crypto helper 9 waiting (nothing to do) | stop processing: state #16 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49bc01fe28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | in statetime_stop() and could not find #16 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-16 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-16' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-16" | stop processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:349) | spent 0.0606 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 268 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #268 | **emit ISAKMP Message: | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | ikev2 g^x e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | ikev2 g^x 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | ikev2 g^x 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | ikev2 g^x 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | ikev2 g^x c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | ikev2 g^x d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | ikev2 g^x 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ikev2 g^x ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ikev2 g^x ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | ikev2 g^x 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | ikev2 g^x e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | ikev2 g^x 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | ikev2 g^x c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | ikev2 g^x 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | ikev2 g^x 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 10 b9 44 75 | IKEv2 nonce 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 cd e2 4a 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d2 27 27 5f 45 bb 64 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 10 | natd_hash: port=500 | natd_hash: hash= c9 43 ff 95 10 ed a2 e0 be 55 a9 62 b7 3e 58 21 | natd_hash: hash= 14 55 ef 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 43 ff 95 10 ed a2 e0 be 55 a9 62 b7 3e 58 21 | Notify data 14 55 ef 7c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d2 27 27 5f 45 bb 64 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | natd_hash: hash= 02 ce dd 1a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | Notify data 02 ce dd 1a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #268 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #268: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #268 to 4294967295 after switching state | Message ID: IKE #268 skipping update_recv as MD is fake | Message ID: sent #268 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.16:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | state #268 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a80065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f497c0065b8 size 128 | #268 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10640.961053 | resume sending helper answer for #268 suppresed complete_v2_state_transition() and stole MD | #268 spent 0.342 milliseconds in resume sending helper answer | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10640.980239; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f499c004e48 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #260 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10640.989547; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #253 spent 0.345 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.025087; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009656 exceeds limit? YES "road-eastnet-nonat-17" #17: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-17" #17: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #269 at 0x55564d999268 | State DB: adding IKEv2 state #269 in UNDEFINED | pstats #269 ikev2.ike started | Message ID: init #269: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #269: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #269; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-17" #269: initiating v2 parent SA to replace #17 | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 269 for state #269 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f496c01d3b8 size 128 | #269 spent 0.077 milliseconds in ikev2_parent_outI1() | RESET processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #17 ikev2.ike failed too-many-retransmits | pstats #17 ikev2.ike deleted too-many-retransmits | #17 spent 3.99 milliseconds in total | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-17" #17: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #17: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #17 "road-eastnet-nonat-17" #17: deleting IKE SA for connection 'road-eastnet-nonat-17' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-17' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-17 | State DB: deleting IKEv2 state #17 in PARENT_I1 | crypto helper 10 resuming | crypto helper 10 starting work-order 269 for state #269 | parent state #17: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 269 | stop processing: state #17 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564daee6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | in statetime_stop() and could not find #17 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-17 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-17' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-17" | stop processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:349) | spent 0.0607 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 269 time elapsed 0.000544 seconds | (#269) spent 0.547 milliseconds in crypto helper computing work-order 269: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 269 for state #269 to event queue | scheduling resume sending helper answer for #269 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 269 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #269 | **emit ISAKMP Message: | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | ikev2 g^x 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | ikev2 g^x 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | ikev2 g^x 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | ikev2 g^x 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | ikev2 g^x 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | ikev2 g^x 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | ikev2 g^x 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | ikev2 g^x d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | ikev2 g^x 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | ikev2 g^x e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ikev2 g^x ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | ikev2 g^x f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ikev2 g^x ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | ikev2 g^x 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | ikev2 g^x 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e 0d 6d 46 1a | IKEv2 nonce 48 e3 03 93 87 fa ea 50 da 88 cd 9e ac f3 5b 13 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 7a da bb 3d 3e 84 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 11 | natd_hash: port=500 | natd_hash: hash= 7b 33 cc df 94 ba 53 62 55 0d 32 46 af 1c d7 c9 | natd_hash: hash= 3d 37 8e 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 33 cc df 94 ba 53 62 55 0d 32 46 af 1c d7 c9 | Notify data 3d 37 8e 07 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 7a da bb 3d 3e 84 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | natd_hash: hash= ed e3 d5 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | Notify data ed e3 d5 c4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #269 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #269: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #269 to 4294967295 after switching state | Message ID: IKE #269 skipping update_recv as MD is fake | Message ID: sent #269 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.17:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | state #269 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c01d3b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f49800065b8 size 128 | #269 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.026177 | resume sending helper answer for #269 suppresed complete_v2_state_transition() and stole MD | #269 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.041368; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | libevent_free: release ptr-libevent@0x7f49a00065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #261 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.097677; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007062 exceeds limit? YES "road-eastnet-nonat-18" #18: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-18" #18: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #270 at 0x55564d99a8c8 | State DB: adding IKEv2 state #270 in UNDEFINED | pstats #270 ikev2.ike started | Message ID: init #270: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #270: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #270; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-18" #270: initiating v2 parent SA to replace #18 | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 270 for state #270 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f49a00065b8 size 128 | #270 spent 0.111 milliseconds in ikev2_parent_outI1() | RESET processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | crypto helper 11 starting work-order 270 for state #270 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 270 | pstats #18 ikev2.ike failed too-many-retransmits | pstats #18 ikev2.ike deleted too-many-retransmits | #18 spent 4.01 milliseconds in total | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-18" #18: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #18: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #18 "road-eastnet-nonat-18" #18: deleting IKE SA for connection 'road-eastnet-nonat-18' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-18' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-18 | State DB: deleting IKEv2 state #18 in PARENT_I1 | parent state #18: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 270 time elapsed 0.000795 seconds | stop processing: state #18 from 192.1.2.23 (in delete_state() at state.c:1143) | (#270) spent 0.803 milliseconds in crypto helper computing work-order 270: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x55564daefe58 | crypto helper 11 sending results from work-order 270 for state #270 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | scheduling resume sending helper answer for #270 | in statetime_stop() and could not find #18 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-18 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 11 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-18' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-18" | stop processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:349) | spent 0.0906 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 270 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #270 | **emit ISAKMP Message: | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | ikev2 g^x 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | ikev2 g^x f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | ikev2 g^x 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | ikev2 g^x 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | ikev2 g^x 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | ikev2 g^x 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | ikev2 g^x 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | ikev2 g^x 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | ikev2 g^x aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | ikev2 g^x 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | ikev2 g^x d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | ikev2 g^x b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | ikev2 g^x c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | ikev2 g^x 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | ikev2 g^x 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bd 53 ba a6 47 64 38 9f b5 99 d4 af 8d 26 c8 48 | IKEv2 nonce 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b 7b 90 f4 98 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 27 86 13 d2 eb 1e d5 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 12 | natd_hash: port=500 | natd_hash: hash= 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 2d 4c c3 8f | natd_hash: hash= c3 6a ee da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 2d 4c c3 8f | Notify data c3 6a ee da | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 27 86 13 d2 eb 1e d5 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | natd_hash: hash= 36 bf ea b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | Notify data 36 bf ea b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #270 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #270: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #270 to 4294967295 after switching state | Message ID: IKE #270 skipping update_recv as MD is fake | Message ID: sent #270 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.18:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | state #270 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 | #270 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.099313 | resume sending helper answer for #270 suppresed complete_v2_state_transition() and stole MD | #270 spent 0.496 milliseconds in resume sending helper answer | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.102487; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | libevent_free: release ptr-libevent@0x7f49940061a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #262 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.110812; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f49940061a8 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #254 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.163092; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500479 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | libevent_free: release ptr-libevent@0x7f49980065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #263 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.163288; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008626 exceeds limit? YES "road-eastnet-nonat-19" #19: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-19" #19: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #271 at 0x55564d99c028 | State DB: adding IKEv2 state #271 in UNDEFINED | pstats #271 ikev2.ike started | Message ID: init #271: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #271: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #271; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-19" #271: initiating v2 parent SA to replace #19 | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 271 for state #271 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49980065b8 size 128 | #271 spent 0.0965 milliseconds in ikev2_parent_outI1() | RESET processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #19 ikev2.ike failed too-many-retransmits | pstats #19 ikev2.ike deleted too-many-retransmits | #19 spent 3.18 milliseconds in total | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-19" #19: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #19: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #19 "road-eastnet-nonat-19" #19: deleting IKE SA for connection 'road-eastnet-nonat-19' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 12 resuming | crypto helper 12 starting work-order 271 for state #271 | add revival: connection 'road-eastnet-nonat-19' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 271 | in connection_discard for connection road-eastnet-nonat-19 | State DB: deleting IKEv2 state #19 in PARENT_I1 | parent state #19: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #19 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d9e98a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | in statetime_stop() and could not find #19 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 271 time elapsed 0.000593 seconds | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | (#271) spent 0.625 milliseconds in crypto helper computing work-order 271: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 271 for state #271 to event queue | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | scheduling resume sending helper answer for #271 | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | libevent_malloc: new ptr-libevent@0x7f49980066b8 size 128 | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 | crypto helper 12 waiting (nothing to do) "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.11 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-19 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-19' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-19" | stop processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:349) | spent 0.1 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 271 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #271 | **emit ISAKMP Message: | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | ikev2 g^x 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | ikev2 g^x e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | ikev2 g^x 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | ikev2 g^x 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | ikev2 g^x e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | ikev2 g^x 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | ikev2 g^x fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | ikev2 g^x 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ikev2 g^x ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | ikev2 g^x 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | ikev2 g^x 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | ikev2 g^x c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | ikev2 g^x be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | ikev2 g^x de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | ikev2 g^x 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 82 f2 57 7d 36 be 04 65 dc 9f fc 41 65 5d 4f | IKEv2 nonce c4 c2 58 9f 58 ed 90 2b 72 40 37 96 94 20 00 b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9e a0 a7 e4 45 46 e2 d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 13 | natd_hash: port=500 | natd_hash: hash= 5e b6 2c 32 15 02 25 73 b4 74 70 51 cb f2 a0 71 | natd_hash: hash= ae 4c c4 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e b6 2c 32 15 02 25 73 b4 74 70 51 cb f2 a0 71 | Notify data ae 4c c4 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9e a0 a7 e4 45 46 e2 d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | natd_hash: hash= d6 b9 64 a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | Notify data d6 b9 64 a5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #271 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #271: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #271 to 4294967295 after switching state | Message ID: IKE #271 skipping update_recv as MD is fake | Message ID: sent #271 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.19:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | state #271 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49980065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 | #271 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.164759 | resume sending helper answer for #271 suppresed complete_v2_state_transition() and stole MD | #271 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49980066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.173989; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f49980066b8 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #255 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.220291; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | libevent_free: release ptr-libevent@0x7f498c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #264 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.228568; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f498c0065b8 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #256 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.230931; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006 exceeds limit? YES "road-eastnet-nonat-20" #20: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-20" #20: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #272 at 0x55564d99d688 | State DB: adding IKEv2 state #272 in UNDEFINED | pstats #272 ikev2.ike started | Message ID: init #272: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #272: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #272; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-20" #272: initiating v2 parent SA to replace #20 | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 272 for state #272 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | #272 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #20 ikev2.ike failed too-many-retransmits | pstats #20 ikev2.ike deleted too-many-retransmits | #20 spent 4.55 milliseconds in total | crypto helper 13 resuming | crypto helper 13 starting work-order 272 for state #272 | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 272 "road-eastnet-nonat-20" #20: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #20: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #20 "road-eastnet-nonat-20" #20: deleting IKE SA for connection 'road-eastnet-nonat-20' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-20' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-20 | State DB: deleting IKEv2 state #20 in PARENT_I1 | parent state #20: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #20 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 272 time elapsed 0.000551 seconds | libevent_free: release ptr-libevent@0x55564dac5c48 | (#272) spent 0.558 milliseconds in crypto helper computing work-order 272: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 272 for state #272 to event queue | scheduling resume sending helper answer for #272 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 | in statetime_stop() and could not find #20 | crypto helper 13 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-20 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-20' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-20" | stop processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:349) | spent 0.0868 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 272 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #272 | **emit ISAKMP Message: | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | ikev2 g^x 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | ikev2 g^x 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ikev2 g^x ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | ikev2 g^x c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | ikev2 g^x 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | ikev2 g^x 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | ikev2 g^x 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | ikev2 g^x b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | ikev2 g^x 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | ikev2 g^x 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | ikev2 g^x a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | ikev2 g^x 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | ikev2 g^x a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | ikev2 g^x a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | ikev2 g^x da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce df 8f 0c ef fc ef e5 68 63 2e 88 2a da d7 47 75 | IKEv2 nonce ca 56 c9 5e 13 38 42 1f df fa af 21 4f e7 ba a8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 92 91 88 5c a6 f3 f3 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 14 | natd_hash: port=500 | natd_hash: hash= 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b 9f 11 c7 c3 | natd_hash: hash= 5f b4 5d 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b 9f 11 c7 c3 | Notify data 5f b4 5d 5b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 92 91 88 5c a6 f3 f3 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | natd_hash: hash= 49 5c 0a 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | Notify data 49 5c 0a 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #272 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #272: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #272 to 4294967295 after switching state | Message ID: IKE #272 skipping update_recv as MD is fake | Message ID: sent #272 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.20:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | state #272 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f496c0065b8 size 128 | #272 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.232289 | resume sending helper answer for #272 suppresed complete_v2_state_transition() and stole MD | #272 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.280474; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | libevent_free: release ptr-libevent@0x7f49900065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #265 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.293807; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f49900065b8 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | libevent_free: release ptr-libevent@0x7f49b00066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #257 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.324132; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007055 exceeds limit? YES "road-eastnet-nonat-21" #21: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-21" #21: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #273 at 0x55564d99ede8 | State DB: adding IKEv2 state #273 in UNDEFINED | pstats #273 ikev2.ike started | Message ID: init #273: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #273: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #273; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-21" #273: initiating v2 parent SA to replace #21 | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 273 for state #273 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 | #273 spent 0.0781 milliseconds in ikev2_parent_outI1() | RESET processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #21 ikev2.ike failed too-many-retransmits | pstats #21 ikev2.ike deleted too-many-retransmits | crypto helper 14 resuming | crypto helper 14 starting work-order 273 for state #273 | #21 spent 8.58 milliseconds in total | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 273 | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-21" #21: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #21: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #21 "road-eastnet-nonat-21" #21: deleting IKE SA for connection 'road-eastnet-nonat-21' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-21' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-21 | State DB: deleting IKEv2 state #21 in PARENT_I1 | parent state #21: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #21 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 273 time elapsed 0.000602 seconds | libevent_free: release ptr-libevent@0x7f49bc00f598 | (#273) spent 0.609 milliseconds in crypto helper computing work-order 273: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | in statetime_stop() and could not find #21 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 273 for state #273 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #273 | libevent_malloc: new ptr-libevent@0x7f49900066b8 size 128 Initiating connection road-eastnet-nonat-21 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-21' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-21" | stop processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:349) | spent 0.0871 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 273 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #273 | **emit ISAKMP Message: | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | ikev2 g^x a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | ikev2 g^x 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | ikev2 g^x 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | ikev2 g^x 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | ikev2 g^x 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | ikev2 g^x 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | ikev2 g^x f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | ikev2 g^x a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | ikev2 g^x 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | ikev2 g^x 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | ikev2 g^x 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | ikev2 g^x 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ikev2 g^x ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | ikev2 g^x 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | ikev2 g^x 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 be 7f 0e df | IKEv2 nonce 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a 38 95 ab 8e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7a c7 dc da 6d d4 42 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 15 | natd_hash: port=500 | natd_hash: hash= 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 1f 1b ad 60 | natd_hash: hash= 55 8b 8a ba | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 1f 1b ad 60 | Notify data 55 8b 8a ba | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7a c7 dc da 6d d4 42 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | natd_hash: hash= 94 f3 89 ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | Notify data 94 f3 89 ff | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #273 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #273: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #273 to 4294967295 after switching state | Message ID: IKE #273 skipping update_recv as MD is fake | Message ID: sent #273 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.21:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | state #273 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b00066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f49bc009cc8 size 128 | #273 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.325407 | resume sending helper answer for #273 suppresed complete_v2_state_transition() and stole MD | #273 spent 0.358 milliseconds in resume sending helper answer | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49900066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.340578; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f49900066b8 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | libevent_free: release ptr-libevent@0x7f49840065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #266 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.353853; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f49840065b8 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | libevent_free: release ptr-libevent@0x7f49a4004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #258 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.382128; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008541 exceeds limit? YES "road-eastnet-nonat-22" #22: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-22" #22: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #274 at 0x55564d9a0448 | State DB: adding IKEv2 state #274 in UNDEFINED | pstats #274 ikev2.ike started | Message ID: init #274: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #274: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #274; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-22" #274: initiating v2 parent SA to replace #22 | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 274 for state #274 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 | #274 spent 0.108 milliseconds in ikev2_parent_outI1() | RESET processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #22 ikev2.ike failed too-many-retransmits | pstats #22 ikev2.ike deleted too-many-retransmits | #22 spent 2.85 milliseconds in total | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-22" #22: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #22: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 15 resuming | crypto helper 15 starting work-order 274 for state #274 | picked newest_isakmp_sa #0 for #22 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 274 "road-eastnet-nonat-22" #22: deleting IKE SA for connection 'road-eastnet-nonat-22' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-22' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-22 | State DB: deleting IKEv2 state #22 in PARENT_I1 | parent state #22: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #22 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b0043ac8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | in statetime_stop() and could not find #22 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-22 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 274 time elapsed 0.00057 seconds | (#274) spent 0.612 milliseconds in crypto helper computing work-order 274: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 274 for state #274 to event queue | start processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-22' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | scheduling resume sending helper answer for #274 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 | crypto helper 15 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-22" | stop processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:349) | spent 0.0769 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 274 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #274 | **emit ISAKMP Message: | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | ikev2 g^x 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | ikev2 g^x 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | ikev2 g^x 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | ikev2 g^x 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | ikev2 g^x aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | ikev2 g^x 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | ikev2 g^x e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | ikev2 g^x f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | ikev2 g^x 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | ikev2 g^x bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | ikev2 g^x 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | ikev2 g^x e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | ikev2 g^x 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | ikev2 g^x 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | ikev2 g^x d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 cc 05 26 86 | IKEv2 nonce 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 67 18 4b 58 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 2e 48 4e b1 1f 83 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 16 | natd_hash: port=500 | natd_hash: hash= ee 50 3b 16 e8 47 16 0d f7 6c ef 43 a3 32 b4 88 | natd_hash: hash= ab 9a 44 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee 50 3b 16 e8 47 16 0d f7 6c ef 43 a3 32 b4 88 | Notify data ab 9a 44 d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 2e 48 4e b1 1f 83 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | natd_hash: hash= d2 f5 f7 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | Notify data d2 f5 f7 56 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #274 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #274: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #274 to 4294967295 after switching state | Message ID: IKE #274 skipping update_recv as MD is fake | Message ID: sent #274 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.22:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | state #274 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f49b4009cc8 size 128 | #274 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.383491 | resume sending helper answer for #274 suppresed complete_v2_state_transition() and stole MD | #274 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49840066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.400691; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | libevent_free: release ptr-libevent@0x7f49880065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #267 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.413041; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f49880065b8 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | libevent_free: release ptr-libevent@0x7f49a8004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #259 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.442341; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009718 exceeds limit? YES "road-eastnet-nonat-23" #23: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-23" #23: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #275 at 0x55564d9a1ba8 | State DB: adding IKEv2 state #275 in UNDEFINED | pstats #275 ikev2.ike started | Message ID: init #275: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #275: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #275; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-23" #275: initiating v2 parent SA to replace #23 | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 275 for state #275 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d078 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 | #275 spent 0.0834 milliseconds in ikev2_parent_outI1() | RESET processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #23 ikev2.ike failed too-many-retransmits | pstats #23 ikev2.ike deleted too-many-retransmits | #23 spent 3.08 milliseconds in total | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-23" #23: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #23: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #23 "road-eastnet-nonat-23" #23: deleting IKE SA for connection 'road-eastnet-nonat-23' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-23' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-23 | State DB: deleting IKEv2 state #23 in PARENT_I1 | parent state #23: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 resuming | crypto helper 16 starting work-order 275 for state #275 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 275 | stop processing: state #23 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4978012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | in statetime_stop() and could not find #23 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-23 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-23' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-23" | stop processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:349) | spent 0.0594 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 275 time elapsed 0.000562 seconds | (#275) spent 0.566 milliseconds in crypto helper computing work-order 275: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 275 for state #275 to event queue | scheduling resume sending helper answer for #275 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 275 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #275 | **emit ISAKMP Message: | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | ikev2 g^x a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | ikev2 g^x e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | ikev2 g^x 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | ikev2 g^x 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | ikev2 g^x 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | ikev2 g^x 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | ikev2 g^x 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | ikev2 g^x 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | ikev2 g^x f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | ikev2 g^x d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | ikev2 g^x 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | ikev2 g^x f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | ikev2 g^x 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ikev2 g^x ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | ikev2 g^x 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 d9 fe d9 ba 86 88 66 91 42 26 3e d4 7c 0f f5 | IKEv2 nonce ff ae ed a4 a4 cd 8b 44 15 73 8d 00 79 e3 f1 d5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a7 41 41 a6 ec 22 a7 e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 17 | natd_hash: port=500 | natd_hash: hash= 51 3c 07 d2 9a 46 00 89 54 50 1f 8c 01 39 86 a5 | natd_hash: hash= 6f 1f 63 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 3c 07 d2 9a 46 00 89 54 50 1f 8c 01 39 86 a5 | Notify data 6f 1f 63 27 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a7 41 41 a6 ec 22 a7 e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | natd_hash: hash= 77 c1 73 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | Notify data 77 c1 73 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #275 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #275: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #275 to 4294967295 after switching state | Message ID: IKE #275 skipping update_recv as MD is fake | Message ID: sent #275 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.23:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | state #275 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d078 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 | #275 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.443446 | resume sending helper answer for #275 suppresed complete_v2_state_transition() and stole MD | #275 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498803e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.461638; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | libevent_free: release ptr-libevent@0x7f497c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #268 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.480953; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f497c0065b8 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | libevent_free: release ptr-libevent@0x7f499c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #260 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.501422; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009994 exceeds limit? YES "road-eastnet-nonat-24" #24: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-24" #24: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #276 at 0x55564d9a3308 | State DB: adding IKEv2 state #276 in UNDEFINED | pstats #276 ikev2.ike started | Message ID: init #276: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #276: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #276; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-24" #276: initiating v2 parent SA to replace #24 | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 276 for state #276 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da71a48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f499c004e48 size 128 | #276 spent 0.0781 milliseconds in ikev2_parent_outI1() | RESET processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #24 ikev2.ike failed too-many-retransmits | pstats #24 ikev2.ike deleted too-many-retransmits | #24 spent 2.41 milliseconds in total | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-24" #24: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #24: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #24 "road-eastnet-nonat-24" #24: deleting IKE SA for connection 'road-eastnet-nonat-24' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-24' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-24 | crypto helper 1 resuming | crypto helper 1 starting work-order 276 for state #276 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 276 | State DB: deleting IKEv2 state #24 in PARENT_I1 | parent state #24: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 276 time elapsed 0.000568 seconds | (#276) spent 0.569 milliseconds in crypto helper computing work-order 276: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 276 for state #276 to event queue | scheduling resume sending helper answer for #276 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #24 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da067a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | in statetime_stop() and could not find #24 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-24 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-24' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-24" | stop processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:349) | spent 0.0589 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 276 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #276 | **emit ISAKMP Message: | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | ikev2 g^x 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | ikev2 g^x f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | ikev2 g^x e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | ikev2 g^x 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | ikev2 g^x 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | ikev2 g^x 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | ikev2 g^x d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | ikev2 g^x c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | ikev2 g^x fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | ikev2 g^x cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | ikev2 g^x 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | ikev2 g^x 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | ikev2 g^x 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | ikev2 g^x 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | ikev2 g^x 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 2c 8d 72 da | IKEv2 nonce 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c 61 f0 59 47 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a6 9d b8 28 b5 93 65 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 18 | natd_hash: port=500 | natd_hash: hash= eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 1c cb 5d b5 | natd_hash: hash= 73 ef e0 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 1c cb 5d b5 | Notify data 73 ef e0 fe | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a6 9d b8 28 b5 93 65 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | natd_hash: hash= b1 31 34 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | Notify data b1 31 34 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #276 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #276: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #276 to 4294967295 after switching state | Message ID: IKE #276 skipping update_recv as MD is fake | Message ID: sent #276 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.24:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | state #276 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da71a48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 | #276 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.502573 | resume sending helper answer for #276 suppresed complete_v2_state_transition() and stole MD | #276 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c038b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.527895; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | libevent_free: release ptr-libevent@0x7f49800065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #269 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.542166; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001059 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f49800065b8 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | libevent_free: release ptr-libevent@0x7f49a0004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #261 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.558607; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008275 exceeds limit? YES "road-eastnet-nonat-25" #25: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-25" #25: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #277 at 0x55564d9a4968 | State DB: adding IKEv2 state #277 in UNDEFINED | pstats #277 ikev2.ike started | Message ID: init #277: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #277: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #277; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-25" #277: initiating v2 parent SA to replace #25 | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 277 for state #277 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 | #277 spent 0.0997 milliseconds in ikev2_parent_outI1() | RESET processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #25 ikev2.ike failed too-many-retransmits | pstats #25 ikev2.ike deleted too-many-retransmits | #25 spent 1.9 milliseconds in total | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-25" #25: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #25: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #25 | crypto helper 3 resuming | crypto helper 3 starting work-order 277 for state #277 "road-eastnet-nonat-25" #25: deleting IKE SA for connection 'road-eastnet-nonat-25' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-25' added to the list and scheduled for 0 seconds | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 277 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-25 | State DB: deleting IKEv2 state #25 in PARENT_I1 | parent state #25: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 277 time elapsed 0.001569 seconds | (#277) spent 1.57 milliseconds in crypto helper computing work-order 277: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 277 for state #277 to event queue | scheduling resume sending helper answer for #277 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #25 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497c017a48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | in statetime_stop() and could not find #25 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-25 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-25' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-25" | stop processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:349) | spent 0.0753 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 277 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #277 | **emit ISAKMP Message: | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | ikev2 g^x e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | ikev2 g^x 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | ikev2 g^x cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ikev2 g^x ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | ikev2 g^x 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | ikev2 g^x a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | ikev2 g^x 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | ikev2 g^x fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | ikev2 g^x 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | ikev2 g^x e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | ikev2 g^x 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | ikev2 g^x c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | ikev2 g^x d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | ikev2 g^x 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | ikev2 g^x 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 5e d8 4b f2 | IKEv2 nonce 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f b2 b6 96 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8c f5 c0 80 77 39 5b 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 19 | natd_hash: port=500 | natd_hash: hash= 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 91 76 be 81 | natd_hash: hash= 26 2e b8 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 91 76 be 81 | Notify data 26 2e b8 2b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8c f5 c0 80 77 39 5b 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | natd_hash: hash= a7 05 c8 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | Notify data a7 05 c8 b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #277 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #277: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #277 to 4294967295 after switching state | Message ID: IKE #277 skipping update_recv as MD is fake | Message ID: sent #277 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.25:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | state #277 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a0004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f49b000ca08 size 128 | #277 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.561044 | resume sending helper answer for #277 suppresed complete_v2_state_transition() and stole MD | #277 spent 0.495 milliseconds in resume sending helper answer | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49800066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.600375; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #270 spent 0.35 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.193 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.604156; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | libevent_free: release ptr-libevent@0x7f4994004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #262 spent 0.328 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.167 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.632952; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007435 exceeds limit? YES "road-eastnet-nonat-26" #26: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-26" #26: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #278 at 0x55564d9a60e8 | State DB: adding IKEv2 state #278 in UNDEFINED | pstats #278 ikev2.ike started | Message ID: init #278: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #278: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #278; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-26" #278: initiating v2 parent SA to replace #26 | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 278 for state #278 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 | #278 spent 0.228 milliseconds in ikev2_parent_outI1() | RESET processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #26 ikev2.ike failed too-many-retransmits | pstats #26 ikev2.ike deleted too-many-retransmits | #26 spent 3.8 milliseconds in total | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 17 resuming | crypto helper 17 starting work-order 278 for state #278 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 278 "road-eastnet-nonat-26" #26: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #26: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #26 "road-eastnet-nonat-26" #26: deleting IKE SA for connection 'road-eastnet-nonat-26' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-26' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-26 | State DB: deleting IKEv2 state #26 in PARENT_I1 | parent state #26: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 278 time elapsed 0.002099 seconds | (#278) spent 2.09 milliseconds in crypto helper computing work-order 278: ikev2_outI1 KE (pcr) | stop processing: state #26 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | in statetime_stop() and could not find #26 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 sending results from work-order 278 for state #278 to event queue | scheduling resume sending helper answer for #278 | libevent_malloc: new ptr-libevent@0x7f49740066b8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 17 waiting (nothing to do) Initiating connection road-eastnet-nonat-26 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-26' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-26" | stop processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:349) | spent 0.181 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 278 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #278 | **emit ISAKMP Message: | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | ikev2 g^x e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | ikev2 g^x fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | ikev2 g^x 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | ikev2 g^x 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | ikev2 g^x e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | ikev2 g^x 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | ikev2 g^x cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | ikev2 g^x 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | ikev2 g^x cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | ikev2 g^x 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | ikev2 g^x 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | ikev2 g^x 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | ikev2 g^x 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | ikev2 g^x 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | ikev2 g^x 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 80 2b d2 a4 50 a1 28 57 bd 46 78 f0 f6 9b 83 | IKEv2 nonce ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab 5b 0e ab d8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 78 c6 c9 47 29 bd cb 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1a | natd_hash: port=500 | natd_hash: hash= 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b bd f0 5c 81 | natd_hash: hash= 5d 84 7e a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b bd f0 5c 81 | Notify data 5d 84 7e a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 78 c6 c9 47 29 bd cb 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | natd_hash: hash= a7 66 e1 f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | Notify data a7 66 e1 f9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #278 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #278: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #278 to 4294967295 after switching state | Message ID: IKE #278 skipping update_recv as MD is fake | Message ID: sent #278 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.26:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | state #278 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f49a400ca08 size 128 | #278 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.637134 | resume sending helper answer for #278 suppresed complete_v2_state_transition() and stole MD | #278 spent 1.22 milliseconds in resume sending helper answer | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49740066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.243 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.664688; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f49740066b8 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #263 spent 0.383 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.18 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.665362; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500603 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #271 spent 0.312 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.185 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.693; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008422 exceeds limit? YES "road-eastnet-nonat-27" #27: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-27" #27: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #279 at 0x55564d9a7a18 | State DB: adding IKEv2 state #279 in UNDEFINED | pstats #279 ikev2.ike started | Message ID: init #279: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #279: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #279; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-27" #279: initiating v2 parent SA to replace #27 | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 279 for state #279 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 | #279 spent 0.0841 milliseconds in ikev2_parent_outI1() | RESET processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #27 ikev2.ike failed too-many-retransmits | pstats #27 ikev2.ike deleted too-many-retransmits | #27 spent 2.8 milliseconds in total | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-27" #27: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #27: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #27 "road-eastnet-nonat-27" #27: deleting IKE SA for connection 'road-eastnet-nonat-27' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-27' added to the list and scheduled for 0 seconds | crypto helper 18 resuming | crypto helper 18 starting work-order 279 for state #279 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 279 | in connection_discard for connection road-eastnet-nonat-27 | State DB: deleting IKEv2 state #27 in PARENT_I1 | parent state #27: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #27 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4978038be8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 279 time elapsed 0.000692 seconds | in statetime_stop() and could not find #27 | (#279) spent 0.694 milliseconds in crypto helper computing work-order 279: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 279 for state #279 to event queue | scheduling resume sending helper answer for #279 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49780066b8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-27 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-27' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-27" | stop processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:349) | spent 0.0662 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 279 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #279 | **emit ISAKMP Message: | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | ikev2 g^x 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | ikev2 g^x 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | ikev2 g^x 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | ikev2 g^x 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | ikev2 g^x 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | ikev2 g^x 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | ikev2 g^x 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | ikev2 g^x 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | ikev2 g^x f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | ikev2 g^x 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | ikev2 g^x 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | ikev2 g^x c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | ikev2 g^x 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | ikev2 g^x f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ikev2 g^x ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 5c 07 b0 26 | IKEv2 nonce f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e e9 ce 79 ab | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6d 76 ca eb 85 17 4e c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1b | natd_hash: port=500 | natd_hash: hash= f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 15 1f d5 c0 | natd_hash: hash= 1a f2 80 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 15 1f d5 c0 | Notify data 1a f2 80 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 6d 76 ca eb 85 17 4e c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | natd_hash: hash= e3 65 73 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | Notify data e3 65 73 47 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #279 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #279: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #279 to 4294967295 after switching state | Message ID: IKE #279 skipping update_recv as MD is fake | Message ID: sent #279 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.27:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | state #279 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f49a800ca08 size 128 | #279 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.694595 | resume sending helper answer for #279 suppresed complete_v2_state_transition() and stole MD | #279 spent 0.613 milliseconds in resume sending helper answer | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.721828; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f49780066b8 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #264 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.732123; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | libevent_free: release ptr-libevent@0x7f496c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #272 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.753403; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009562 exceeds limit? YES "road-eastnet-nonat-28" #28: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-28" #28: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #280 at 0x55564d9a9078 | State DB: adding IKEv2 state #280 in UNDEFINED | pstats #280 ikev2.ike started | Message ID: init #280: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #280: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #280; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-28" #280: initiating v2 parent SA to replace #28 | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 280 for state #280 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f496c0065b8 size 128 | #280 spent 0.101 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | RESET processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 280 for state #280 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 280 | pstats #28 ikev2.ike failed too-many-retransmits | pstats #28 ikev2.ike deleted too-many-retransmits | #28 spent 2.62 milliseconds in total | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-28" #28: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #28: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #28 "road-eastnet-nonat-28" #28: deleting IKE SA for connection 'road-eastnet-nonat-28' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-28' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-28 | State DB: deleting IKEv2 state #28 in PARENT_I1 | parent state #28: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #28 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4974043c48 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 280 time elapsed 0.000979 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | (#280) spent 0.993 milliseconds in crypto helper computing work-order 280: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #28 | crypto helper 19 sending results from work-order 280 for state #280 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #280 | libevent_malloc: new ptr-libevent@0x7f496c0066b8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 19 waiting (nothing to do) Initiating connection road-eastnet-nonat-28 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-28' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-28" | stop processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:349) | spent 0.0807 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 280 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #280 | **emit ISAKMP Message: | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | ikev2 g^x a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | ikev2 g^x 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | ikev2 g^x 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | ikev2 g^x 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | ikev2 g^x 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | ikev2 g^x 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | ikev2 g^x 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | ikev2 g^x 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | ikev2 g^x 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | ikev2 g^x b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | ikev2 g^x 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | ikev2 g^x 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | ikev2 g^x fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | ikev2 g^x d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | ikev2 g^x a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 56 ac 80 43 | IKEv2 nonce 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b 25 9a ee a8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 78 97 ba 91 39 2b 36 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1c | natd_hash: port=500 | natd_hash: hash= 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 35 ea dc 5c | natd_hash: hash= 6a f4 eb 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 35 ea dc 5c | Notify data 6a f4 eb 96 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 78 97 ba 91 39 2b 36 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | natd_hash: hash= ac 3c 94 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | Notify data ac 3c 94 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #280 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #280: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #280 to 4294967295 after switching state | Message ID: IKE #280 skipping update_recv as MD is fake | Message ID: sent #280 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.28:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | state #280 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c0065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f499c00ca08 size 128 | #280 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.75533 | resume sending helper answer for #280 suppresed complete_v2_state_transition() and stole MD | #280 spent 0.593 milliseconds in resume sending helper answer | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c0066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.781566; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f496c0066b8 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #265 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.826835; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | libevent_free: release ptr-libevent@0x7f49bc009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #273 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.829147; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007307 exceeds limit? YES "road-eastnet-nonat-29" #29: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-29" #29: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #281 at 0x55564d9aa7f8 | State DB: adding IKEv2 state #281 in UNDEFINED | pstats #281 ikev2.ike started | Message ID: init #281: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #281: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #281; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-29" #281: initiating v2 parent SA to replace #29 | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 281 for state #281 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f49bc009cc8 size 128 | #281 spent 0.0769 milliseconds in ikev2_parent_outI1() | RESET processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #29 ikev2.ike failed too-many-retransmits | pstats #29 ikev2.ike deleted too-many-retransmits | crypto helper 0 resuming | crypto helper 0 starting work-order 281 for state #281 | #29 spent 4.91 milliseconds in total | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 281 | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-29" #29: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #29: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #29 "road-eastnet-nonat-29" #29: deleting IKE SA for connection 'road-eastnet-nonat-29' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-29' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-29 | State DB: deleting IKEv2 state #29 in PARENT_I1 | parent state #29: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 281 time elapsed 0.000606 seconds | (#281) spent 0.592 milliseconds in crypto helper computing work-order 281: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 281 for state #281 to event queue | scheduling resume sending helper answer for #281 | libevent_malloc: new ptr-libevent@0x7f49bc002108 size 128 | crypto helper 0 waiting (nothing to do) | stop processing: state #29 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4978043bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | in statetime_stop() and could not find #29 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-29 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-29' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-29" | stop processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:349) | spent 0.0594 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 281 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #281 | **emit ISAKMP Message: | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | ikev2 g^x 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | ikev2 g^x 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | ikev2 g^x 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | ikev2 g^x 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | ikev2 g^x 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | ikev2 g^x 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | ikev2 g^x f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | ikev2 g^x 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | ikev2 g^x 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | ikev2 g^x 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ikev2 g^x ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | ikev2 g^x c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | ikev2 g^x c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | ikev2 g^x 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | ikev2 g^x 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce df 74 56 fc 6e 72 8b 42 e2 64 0d a4 10 5f 7c d5 | IKEv2 nonce a3 83 44 35 cd e4 32 ec 45 4c 79 08 d2 02 92 0b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cd ca 1a 56 9b 45 8b 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1d | natd_hash: port=500 | natd_hash: hash= de c2 0e 76 7b 1b b6 ab 12 ab ad eb 5c d8 9b ea | natd_hash: hash= 2f 96 98 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de c2 0e 76 7b 1b b6 ab 12 ab ad eb 5c d8 9b ea | Notify data 2f 96 98 1e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cd ca 1a 56 9b 45 8b 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | natd_hash: hash= f0 d8 cc ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | Notify data f0 d8 cc ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #281 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #281: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #281 to 4294967295 after switching state | Message ID: IKE #281 skipping update_recv as MD is fake | Message ID: sent #281 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.29:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | state #281 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc009cc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 | #281 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.830423 | resume sending helper answer for #281 suppresed complete_v2_state_transition() and stole MD | #281 spent 0.346 milliseconds in resume sending helper answer | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc002108 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.841646; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f49bc002108 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | libevent_free: release ptr-libevent@0x7f49900066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #266 spent 0.0994 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0716 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.883973; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f49900066b8 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | libevent_free: release ptr-libevent@0x7f49b4009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #274 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.901239; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f49b4009cc8 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #267 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.907521; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007901 exceeds limit? YES "road-eastnet-nonat-30" #30: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-30" #30: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #282 at 0x55564d9abf78 | State DB: adding IKEv2 state #282 in UNDEFINED | pstats #282 ikev2.ike started | Message ID: init #282: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #282: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #282; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-30" #282: initiating v2 parent SA to replace #30 | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 282 for state #282 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa388 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 | #282 spent 0.0768 milliseconds in ikev2_parent_outI1() | RESET processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #30 ikev2.ike failed too-many-retransmits | pstats #30 ikev2.ike deleted too-many-retransmits | #30 spent 5.09 milliseconds in total | crypto helper 2 starting work-order 282 for state #282 | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 282 "road-eastnet-nonat-30" #30: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #30: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #30 "road-eastnet-nonat-30" #30: deleting IKE SA for connection 'road-eastnet-nonat-30' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-30' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-30 | State DB: deleting IKEv2 state #30 in PARENT_I1 | parent state #30: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 282 time elapsed 0.000966 seconds | (#282) spent 0.975 milliseconds in crypto helper computing work-order 282: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 282 for state #282 to event queue | scheduling resume sending helper answer for #282 | libevent_malloc: new ptr-libevent@0x7f49b4009dc8 size 128 | stop processing: state #30 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7f4984022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | in statetime_stop() and could not find #30 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-30 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-30' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-30" | stop processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:349) | spent 0.0578 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 282 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #282 | **emit ISAKMP Message: | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | ikev2 g^x 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | ikev2 g^x aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | ikev2 g^x 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | ikev2 g^x 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | ikev2 g^x 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | ikev2 g^x be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | ikev2 g^x d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | ikev2 g^x f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | ikev2 g^x 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | ikev2 g^x 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | ikev2 g^x 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | ikev2 g^x 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | ikev2 g^x 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | ikev2 g^x 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | ikev2 g^x 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 94 59 18 91 32 0e 12 28 18 de 65 02 e1 55 f6 | IKEv2 nonce 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 3f d0 f7 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 41 79 1c 1c bb 31 c1 27 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1e | natd_hash: port=500 | natd_hash: hash= 6d ef e6 34 60 a6 f0 55 91 12 62 65 b2 d7 c4 73 | natd_hash: hash= 73 2e 38 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d ef e6 34 60 a6 f0 55 91 12 62 65 b2 d7 c4 73 | Notify data 73 2e 38 3f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 41 79 1c 1c bb 31 c1 27 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | natd_hash: hash= 38 f6 e9 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | Notify data 38 f6 e9 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #282 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #282: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #282 to 4294967295 after switching state | Message ID: IKE #282 skipping update_recv as MD is fake | Message ID: sent #282 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.30:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | state #282 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa388 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 | #282 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.909076 | resume sending helper answer for #282 suppresed complete_v2_state_transition() and stole MD | #282 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4009dc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10641.944286; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f49b4009dc8 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #275 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10641.962626; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #268 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10641.979953; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006399 exceeds limit? YES "road-eastnet-nonat-31" #31: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-31" #31: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #283 at 0x55564d9ad688 | State DB: adding IKEv2 state #283 in UNDEFINED | pstats #283 ikev2.ike started | Message ID: init #283: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #283: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #283; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-31" #283: initiating v2 parent SA to replace #31 | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 283 for state #283 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6ae8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | #283 spent 0.0782 milliseconds in ikev2_parent_outI1() | RESET processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #31 ikev2.ike failed too-many-retransmits | pstats #31 ikev2.ike deleted too-many-retransmits | #31 spent 4.63 milliseconds in total | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-31" #31: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #31: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #31 "road-eastnet-nonat-31" #31: deleting IKE SA for connection 'road-eastnet-nonat-31' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-31' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-31 | State DB: deleting IKEv2 state #31 in PARENT_I1 | crypto helper 4 resuming | crypto helper 4 starting work-order 283 for state #283 | parent state #31: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 283 | stop processing: state #31 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49880282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | in statetime_stop() and could not find #31 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-31 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-31' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-31" | stop processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:349) | spent 0.061 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 283 time elapsed 0.000529 seconds | (#283) spent 0.531 milliseconds in crypto helper computing work-order 283: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 283 for state #283 to event queue | scheduling resume sending helper answer for #283 | libevent_malloc: new ptr-libevent@0x7f49b8009dc8 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 283 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #283 | **emit ISAKMP Message: | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ikev2 g^x ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | ikev2 g^x b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | ikev2 g^x 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | ikev2 g^x b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | ikev2 g^x 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | ikev2 g^x cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | ikev2 g^x 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | ikev2 g^x 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | ikev2 g^x 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | ikev2 g^x 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | ikev2 g^x 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ikev2 g^x ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | ikev2 g^x 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | ikev2 g^x 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | ikev2 g^x 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 f4 49 44 c6 | IKEv2 nonce 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e 80 ee 2c c9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ac 30 c5 c3 a6 f6 4b cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1f | natd_hash: port=500 | natd_hash: hash= f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b 36 9b 14 f7 | natd_hash: hash= e6 a8 f2 0e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b 36 9b 14 f7 | Notify data e6 a8 f2 0e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ac 30 c5 c3 a6 f6 4b cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | natd_hash: hash= be 9b 3c 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | Notify data be 9b 3c 57 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #283 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #283: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #283 to 4294967295 after switching state | Message ID: IKE #283 skipping update_recv as MD is fake | Message ID: sent #283 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.31:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | state #283 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d6ae8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 | #283 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10641.981039 | resume sending helper answer for #283 suppresed complete_v2_state_transition() and stole MD | #283 spent 0.345 milliseconds in resume sending helper answer | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8009dc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10641.99022; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f49b8009dc8 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #253 spent 0.0992 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.003499; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #276 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.029784; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #269 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.050109; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005312 exceeds limit? YES "road-eastnet-nonat-32" #32: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-32" #32: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #284 at 0x55564d9aee98 | State DB: adding IKEv2 state #284 in UNDEFINED | pstats #284 ikev2.ike started | Message ID: init #284: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #284: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #284; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-32" #284: initiating v2 parent SA to replace #32 | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 284 for state #284 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 | #284 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #32 ikev2.ike failed too-many-retransmits | pstats #32 ikev2.ike deleted too-many-retransmits | #32 spent 4.44 milliseconds in total | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-32" #32: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #32: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #32 "road-eastnet-nonat-32" #32: deleting IKE SA for connection 'road-eastnet-nonat-32' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-32' added to the list and scheduled for 0 seconds | crypto helper 5 resuming | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-32 | State DB: deleting IKEv2 state #32 in PARENT_I1 | crypto helper 5 starting work-order 284 for state #284 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 284 | parent state #32: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #32 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564daae928 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | in statetime_stop() and could not find #32 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 284 time elapsed 0.000555 seconds | processing global timer EVENT_REVIVE_CONNS | (#284) spent 0.566 milliseconds in crypto helper computing work-order 284: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 284 for state #284 to event queue Initiating connection road-eastnet-nonat-32 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #284 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | crypto helper 5 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-32' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-32" | stop processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:349) | spent 0.0792 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 284 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #284 | **emit ISAKMP Message: | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ikev2 g^x ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | ikev2 g^x 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | ikev2 g^x 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | ikev2 g^x 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | ikev2 g^x 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | ikev2 g^x 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | ikev2 g^x 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | ikev2 g^x f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | ikev2 g^x e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | ikev2 g^x b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | ikev2 g^x cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | ikev2 g^x 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | ikev2 g^x 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | ikev2 g^x a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | ikev2 g^x af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b 60 f5 ce 95 | IKEv2 nonce 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee fd 14 3e 3c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 58 50 55 b1 d6 70 de 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 20 | natd_hash: port=500 | natd_hash: hash= b7 21 db 8b 72 5c b5 2c 3e 0e 91 de 47 8a 25 4f | natd_hash: hash= 0d 8b e5 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 21 db 8b 72 5c b5 2c 3e 0e 91 de 47 8a 25 4f | Notify data 0d 8b e5 1b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 58 50 55 b1 d6 70 de 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | natd_hash: hash= 54 2b 2d 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | Notify data 54 2b 2d 06 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #284 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #284: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #284 to 4294967295 after switching state | Message ID: IKE #284 skipping update_recv as MD is fake | Message ID: sent #284 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.32:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | state #284 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f498c00ca08 size 128 | #284 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.051459 | resume sending helper answer for #284 suppresed complete_v2_state_transition() and stole MD | #284 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.061648; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | libevent_free: release ptr-libevent@0x7f49b000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #277 spent 0.0937 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.100935; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f49b000ca08 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #270 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.111225; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | libevent_free: release ptr-libevent@0x7f49940061a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #254 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.12451; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008202 exceeds limit? YES "road-eastnet-nonat-33" #33: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-33" #33: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #285 at 0x55564d9b04f8 | State DB: adding IKEv2 state #285 in UNDEFINED | pstats #285 ikev2.ike started | Message ID: init #285: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #285: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #285; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-33" #285: initiating v2 parent SA to replace #33 | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 285 for state #285 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f49940061a8 size 128 | #285 spent 0.0761 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 285 for state #285 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 285 | pstats #33 ikev2.ike failed too-many-retransmits | pstats #33 ikev2.ike deleted too-many-retransmits | #33 spent 4.66 milliseconds in total | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-33" #33: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #33: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #33 "road-eastnet-nonat-33" #33: deleting IKE SA for connection 'road-eastnet-nonat-33' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-33' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-33 | State DB: deleting IKEv2 state #33 in PARENT_I1 | parent state #33: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #33 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 285 time elapsed 0.000579 seconds | libevent_free: release ptr-libevent@0x7f49b80367d8 | (#285) spent 0.582 milliseconds in crypto helper computing work-order 285: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | in statetime_stop() and could not find #33 | crypto helper 6 sending results from work-order 285 for state #285 to event queue | scheduling resume sending helper answer for #285 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-33 which received a Delete/Notify but must remain up per local policy | crypto helper 6 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-33' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-33" | stop processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:349) | spent 0.0678 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 285 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #285 | **emit ISAKMP Message: | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | ikev2 g^x 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | ikev2 g^x fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | ikev2 g^x c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | ikev2 g^x 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | ikev2 g^x b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | ikev2 g^x da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | ikev2 g^x 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | ikev2 g^x fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | ikev2 g^x a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | ikev2 g^x 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | ikev2 g^x 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | ikev2 g^x df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | ikev2 g^x 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | ikev2 g^x 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | ikev2 g^x 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 e9 be c6 ce | IKEv2 nonce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd b1 a7 26 95 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 5b 94 59 97 f1 29 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 21 | natd_hash: port=500 | natd_hash: hash= a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 23 f3 d1 6b | natd_hash: hash= 49 c2 f1 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 23 f3 d1 6b | Notify data 49 c2 f1 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 5b 94 59 97 f1 29 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | natd_hash: hash= d1 f1 ae 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | Notify data d1 f1 ae 56 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #285 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #285: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #285 to 4294967295 after switching state | Message ID: IKE #285 skipping update_recv as MD is fake | Message ID: sent #285 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | state #285 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49940061a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f499000ca08 size 128 | #285 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.12564 | resume sending helper answer for #285 suppresed complete_v2_state_transition() and stole MD | #285 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b00066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.137851; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | libevent_free: release ptr-libevent@0x7f49a400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #278 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.166178; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49a400ca08 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #271 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.175486; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | libevent_free: release ptr-libevent@0x7f49980066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #255 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.195792; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f49980066b8 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | libevent_free: release ptr-libevent@0x7f49a800ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #279 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.195993; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00802 exceeds limit? YES "road-eastnet-nonat-34" #34: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-34" #34: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #286 at 0x55564d9b1c08 | State DB: adding IKEv2 state #286 in UNDEFINED | pstats #286 ikev2.ike started | Message ID: init #286: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #286: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #286; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-34" #286: initiating v2 parent SA to replace #34 | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 286 for state #286 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f49a800ca08 size 128 | #286 spent 0.0734 milliseconds in ikev2_parent_outI1() | RESET processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #34 ikev2.ike failed too-many-retransmits | pstats #34 ikev2.ike deleted too-many-retransmits | #34 spent 3.41 milliseconds in total | crypto helper 7 resuming | crypto helper 7 starting work-order 286 for state #286 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 286 | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-34" #34: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #34: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #34 "road-eastnet-nonat-34" #34: deleting IKE SA for connection 'road-eastnet-nonat-34' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-34' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-34 | State DB: deleting IKEv2 state #34 in PARENT_I1 | parent state #34: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 286 time elapsed 0.000539 seconds | (#286) spent 0.543 milliseconds in crypto helper computing work-order 286: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 286 for state #286 to event queue | scheduling resume sending helper answer for #286 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 | crypto helper 7 waiting (nothing to do) | stop processing: state #34 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49ac038b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | in statetime_stop() and could not find #34 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-34 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-34' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-34" | stop processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:349) | spent 0.0642 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 286 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #286 | **emit ISAKMP Message: | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | ikev2 g^x d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | ikev2 g^x 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | ikev2 g^x 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | ikev2 g^x a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | ikev2 g^x 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | ikev2 g^x 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | ikev2 g^x e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | ikev2 g^x 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | ikev2 g^x f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | ikev2 g^x 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | ikev2 g^x 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | ikev2 g^x f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | ikev2 g^x 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | ikev2 g^x 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | ikev2 g^x f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e 6d 35 d0 8b | IKEv2 nonce 30 45 07 4e 7f 4d a0 af c9 61 67 e6 d3 b2 39 25 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5d d4 cd 54 e9 60 76 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 22 | natd_hash: port=500 | natd_hash: hash= 83 95 25 8f 91 52 c0 2f 36 63 8a 9d d7 79 3d 13 | natd_hash: hash= 55 95 7a 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 95 25 8f 91 52 c0 2f 36 63 8a 9d d7 79 3d 13 | Notify data 55 95 7a 40 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5d d4 cd 54 e9 60 76 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | natd_hash: hash= 0f 50 74 c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | Notify data 0f 50 74 c6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #286 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #286: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #286 to 4294967295 after switching state | Message ID: IKE #286 skipping update_recv as MD is fake | Message ID: sent #286 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.34:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | state #286 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a800ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dade7a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 | #286 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.197115 | resume sending helper answer for #286 suppresed complete_v2_state_transition() and stole MD | #286 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.229302; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | libevent_free: release ptr-libevent@0x7f498c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #256 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.233592; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f498c0065b8 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #272 spent 0.0887 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.255836; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | libevent_free: release ptr-libevent@0x7f499c00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #280 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.255969; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00671 exceeds limit? YES "road-eastnet-nonat-35" #35: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-35" #35: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #287 at 0x55564d9b3388 | State DB: adding IKEv2 state #287 in UNDEFINED | pstats #287 ikev2.ike started | Message ID: init #287: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #287: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #287; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-35" #287: initiating v2 parent SA to replace #35 | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 287 for state #287 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f499c00ca08 size 128 | #287 spent 0.0773 milliseconds in ikev2_parent_outI1() | RESET processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #35 ikev2.ike failed too-many-retransmits | pstats #35 ikev2.ike deleted too-many-retransmits | #35 spent 2.55 milliseconds in total | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-35" #35: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #35: PARENT_I1(half-open IKE SA) => delete | crypto helper 8 resuming | crypto helper 8 starting work-order 287 for state #287 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #35 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 287 "road-eastnet-nonat-35" #35: deleting IKE SA for connection 'road-eastnet-nonat-35' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-35' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-35 | State DB: deleting IKEv2 state #35 in PARENT_I1 | parent state #35: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 287 time elapsed 0.000567 seconds | stop processing: state #35 from 192.1.2.23 (in delete_state() at state.c:1143) | (#287) spent 0.57 milliseconds in crypto helper computing work-order 287: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 287 for state #287 to event queue | scheduling resume sending helper answer for #287 | libevent_free: release ptr-libevent@0x7f49b403b588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 | in statetime_stop() and could not find #35 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 8 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-35 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-35' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-35" | stop processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:349) | spent 0.0608 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 287 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #287 | **emit ISAKMP Message: | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | ikev2 g^x 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | ikev2 g^x 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | ikev2 g^x 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | ikev2 g^x 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | ikev2 g^x 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | ikev2 g^x d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | ikev2 g^x 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | ikev2 g^x f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | ikev2 g^x 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | ikev2 g^x 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | ikev2 g^x 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | ikev2 g^x 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | ikev2 g^x 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | ikev2 g^x 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | ikev2 g^x 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 26 ec 55 3a | IKEv2 nonce d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 23 24 17 87 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1b 00 bc c0 d7 71 e6 e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 23 | natd_hash: port=500 | natd_hash: hash= 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 e1 9d 10 9b | natd_hash: hash= 76 f5 aa e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 e1 9d 10 9b | Notify data 76 f5 aa e5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1b 00 bc c0 d7 71 e6 e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | natd_hash: hash= 8d c2 03 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | Notify data 8d c2 03 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #287 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #287: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #287 to 4294967295 after switching state | Message ID: IKE #287 skipping update_recv as MD is fake | Message ID: sent #287 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.35:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | state #287 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c00ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f498800ca08 size 128 | #287 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.257155 | resume sending helper answer for #287 suppresed complete_v2_state_transition() and stole MD | #287 spent 0.3 milliseconds in resume sending helper answer | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0378 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.29434; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | libevent_free: release ptr-libevent@0x7f49900065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #257 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.318631; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008031 exceeds limit? YES "road-eastnet-nonat-36" #36: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-36" #36: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #288 at 0x55564d9b4b08 | State DB: adding IKEv2 state #288 in UNDEFINED | pstats #288 ikev2.ike started | Message ID: init #288: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #288: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #288; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-36" #288: initiating v2 parent SA to replace #36 | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 288 for state #288 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f49900065b8 size 128 | #288 spent 0.0778 milliseconds in ikev2_parent_outI1() | RESET processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 9 resuming | pstats #36 ikev2.ike failed too-many-retransmits | pstats #36 ikev2.ike deleted too-many-retransmits | crypto helper 9 starting work-order 288 for state #288 | #36 spent 2.16 milliseconds in total | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 288 | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-36" #36: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #36: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #36 "road-eastnet-nonat-36" #36: deleting IKE SA for connection 'road-eastnet-nonat-36' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-36' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-36 | State DB: deleting IKEv2 state #36 in PARENT_I1 | parent state #36: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #36 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 288 time elapsed 0.000942 seconds | libevent_free: release ptr-libevent@0x7f49a8049598 | (#288) spent 0.95 milliseconds in crypto helper computing work-order 288: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 288 for state #288 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | scheduling resume sending helper answer for #288 | libevent_malloc: new ptr-libevent@0x7f499c00cb08 size 128 | crypto helper 9 waiting (nothing to do) | in statetime_stop() and could not find #36 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-36 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-36' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-36" | stop processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:349) | spent 0.0969 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 288 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #288 | **emit ISAKMP Message: | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | ikev2 g^x 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | ikev2 g^x 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | ikev2 g^x 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | ikev2 g^x 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | ikev2 g^x 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | ikev2 g^x 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | ikev2 g^x df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | ikev2 g^x 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | ikev2 g^x 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | ikev2 g^x f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | ikev2 g^x 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | ikev2 g^x 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | ikev2 g^x 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | ikev2 g^x e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | ikev2 g^x c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4d e1 46 0a 30 be 90 20 43 0a ba de 17 c9 94 3b | IKEv2 nonce c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 e1 cb 12 07 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 4d 2d 62 c1 fa 7b 81 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 24 | natd_hash: port=500 | natd_hash: hash= c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 3b 0a 58 ee | natd_hash: hash= ee 91 0d f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 3b 0a 58 ee | Notify data ee 91 0d f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 4d 2d 62 c1 fa 7b 81 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | natd_hash: hash= d5 cf 72 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | Notify data d5 cf 72 14 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #288 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #288: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #288 to 4294967295 after switching state | Message ID: IKE #288 skipping update_recv as MD is fake | Message ID: sent #288 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.36:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | state #288 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49900065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f497c00ca08 size 128 | #288 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.320196 | resume sending helper answer for #288 suppresed complete_v2_state_transition() and stole MD | #288 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c00cb08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.328364; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f499c00cb08 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #273 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.331711; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #281 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.355007; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00362 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | libevent_free: release ptr-libevent@0x7f49840065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #258 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.379392; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009055 exceeds limit? YES "road-eastnet-nonat-37" #37: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-37" #37: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #289 at 0x55564d9b6218 | State DB: adding IKEv2 state #289 in UNDEFINED | pstats #289 ikev2.ike started | Message ID: init #289: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #289: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #289; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-37" #289: initiating v2 parent SA to replace #37 | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 289 for state #289 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f49840065b8 size 128 | #289 spent 0.0815 milliseconds in ikev2_parent_outI1() | RESET processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #37 ikev2.ike failed too-many-retransmits | pstats #37 ikev2.ike deleted too-many-retransmits | #37 spent 2.71 milliseconds in total | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-37" #37: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #37: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #37 "road-eastnet-nonat-37" #37: deleting IKE SA for connection 'road-eastnet-nonat-37' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-37' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-37 | State DB: deleting IKEv2 state #37 in PARENT_I1 | crypto helper 10 resuming | crypto helper 10 starting work-order 289 for state #289 | parent state #37: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 289 | stop processing: state #37 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497803e348 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | in statetime_stop() and could not find #37 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-37 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-37' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-37" | stop processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:349) | spent 0.0637 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 289 time elapsed 0.000622 seconds | (#289) spent 0.619 milliseconds in crypto helper computing work-order 289: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 289 for state #289 to event queue | scheduling resume sending helper answer for #289 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 289 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #289 | **emit ISAKMP Message: | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | ikev2 g^x 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | ikev2 g^x e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | ikev2 g^x 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | ikev2 g^x 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ikev2 g^x ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ikev2 g^x ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | ikev2 g^x e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | ikev2 g^x 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | ikev2 g^x 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | ikev2 g^x 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | ikev2 g^x 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | ikev2 g^x 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | ikev2 g^x f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | ikev2 g^x a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | ikev2 g^x 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab 3a df 10 1b 1e 59 c7 47 0b 22 ed 38 6d b5 b5 | IKEv2 nonce aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b f8 c9 d2 ce | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 24 a8 2b c3 e3 19 dc ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 25 | natd_hash: port=500 | natd_hash: hash= 1a 57 78 1a 63 50 35 9f 01 10 15 82 38 f3 e2 a3 | natd_hash: hash= df c3 7e 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a 57 78 1a 63 50 35 9f 01 10 15 82 38 f3 e2 a3 | Notify data df c3 7e 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 24 a8 2b c3 e3 19 dc ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | natd_hash: hash= 04 ae 87 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | Notify data 04 ae 87 26 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #289 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #289: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #289 to 4294967295 after switching state | Message ID: IKE #289 skipping update_recv as MD is fake | Message ID: sent #289 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.37:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | state #289 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49840065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f499c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 | #289 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.380631 | resume sending helper answer for #289 suppresed complete_v2_state_transition() and stole MD | #289 spent 0.366 milliseconds in resume sending helper answer | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.385839; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | libevent_free: release ptr-libevent@0x7f49900066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #274 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.409158; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f49900066b8 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #282 spent 0.221 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.096 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.414618; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | libevent_free: release ptr-libevent@0x7f49880065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #259 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0761 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.437982; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007447 exceeds limit? YES "road-eastnet-nonat-38" #38: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-38" #38: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #290 at 0x55564d9b7928 | State DB: adding IKEv2 state #290 in UNDEFINED | pstats #290 ikev2.ike started | Message ID: init #290: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #290: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #290; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-38" #290: initiating v2 parent SA to replace #38 | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 290 for state #290 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f49880065b8 size 128 | #290 spent 0.0828 milliseconds in ikev2_parent_outI1() | RESET processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #38 ikev2.ike failed too-many-retransmits | pstats #38 ikev2.ike deleted too-many-retransmits | #38 spent 2.6 milliseconds in total | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-38" #38: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #38: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #38 "road-eastnet-nonat-38" #38: deleting IKE SA for connection 'road-eastnet-nonat-38' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-38' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-38 | State DB: deleting IKEv2 state #38 in PARENT_I1 | crypto helper 11 resuming | crypto helper 11 starting work-order 290 for state #290 | parent state #38: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 290 | stop processing: state #38 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | in statetime_stop() and could not find #38 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-38 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-38' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-38" | stop processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:349) | spent 0.0618 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 290 time elapsed 0.000581 seconds | (#290) spent 0.584 milliseconds in crypto helper computing work-order 290: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 290 for state #290 to event queue | scheduling resume sending helper answer for #290 | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 290 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #290 | **emit ISAKMP Message: | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | ikev2 g^x f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | ikev2 g^x 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | ikev2 g^x 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | ikev2 g^x aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | ikev2 g^x 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | ikev2 g^x c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | ikev2 g^x 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | ikev2 g^x 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | ikev2 g^x b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | ikev2 g^x fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | ikev2 g^x 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | ikev2 g^x 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | ikev2 g^x 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | ikev2 g^x c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | ikev2 g^x e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 43 76 97 b9 | IKEv2 nonce 2c b9 dd 6e 51 2b df da 81 8b a4 77 31 b0 47 1c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a 1f 06 92 7e 97 d2 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 26 | natd_hash: port=500 | natd_hash: hash= 6b 42 bf b0 f9 89 02 85 76 8b 04 09 88 53 03 39 | natd_hash: hash= 47 e7 c2 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 42 bf b0 f9 89 02 85 76 8b 04 09 88 53 03 39 | Notify data 47 e7 c2 24 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2a 1f 06 92 7e 97 d2 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | natd_hash: hash= fc 2f 4f 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | Notify data fc 2f 4f 5f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #290 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #290: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #290 to 4294967295 after switching state | Message ID: IKE #290 skipping update_recv as MD is fake | Message ID: sent #290 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.38:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | state #290 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49880065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f497400ca08 size 128 | #290 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.439146 | resume sending helper answer for #290 suppresed complete_v2_state_transition() and stole MD | #290 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.445417; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | libevent_free: release ptr-libevent@0x7f49b4009dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #275 spent 0.0948 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.481689; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f49b4009dc8 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | libevent_free: release ptr-libevent@0x7f499800cbe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #283 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0778 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.482017; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | libevent_free: release ptr-libevent@0x7f497c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #260 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8b78 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.501384; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008772 exceeds limit? YES "road-eastnet-nonat-39" #39: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-39" #39: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #291 at 0x55564d9b9038 | State DB: adding IKEv2 state #291 in UNDEFINED | pstats #291 ikev2.ike started | Message ID: init #291: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #291: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #291; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-39" #291: initiating v2 parent SA to replace #39 | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 291 for state #291 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f497c0065b8 size 128 | #291 spent 0.199 milliseconds in ikev2_parent_outI1() | RESET processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #39 ikev2.ike failed too-many-retransmits | pstats #39 ikev2.ike deleted too-many-retransmits | crypto helper 12 resuming | crypto helper 12 starting work-order 291 for state #291 | #39 spent 2.73 milliseconds in total | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 291 | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-39" #39: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #39: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #39 "road-eastnet-nonat-39" #39: deleting IKE SA for connection 'road-eastnet-nonat-39' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-39' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-39 | State DB: deleting IKEv2 state #39 in PARENT_I1 | parent state #39: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #39 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 291 time elapsed 0.001014 seconds | libevent_free: release ptr-libevent@0x55564dae2d08 | (#291) spent 1.02 milliseconds in crypto helper computing work-order 291: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 291 for state #291 to event queue | scheduling resume sending helper answer for #291 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8b78 | in statetime_stop() and could not find #39 | libevent_malloc: new ptr-libevent@0x7f499800cce8 size 128 | crypto helper 12 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-39 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-39' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-39" | stop processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:349) | spent 0.113 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 291 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #291 | **emit ISAKMP Message: | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | ikev2 g^x 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | ikev2 g^x 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | ikev2 g^x d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ikev2 g^x ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | ikev2 g^x 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | ikev2 g^x e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | ikev2 g^x 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | ikev2 g^x 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | ikev2 g^x b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | ikev2 g^x f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | ikev2 g^x dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | ikev2 g^x bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | ikev2 g^x 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | ikev2 g^x 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | ikev2 g^x df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 de 10 70 5e | IKEv2 nonce 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 43 f6 b0 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 2e 30 10 47 3b 09 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 27 | natd_hash: port=500 | natd_hash: hash= ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 9f a7 42 92 | natd_hash: hash= 26 e8 77 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 9f a7 42 92 | Notify data 26 e8 77 b2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 2e 30 10 47 3b 09 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | natd_hash: hash= 5b 35 8d 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | Notify data 5b 35 8d 52 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #291 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #291: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #291 to 4294967295 after switching state | Message ID: IKE #291 skipping update_recv as MD is fake | Message ID: sent #291 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.39:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | state #291 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c0065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f497800cab8 size 128 | #291 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.504006 | resume sending helper answer for #291 suppresed complete_v2_state_transition() and stole MD | #291 spent 1.04 milliseconds in resume sending helper answer | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499800cce8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.504251; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f499800cce8 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #276 spent 0.229 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.118 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.543737; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | libevent_free: release ptr-libevent@0x7f49800065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #261 spent 0.386 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.552306; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f49800065b8 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | libevent_free: release ptr-libevent@0x7f498c00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #284 spent 0.0892 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.562554; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f498c00ca08 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #277 spent 0.088 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.562661; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007312 exceeds limit? YES "road-eastnet-nonat-40" #40: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-40" #40: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #292 at 0x55564d9ba698 | State DB: adding IKEv2 state #292 in UNDEFINED | pstats #292 ikev2.ike started | Message ID: init #292: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #292: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #292; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-40" #292: initiating v2 parent SA to replace #40 | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 292 for state #292 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa2e78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | #292 spent 0.0748 milliseconds in ikev2_parent_outI1() | RESET processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 13 resuming | crypto helper 13 starting work-order 292 for state #292 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 292 | pstats #40 ikev2.ike failed too-many-retransmits | pstats #40 ikev2.ike deleted too-many-retransmits | #40 spent 2.04 milliseconds in total | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-40" #40: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #40: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #40 "road-eastnet-nonat-40" #40: deleting IKE SA for connection 'road-eastnet-nonat-40' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-40' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-40 | State DB: deleting IKEv2 state #40 in PARENT_I1 | parent state #40: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #40 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 292 time elapsed 0.000952 seconds | libevent_free: release ptr-libevent@0x7f4988033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | in statetime_stop() and could not find #40 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#292) spent 0.963 milliseconds in crypto helper computing work-order 292: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 292 for state #292 to event queue | scheduling resume sending helper answer for #292 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 13 waiting (nothing to do) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-40 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-40' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-40" | stop processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:349) | spent 0.0607 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 292 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #292 | **emit ISAKMP Message: | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | ikev2 g^x 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | ikev2 g^x 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | ikev2 g^x cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | ikev2 g^x f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | ikev2 g^x 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | ikev2 g^x 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | ikev2 g^x 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | ikev2 g^x c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | ikev2 g^x 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | ikev2 g^x 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | ikev2 g^x 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | ikev2 g^x b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | ikev2 g^x e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | ikev2 g^x 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | ikev2 g^x 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 24 05 6c a3 9d 66 9b bb d0 27 48 c9 4d fd 69 c8 | IKEv2 nonce 98 5a eb cf db b6 61 9e 0b 79 d4 7e 4c a7 da 36 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bc 30 5c 9b c2 ce c3 eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 28 | natd_hash: port=500 | natd_hash: hash= dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 50 5e b6 fd | natd_hash: hash= 80 64 d7 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 50 5e b6 fd | Notify data 80 64 d7 d1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bc 30 5c 9b c2 ce c3 eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | natd_hash: hash= 08 39 4e 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | Notify data 08 39 4e 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #292 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #292: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #292 to 4294967295 after switching state | Message ID: IKE #292 skipping update_recv as MD is fake | Message ID: sent #292 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.40:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | state #292 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa2e78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 | #292 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.564249 | resume sending helper answer for #292 suppresed complete_v2_state_transition() and stole MD | #292 spent 0.3 milliseconds in resume sending helper answer | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c00c908 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.605442; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #262 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.626872; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | libevent_free: release ptr-libevent@0x7f499000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #285 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.627; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007488 exceeds limit? YES "road-eastnet-nonat-41" #41: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-41" #41: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #293 at 0x55564d9bbda8 | State DB: adding IKEv2 state #293 in UNDEFINED | pstats #293 ikev2.ike started | Message ID: init #293: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #293: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #293; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-41" #293: initiating v2 parent SA to replace #41 | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 293 for state #293 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f499000ca08 size 128 | #293 spent 0.0736 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | RESET processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 starting work-order 293 for state #293 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #41 ikev2.ike failed too-many-retransmits | pstats #41 ikev2.ike deleted too-many-retransmits | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 293 | #41 spent 2.36 milliseconds in total | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-41" #41: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #41: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #41 "road-eastnet-nonat-41" #41: deleting IKE SA for connection 'road-eastnet-nonat-41' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-41' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-41 | State DB: deleting IKEv2 state #41 in PARENT_I1 | parent state #41: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #41 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 293 time elapsed 0.000555 seconds | in statetime_stop() and could not find #41 | (#293) spent 0.558 milliseconds in crypto helper computing work-order 293: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 293 for state #293 to event queue | scheduling resume sending helper answer for #293 | libevent_malloc: new ptr-libevent@0x7f499000c908 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 14 waiting (nothing to do) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-41 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-41' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-41" | stop processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:349) | spent 0.099 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 293 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #293 | **emit ISAKMP Message: | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | ikev2 g^x 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | ikev2 g^x db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | ikev2 g^x 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | ikev2 g^x 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | ikev2 g^x c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | ikev2 g^x 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | ikev2 g^x 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | ikev2 g^x 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | ikev2 g^x 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | ikev2 g^x d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | ikev2 g^x fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | ikev2 g^x 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | ikev2 g^x 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | ikev2 g^x 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | ikev2 g^x 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 17 7f 2f 85 | IKEv2 nonce f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 ec 32 66 ce | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 0a 05 68 37 88 9e d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 29 | natd_hash: port=500 | natd_hash: hash= 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 78 e3 65 fc | natd_hash: hash= ee b0 c2 cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 78 e3 65 fc | Notify data ee b0 c2 cc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 0a 05 68 37 88 9e d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | natd_hash: hash= c6 e3 f0 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | Notify data c6 e3 f0 be | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #293 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #293: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #293 to 4294967295 after switching state | Message ID: IKE #293 skipping update_recv as MD is fake | Message ID: sent #293 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.41:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | state #293 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499000ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 | #293 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.628162 | resume sending helper answer for #293 suppresed complete_v2_state_transition() and stole MD | #293 spent 0.297 milliseconds in resume sending helper answer | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499000c908 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.639568; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f499000c908 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | libevent_free: release ptr-libevent@0x7f49b00066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #278 spent 0.626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.283 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.665817; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | libevent_free: release ptr-libevent@0x7f49740066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #263 spent 0.437 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.692876; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009349 exceeds limit? YES "road-eastnet-nonat-42" #42: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-42" #42: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #294 at 0x55564d9bd5b8 | State DB: adding IKEv2 state #294 in UNDEFINED | pstats #294 ikev2.ike started | Message ID: init #294: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #294: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #294; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-42" #294: initiating v2 parent SA to replace #42 | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 294 for state #294 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f49740066b8 size 128 | #294 spent 0.4 milliseconds in ikev2_parent_outI1() | RESET processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 15 starting work-order 294 for state #294 | pstats #42 ikev2.ike failed too-many-retransmits | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 294 | pstats #42 ikev2.ike deleted too-many-retransmits | #42 spent 2.61 milliseconds in total | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-42" #42: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #42: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #42 "road-eastnet-nonat-42" #42: deleting IKE SA for connection 'road-eastnet-nonat-42' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-42' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-42 | State DB: deleting IKEv2 state #42 in PARENT_I1 | parent state #42: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #42 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d9a6d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | in statetime_stop() and could not find #42 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-42 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-42' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-42" | stop processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:349) | spent 0.163 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.697052; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f49b400f698 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | libevent_free: release ptr-libevent@0x7f49980066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #279 spent 0.378 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.697534; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f49980066b8 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #286 spent 0.335 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.19 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.172 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 294 time elapsed 0.004823 seconds | (#294) spent 4.79 milliseconds in crypto helper computing work-order 294: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 294 for state #294 to event queue | scheduling resume sending helper answer for #294 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 294 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #294 | **emit ISAKMP Message: | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ikev2 g^x ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | ikev2 g^x 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | ikev2 g^x b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | ikev2 g^x 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | ikev2 g^x 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | ikev2 g^x 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | ikev2 g^x 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | ikev2 g^x 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | ikev2 g^x 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | ikev2 g^x da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | ikev2 g^x b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | ikev2 g^x 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | ikev2 g^x f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | ikev2 g^x cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | ikev2 g^x 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 e4 ea 82 12 | IKEv2 nonce 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 60 b0 b4 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d0 78 3f 6c 17 14 61 1b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2a | natd_hash: port=500 | natd_hash: hash= 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 1e 3b 4c f6 | natd_hash: hash= f7 69 b4 d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 1e 3b 4c f6 | Notify data f7 69 b4 d4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d0 78 3f 6c 17 14 61 1b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | natd_hash: hash= dd c4 ac df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | Notify data dd c4 ac df | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #294 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #294: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #294 to 4294967295 after switching state | Message ID: IKE #294 skipping update_recv as MD is fake | Message ID: sent #294 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.42:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | state #294 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49740066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 | #294 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.699932 | resume sending helper answer for #294 suppresed complete_v2_state_transition() and stole MD | #294 spent 1.45 milliseconds in resume sending helper answer | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49840066b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.182 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.722404; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002893 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | libevent_free: release ptr-libevent@0x7f49780066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #264 spent 0.219 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0992 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.752811; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007123 exceeds limit? YES "road-eastnet-nonat-43" #43: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-43" #43: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #295 at 0x55564d9bec18 | State DB: adding IKEv2 state #295 in UNDEFINED | pstats #295 ikev2.ike started | Message ID: init #295: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #295: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #295; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-43" #295: initiating v2 parent SA to replace #43 | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 295 for state #295 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab16d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f49780066b8 size 128 | #295 spent 0.0874 milliseconds in ikev2_parent_outI1() | RESET processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #43 ikev2.ike failed too-many-retransmits | pstats #43 ikev2.ike deleted too-many-retransmits | #43 spent 2.63 milliseconds in total | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-43" #43: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #43: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #43 "road-eastnet-nonat-43" #43: deleting IKE SA for connection 'road-eastnet-nonat-43' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-43' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-43 | State DB: deleting IKEv2 state #43 in PARENT_I1 | crypto helper 16 resuming | crypto helper 16 starting work-order 295 for state #295 | parent state #43: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 295 | stop processing: state #43 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4974033468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | in statetime_stop() and could not find #43 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-43 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-43' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-43" | stop processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:349) | spent 0.0726 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 295 time elapsed 0.000593 seconds | (#295) spent 0.589 milliseconds in crypto helper computing work-order 295: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 295 for state #295 to event queue | scheduling resume sending helper answer for #295 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 295 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #295 | **emit ISAKMP Message: | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | ikev2 g^x 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | ikev2 g^x 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ikev2 g^x ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | ikev2 g^x 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | ikev2 g^x 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | ikev2 g^x 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ikev2 g^x ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | ikev2 g^x 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | ikev2 g^x e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | ikev2 g^x 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | ikev2 g^x 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | ikev2 g^x 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ikev2 g^x ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | ikev2 g^x 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | ikev2 g^x fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 93 0f 46 49 f4 67 05 24 20 76 5f cc 1b 44 ff bd | IKEv2 nonce 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 11 59 d0 b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c de bf bd ca 9f ab 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2b | natd_hash: port=500 | natd_hash: hash= d2 5f 17 01 37 9b 71 bd c6 da 1e 53 77 06 db a6 | natd_hash: hash= 9b 9d ec 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 5f 17 01 37 9b 71 bd c6 da 1e 53 77 06 db a6 | Notify data 9b 9d ec 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c de bf bd ca 9f ab 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | natd_hash: hash= 24 0c 42 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | Notify data 24 0c 42 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #295 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #295: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #295 to 4294967295 after switching state | Message ID: IKE #295 skipping update_recv as MD is fake | Message ID: sent #295 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.43:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | state #295 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab16d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f49b800f698 size 128 | #295 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.754139 | resume sending helper answer for #295 suppresed complete_v2_state_transition() and stole MD | #295 spent 0.516 milliseconds in resume sending helper answer | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498803e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.757362; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | libevent_free: release ptr-libevent@0x7f498800ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #287 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.757491; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f498800ca08 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #280 spent 0.0725 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0386 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.782776; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | libevent_free: release ptr-libevent@0x7f496c0066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #265 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.814094; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008652 exceeds limit? YES "road-eastnet-nonat-44" #44: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-44" #44: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #296 at 0x55564d9c0328 | State DB: adding IKEv2 state #296 in UNDEFINED | pstats #296 ikev2.ike started | Message ID: init #296: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #296: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #296; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-44" #296: initiating v2 parent SA to replace #44 | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 296 for state #296 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f496c0066b8 size 128 | #296 spent 0.0832 milliseconds in ikev2_parent_outI1() | RESET processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 296 for state #296 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 296 | pstats #44 ikev2.ike failed too-many-retransmits | pstats #44 ikev2.ike deleted too-many-retransmits | #44 spent 2.51 milliseconds in total | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-44" #44: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #44: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #44 "road-eastnet-nonat-44" #44: deleting IKE SA for connection 'road-eastnet-nonat-44' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-44' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-44 | State DB: deleting IKEv2 state #44 in PARENT_I1 | parent state #44: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 296 time elapsed 0.000817 seconds | (#296) spent 0.804 milliseconds in crypto helper computing work-order 296: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 296 for state #296 to event queue | scheduling resume sending helper answer for #296 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #44 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | in statetime_stop() and could not find #44 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-44 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-44' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-44" | stop processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:349) | spent 0.0594 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 296 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #296 | **emit ISAKMP Message: | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | ikev2 g^x f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | ikev2 g^x e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | ikev2 g^x a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | ikev2 g^x 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | ikev2 g^x f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | ikev2 g^x b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | ikev2 g^x d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | ikev2 g^x 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | ikev2 g^x fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | ikev2 g^x 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ikev2 g^x ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | ikev2 g^x de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | ikev2 g^x 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | ikev2 g^x d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | ikev2 g^x a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cb 0b f0 07 02 af c4 51 28 6f f2 38 f2 fb 42 4d | IKEv2 nonce 3d 65 75 af fa 14 81 a9 09 e1 85 03 f7 f2 13 96 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e4 c6 1b ce 58 75 9a 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2c | natd_hash: port=500 | natd_hash: hash= 5a 19 f8 59 32 55 99 73 94 9c ad b2 3c 92 3a e2 | natd_hash: hash= 42 b5 d2 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a 19 f8 59 32 55 99 73 94 9c ad b2 3c 92 3a e2 | Notify data 42 b5 d2 8f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e4 c6 1b ce 58 75 9a 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | natd_hash: hash= a1 f4 0b c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | Notify data a1 f4 0b c4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #296 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #296: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #296 to 4294967295 after switching state | Message ID: IKE #296 skipping update_recv as MD is fake | Message ID: sent #296 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.44:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | state #296 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c0066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f49ac0123d8 size 128 | #296 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.81545 | resume sending helper answer for #296 suppresed complete_v2_state_transition() and stole MD | #296 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c038b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.820642; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | libevent_free: release ptr-libevent@0x7f497c00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #288 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.831938; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f497c00ca08 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #281 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.842311; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | libevent_free: release ptr-libevent@0x7f49bc002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #266 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.875597; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008747 exceeds limit? YES "road-eastnet-nonat-45" #45: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-45" #45: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #297 at 0x55564d9c1a38 | State DB: adding IKEv2 state #297 in UNDEFINED | pstats #297 ikev2.ike started | Message ID: init #297: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #297: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #297; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-45" #297: initiating v2 parent SA to replace #45 | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 297 for state #297 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f49bc002108 size 128 | #297 spent 0.0839 milliseconds in ikev2_parent_outI1() | RESET processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 3 starting work-order 297 for state #297 | pstats #45 ikev2.ike failed too-many-retransmits | pstats #45 ikev2.ike deleted too-many-retransmits | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 297 | #45 spent 2.41 milliseconds in total | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-45" #45: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #45: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #45 "road-eastnet-nonat-45" #45: deleting IKE SA for connection 'road-eastnet-nonat-45' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-45' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-45 | State DB: deleting IKEv2 state #45 in PARENT_I1 | parent state #45: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 297 time elapsed 0.000772 seconds | (#297) spent 0.77 milliseconds in crypto helper computing work-order 297: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 297 for state #297 to event queue | scheduling resume sending helper answer for #297 | libevent_malloc: new ptr-libevent@0x7f498000c908 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #45 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499803e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | in statetime_stop() and could not find #45 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-45 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-45' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-45" | stop processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:349) | spent 0.0641 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 297 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #297 | **emit ISAKMP Message: | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | ikev2 g^x 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | ikev2 g^x 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ikev2 g^x ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | ikev2 g^x a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | ikev2 g^x 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | ikev2 g^x e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | ikev2 g^x af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | ikev2 g^x 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | ikev2 g^x 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | ikev2 g^x 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | ikev2 g^x d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | ikev2 g^x 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ikev2 g^x ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | ikev2 g^x 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | ikev2 g^x fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0b b5 84 46 d2 d8 31 2c ac 70 73 94 a2 66 d3 61 | IKEv2 nonce 94 b5 55 10 b8 ff 07 ad 94 e2 04 be d8 31 08 5c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 38 aa 35 be 02 51 fb cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2d | natd_hash: port=500 | natd_hash: hash= 4b 83 64 99 09 04 51 3c 57 15 e2 55 47 a2 7d 5c | natd_hash: hash= 49 cb 86 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4b 83 64 99 09 04 51 3c 57 15 e2 55 47 a2 7d 5c | Notify data 49 cb 86 07 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 38 aa 35 be 02 51 fb cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | natd_hash: hash= 88 fd 8c 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | Notify data 88 fd 8c 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #297 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #297: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #297 to 4294967295 after switching state | Message ID: IKE #297 skipping update_recv as MD is fake | Message ID: sent #297 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.45:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | state #297 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc002108 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f49b0012488 size 128 | #297 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.876976 | resume sending helper answer for #297 suppresed complete_v2_state_transition() and stole MD | #297 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498000c908 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.881152; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f498000c908 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #289 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.902475; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | libevent_free: release ptr-libevent@0x7f49b4009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #267 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.910765; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f49b4009cc8 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | libevent_free: release ptr-libevent@0x7f49900066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #282 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.936109; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007322 exceeds limit? YES "road-eastnet-nonat-46" #46: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-46" #46: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #298 at 0x55564d9c31b8 | State DB: adding IKEv2 state #298 in UNDEFINED | pstats #298 ikev2.ike started | Message ID: init #298: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #298: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #298; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-46" #298: initiating v2 parent SA to replace #46 | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 298 for state #298 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f49900066b8 size 128 | #298 spent 0.0811 milliseconds in ikev2_parent_outI1() | RESET processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | crypto helper 17 starting work-order 298 for state #298 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 298 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #46 ikev2.ike failed too-many-retransmits | pstats #46 ikev2.ike deleted too-many-retransmits | #46 spent 2.96 milliseconds in total | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-46" #46: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #46: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #46 "road-eastnet-nonat-46" #46: deleting IKE SA for connection 'road-eastnet-nonat-46' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-46' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-46 | State DB: deleting IKEv2 state #46 in PARENT_I1 | parent state #46: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 298 time elapsed 0.000979 seconds | (#298) spent 0.985 milliseconds in crypto helper computing work-order 298: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 298 for state #298 to event queue | scheduling resume sending helper answer for #298 | libevent_malloc: new ptr-libevent@0x7f497400cb08 size 128 | crypto helper 17 waiting (nothing to do) | stop processing: state #46 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b4030508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | in statetime_stop() and could not find #46 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-46 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-46' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-46" | stop processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:349) | spent 0.059 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 298 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #298 | **emit ISAKMP Message: | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | ikev2 g^x a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | ikev2 g^x f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | ikev2 g^x d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | ikev2 g^x df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ikev2 g^x ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | ikev2 g^x 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | ikev2 g^x 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | ikev2 g^x 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | ikev2 g^x 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | ikev2 g^x 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | ikev2 g^x e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | ikev2 g^x f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | ikev2 g^x 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | ikev2 g^x a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | ikev2 g^x 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 78 8a bf dc 08 d8 4a db 6b e6 12 b6 49 eb ef cf | IKEv2 nonce d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 6e 21 3f b8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 85 03 1d 08 be 5c f5 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2e | natd_hash: port=500 | natd_hash: hash= b7 73 16 b1 a1 da e1 96 24 2a c1 ee 6d 7b 2c 56 | natd_hash: hash= 80 19 8a 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 73 16 b1 a1 da e1 96 24 2a c1 ee 6d 7b 2c 56 | Notify data 80 19 8a 60 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 85 03 1d 08 be 5c f5 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | natd_hash: hash= 89 ad f5 c8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | Notify data 89 ad f5 c8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #298 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #298: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #298 to 4294967295 after switching state | Message ID: IKE #298 skipping update_recv as MD is fake | Message ID: sent #298 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.46:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | state #298 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49900066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 | #298 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.937657 | resume sending helper answer for #298 suppresed complete_v2_state_transition() and stole MD | #298 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497400cb08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10642.939841; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500695 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f497400cb08 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | libevent_free: release ptr-libevent@0x7f497400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #290 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10642.963257; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f497400ca08 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #268 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10642.982544; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | libevent_free: release ptr-libevent@0x7f49b4009dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #283 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10642.994814; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006987 exceeds limit? YES "road-eastnet-nonat-47" #47: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-47" #47: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #299 at 0x55564d9c4938 | State DB: adding IKEv2 state #299 in UNDEFINED | pstats #299 ikev2.ike started | Message ID: init #299: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #299: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #299; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-47" #299: initiating v2 parent SA to replace #47 | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 299 for state #299 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da44c58 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f49b4009dc8 size 128 | #299 spent 0.105 milliseconds in ikev2_parent_outI1() | RESET processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #47 ikev2.ike failed too-many-retransmits | pstats #47 ikev2.ike deleted too-many-retransmits | #47 spent 2.54 milliseconds in total | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-47" #47: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #47: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #47 | crypto helper 18 resuming | crypto helper 18 starting work-order 299 for state #299 "road-eastnet-nonat-47" #47: deleting IKE SA for connection 'road-eastnet-nonat-47' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 299 | add revival: connection 'road-eastnet-nonat-47' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-47 | State DB: deleting IKEv2 state #47 in PARENT_I1 | parent state #47: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #47 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a4043ad8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | in statetime_stop() and could not find #47 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 299 time elapsed 0.000537 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#299) spent 0.554 milliseconds in crypto helper computing work-order 299: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 299 for state #299 to event queue | scheduling resume sending helper answer for #299 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 18 waiting (nothing to do) Initiating connection road-eastnet-nonat-47 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-47' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-47" | stop processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:349) | spent 0.0694 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 299 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #299 | **emit ISAKMP Message: | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | ikev2 g^x 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | ikev2 g^x a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | ikev2 g^x 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | ikev2 g^x c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | ikev2 g^x d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | ikev2 g^x fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | ikev2 g^x 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | ikev2 g^x 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | ikev2 g^x 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | ikev2 g^x 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | ikev2 g^x 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | ikev2 g^x 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | ikev2 g^x 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | ikev2 g^x cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | ikev2 g^x 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 91 f5 50 43 29 00 21 76 ab 4d 2f 36 61 26 d2 | IKEv2 nonce e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 59 c1 f3 59 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 37 a9 cc 4e e4 e8 81 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2f | natd_hash: port=500 | natd_hash: hash= ab bf b9 32 d3 64 34 a0 13 04 c9 ec 58 91 8f c8 | natd_hash: hash= 89 71 64 ae | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab bf b9 32 d3 64 34 a0 13 04 c9 ec 58 91 8f c8 | Notify data 89 71 64 ae | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 37 a9 cc 4e e4 e8 81 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | natd_hash: hash= 57 68 09 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | Notify data 57 68 09 bf | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #299 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #299: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #299 to 4294967295 after switching state | Message ID: IKE #299 skipping update_recv as MD is fake | Message ID: sent #299 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.47:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | state #299 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4009dc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da44c58 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 | #299 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10642.996141 | resume sending helper answer for #299 suppresed complete_v2_state_transition() and stole MD | #299 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780065b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.003343; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | libevent_free: release ptr-libevent@0x7f497800cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #291 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.029697; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f497800cab8 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #269 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.052993; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | libevent_free: release ptr-libevent@0x7f49800065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #284 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.05622; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009055 exceeds limit? YES "road-eastnet-nonat-48" #48: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-48" #48: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #300 at 0x55564d9c60b8 | State DB: adding IKEv2 state #300 in UNDEFINED | pstats #300 ikev2.ike started | Message ID: init #300: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #300: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #300; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-48" #300: initiating v2 parent SA to replace #48 | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 300 for state #300 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f49800065b8 size 128 | #300 spent 0.0743 milliseconds in ikev2_parent_outI1() | RESET processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #48 ikev2.ike failed too-many-retransmits | pstats #48 ikev2.ike deleted too-many-retransmits | crypto helper 19 resuming | crypto helper 19 starting work-order 300 for state #300 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 300 | #48 spent 2.32 milliseconds in total | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-48" #48: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #48: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #48 "road-eastnet-nonat-48" #48: deleting IKE SA for connection 'road-eastnet-nonat-48' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-48' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-48 | State DB: deleting IKEv2 state #48 in PARENT_I1 | parent state #48: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 300 time elapsed 0.000599 seconds | (#300) spent 0.6 milliseconds in crypto helper computing work-order 300: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 300 for state #300 to event queue | scheduling resume sending helper answer for #300 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 | crypto helper 19 waiting (nothing to do) | stop processing: state #48 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a0028218 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | in statetime_stop() and could not find #48 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-48 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-48' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-48" | stop processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:349) | spent 0.0597 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 300 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #300 | **emit ISAKMP Message: | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | ikev2 g^x 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | ikev2 g^x 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | ikev2 g^x 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | ikev2 g^x b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | ikev2 g^x 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | ikev2 g^x cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | ikev2 g^x 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | ikev2 g^x 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | ikev2 g^x d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | ikev2 g^x 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | ikev2 g^x 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | ikev2 g^x e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | ikev2 g^x 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ikev2 g^x ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | ikev2 g^x 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 bd b0 f9 66 | IKEv2 nonce 5f 73 26 ae 94 5c 6f 22 91 96 db 52 2f e8 14 b4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 e5 44 69 66 43 67 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 30 | natd_hash: port=500 | natd_hash: hash= fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e 4d a6 4d 77 | natd_hash: hash= f8 55 3a d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e 4d a6 4d 77 | Notify data f8 55 3a d3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 e5 44 69 66 43 67 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | natd_hash: hash= da 91 42 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | Notify data da 91 42 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #300 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #300: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #300 to 4294967295 after switching state | Message ID: IKE #300 skipping update_recv as MD is fake | Message ID: sent #300 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.48:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | state #300 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 | #300 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.057364 | resume sending helper answer for #300 suppresed complete_v2_state_transition() and stole MD | #300 spent 0.3 milliseconds in resume sending helper answer | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c03e538 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.065537; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #292 spent 0.0869 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.101927; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | libevent_free: release ptr-libevent@0x7f49b000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #270 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.115315; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007132 exceeds limit? YES "road-eastnet-nonat-49" #49: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-49" #49: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #301 at 0x55564d9c7838 | State DB: adding IKEv2 state #301 in UNDEFINED | pstats #301 ikev2.ike started | Message ID: init #301: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #301: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #301; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-49" #301: initiating v2 parent SA to replace #49 | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 301 for state #301 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f49b000ca08 size 128 | #301 spent 0.0971 milliseconds in ikev2_parent_outI1() | RESET processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #49 ikev2.ike failed too-many-retransmits | pstats #49 ikev2.ike deleted too-many-retransmits | #49 spent 2.73 milliseconds in total | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-49" #49: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #49: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #49 "road-eastnet-nonat-49" #49: deleting IKE SA for connection 'road-eastnet-nonat-49' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-49' added to the list and scheduled for 0 seconds | crypto helper 0 resuming | crypto helper 0 starting work-order 301 for state #301 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 301 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-49 | State DB: deleting IKEv2 state #49 in PARENT_I1 | parent state #49: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 301 time elapsed 0.000711 seconds | (#301) spent 0.701 milliseconds in crypto helper computing work-order 301: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 301 for state #301 to event queue | scheduling resume sending helper answer for #301 | libevent_malloc: new ptr-libevent@0x7f49bc00f898 size 128 | crypto helper 0 waiting (nothing to do) | stop processing: state #49 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dac4448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | in statetime_stop() and could not find #49 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-49 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-49' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-49" | stop processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:349) | spent 0.0689 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 301 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #301 | **emit ISAKMP Message: | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | ikev2 g^x f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | ikev2 g^x b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | ikev2 g^x 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | ikev2 g^x 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | ikev2 g^x f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | ikev2 g^x 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | ikev2 g^x 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ikev2 g^x ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | ikev2 g^x 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | ikev2 g^x 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | ikev2 g^x 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | ikev2 g^x fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | ikev2 g^x c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ikev2 g^x ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | ikev2 g^x 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ea b2 03 bd ce 94 f5 eb c9 1d bd c8 1f 82 42 57 | IKEv2 nonce 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 b7 1a 27 da | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf 5e 2c cf f7 76 29 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 31 | natd_hash: port=500 | natd_hash: hash= 01 5d d9 66 7a dc a2 54 cf c2 19 95 a4 ad 53 bb | natd_hash: hash= e5 e3 a2 c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 5d d9 66 7a dc a2 54 cf c2 19 95 a4 ad 53 bb | Notify data e5 e3 a2 c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf 5e 2c cf f7 76 29 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | natd_hash: hash= eb b1 6e 04 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | Notify data eb b1 6e 04 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #301 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #301: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #301 to 4294967295 after switching state | Message ID: IKE #301 skipping update_recv as MD is fake | Message ID: sent #301 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.49:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | state #301 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b000ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f49a00123d8 size 128 | #301 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.116766 | resume sending helper answer for #301 suppresed complete_v2_state_transition() and stole MD | #301 spent 0.407 milliseconds in resume sending helper answer | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc00f898 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.127969; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f49bc00f898 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #285 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.129398; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #293 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.167021; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | libevent_free: release ptr-libevent@0x7f49a400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #271 spent 0.457 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.177028; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007942 exceeds limit? YES "road-eastnet-nonat-50" #50: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-50" #50: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #302 at 0x55564d9c8fb8 | State DB: adding IKEv2 state #302 in UNDEFINED | pstats #302 ikev2.ike started | Message ID: init #302: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #302: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #302; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-50" #302: initiating v2 parent SA to replace #50 | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 302 for state #302 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f49a400ca08 size 128 | #302 spent 0.273 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | RESET processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #50 ikev2.ike failed too-many-retransmits | pstats #50 ikev2.ike deleted too-many-retransmits | #50 spent 2.84 milliseconds in total | crypto helper 2 starting work-order 302 for state #302 | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 302 "road-eastnet-nonat-50" #50: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #50: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #50 "road-eastnet-nonat-50" #50: deleting IKE SA for connection 'road-eastnet-nonat-50' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-50' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-50 | State DB: deleting IKEv2 state #50 in PARENT_I1 | parent state #50: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #50 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 302 time elapsed 0.002644 seconds | libevent_free: release ptr-libevent@0x7f49a0043be8 | (#302) spent 2.67 milliseconds in crypto helper computing work-order 302: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | crypto helper 2 sending results from work-order 302 for state #302 to event queue | in statetime_stop() and could not find #50 | scheduling resume sending helper answer for #302 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b400f798 size 128 | crypto helper 2 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-50 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-50' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-50" | stop processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:349) | spent 0.171 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 302 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #302 | **emit ISAKMP Message: | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | ikev2 g^x cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | ikev2 g^x 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | ikev2 g^x c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | ikev2 g^x cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | ikev2 g^x 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | ikev2 g^x 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | ikev2 g^x c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | ikev2 g^x 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | ikev2 g^x b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | ikev2 g^x 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | ikev2 g^x 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | ikev2 g^x c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | ikev2 g^x cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | ikev2 g^x 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | ikev2 g^x e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3d bd 5a a7 af 23 49 39 1e 80 99 9f b0 dd 15 49 | IKEv2 nonce c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d 28 dc f6 70 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7e c1 38 66 a7 a7 2c 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 32 | natd_hash: port=500 | natd_hash: hash= 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 58 b7 26 72 | natd_hash: hash= 70 dd 8a cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 58 b7 26 72 | Notify data 70 dd 8a cd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7e c1 38 66 a7 a7 2c 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | natd_hash: hash= 06 43 b6 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | Notify data 06 43 b6 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #302 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #302: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #302 to 4294967295 after switching state | Message ID: IKE #302 skipping update_recv as MD is fake | Message ID: sent #302 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.50:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | state #302 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a400ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f4994012488 size 128 | #302 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.182275 | resume sending helper answer for #302 suppresed complete_v2_state_transition() and stole MD | #302 spent 1.7 milliseconds in resume sending helper answer | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b400f798 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.198892; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f49b400f798 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | libevent_free: release ptr-libevent@0x7f49980066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #286 spent 0.602 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.321 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.201065; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f49980066b8 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #294 spent 0.491 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.292 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.234057; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | libevent_free: release ptr-libevent@0x7f498c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #272 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.234294; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005458 exceeds limit? YES "road-eastnet-nonat-51" #51: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-51" #51: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #303 at 0x55564d9ca6c8 | State DB: adding IKEv2 state #303 in UNDEFINED | pstats #303 ikev2.ike started | Message ID: init #303: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #303: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #303; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-51" #303: initiating v2 parent SA to replace #51 | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 303 for state #303 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f498c0065b8 size 128 | #303 spent 0.126 milliseconds in ikev2_parent_outI1() | RESET processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 303 for state #303 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #51 ikev2.ike failed too-many-retransmits | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 303 | pstats #51 ikev2.ike deleted too-many-retransmits | #51 spent 2.92 milliseconds in total | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-51" #51: deleting state (STATE_PARENT_I1) aged 64.006s and NOT sending notification | parent state #51: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #51 "road-eastnet-nonat-51" #51: deleting IKE SA for connection 'road-eastnet-nonat-51' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-51' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-51 | State DB: deleting IKEv2 state #51 in PARENT_I1 | parent state #51: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 303 time elapsed 0.001775 seconds | (#303) spent 1.76 milliseconds in crypto helper computing work-order 303: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 303 for state #303 to event queue | stop processing: state #51 from 192.1.2.23 (in delete_state() at state.c:1143) | scheduling resume sending helper answer for #303 | libevent_free: release ptr-libevent@0x7f499c01d1f8 | libevent_malloc: new ptr-libevent@0x7f49b800f798 size 128 | crypto helper 4 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | in statetime_stop() and could not find #51 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-51 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-51' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-51" | stop processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:349) | spent 0.0761 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 303 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #303 | **emit ISAKMP Message: | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | ikev2 g^x cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | ikev2 g^x 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | ikev2 g^x 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | ikev2 g^x 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | ikev2 g^x da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | ikev2 g^x e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | ikev2 g^x 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | ikev2 g^x e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | ikev2 g^x b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | ikev2 g^x 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | ikev2 g^x cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | ikev2 g^x 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | ikev2 g^x 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | ikev2 g^x d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | ikev2 g^x 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e b5 82 ec 48 | IKEv2 nonce 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 c5 0a 2d b2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1f 6f f1 27 7f 2a 9e e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 33 | natd_hash: port=500 | natd_hash: hash= 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 c8 b3 c6 25 | natd_hash: hash= 40 fd 69 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 c8 b3 c6 25 | Notify data 40 fd 69 26 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1f 6f f1 27 7f 2a 9e e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | natd_hash: hash= 5b ed 70 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | Notify data 5b ed 70 cb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #303 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #303: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #303 to 4294967295 after switching state | Message ID: IKE #303 skipping update_recv as MD is fake | Message ID: sent #303 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.51:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | state #303 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c0065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f49980125b8 size 128 | #303 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.23704 | resume sending helper answer for #303 suppresed complete_v2_state_transition() and stole MD | #303 spent 0.512 milliseconds in resume sending helper answer | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b800f798 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.254254; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500115 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f49b800f798 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | libevent_free: release ptr-libevent@0x7f49b800f698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #295 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.258631; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f49b800f698 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #287 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.29689; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008706 exceeds limit? YES "road-eastnet-nonat-52" #52: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-52" #52: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #304 at 0x55564d9cbd28 | State DB: adding IKEv2 state #304 in UNDEFINED | pstats #304 ikev2.ike started | Message ID: init #304: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #304: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #304; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-52" #304: initiating v2 parent SA to replace #52 | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 304 for state #304 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | #304 spent 0.0784 milliseconds in ikev2_parent_outI1() | RESET processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #52 ikev2.ike failed too-many-retransmits | pstats #52 ikev2.ike deleted too-many-retransmits | #52 spent 2.74 milliseconds in total | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-52" #52: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #52: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #52 "road-eastnet-nonat-52" #52: deleting IKE SA for connection 'road-eastnet-nonat-52' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-52' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-52 | crypto helper 5 resuming | crypto helper 5 starting work-order 304 for state #304 | State DB: deleting IKEv2 state #52 in PARENT_I1 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 304 | parent state #52: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 304 time elapsed 0.000728 seconds | (#304) spent 0.732 milliseconds in crypto helper computing work-order 304: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 304 for state #304 to event queue | scheduling resume sending helper answer for #304 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #52 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498802db48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | in statetime_stop() and could not find #52 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-52 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-52' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-52" | stop processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:349) | spent 0.0743 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 304 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #304 | **emit ISAKMP Message: | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | ikev2 g^x 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | ikev2 g^x 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | ikev2 g^x 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | ikev2 g^x 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | ikev2 g^x 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ikev2 g^x ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | ikev2 g^x c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | ikev2 g^x 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | ikev2 g^x 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | ikev2 g^x 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | ikev2 g^x f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | ikev2 g^x bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | ikev2 g^x 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | ikev2 g^x 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | ikev2 g^x dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce db 66 39 e7 81 6f 92 34 60 01 24 a1 c0 4e c0 f8 | IKEv2 nonce cc b0 0e 8b e1 eb ed b6 60 0b 64 7a e2 42 d4 45 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e1 b8 d9 84 9e 2e db 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 34 | natd_hash: port=500 | natd_hash: hash= 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 bd 8c 45 70 | natd_hash: hash= e3 e2 6a eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 bd 8c 45 70 | Notify data e3 e2 6a eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e1 b8 d9 84 9e 2e db 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | natd_hash: hash= e9 93 c0 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | Notify data e9 93 c0 11 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #304 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #304: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #304 to 4294967295 after switching state | Message ID: IKE #304 skipping update_recv as MD is fake | Message ID: sent #304 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.52:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | state #304 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 | #304 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.298244 | resume sending helper answer for #304 suppresed complete_v2_state_transition() and stole MD | #304 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.316449; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | libevent_free: release ptr-libevent@0x7f49ac0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #296 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.321953; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f49ac0123d8 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #288 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.328314; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | libevent_free: release ptr-libevent@0x7f499c00cb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #273 spent 0.0815 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.357647; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009179 exceeds limit? YES "road-eastnet-nonat-53" #53: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-53" #53: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #305 at 0x55564d9cd438 | State DB: adding IKEv2 state #305 in UNDEFINED | pstats #305 ikev2.ike started | Message ID: init #305: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #305: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #305; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-53" #305: initiating v2 parent SA to replace #53 | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 305 for state #305 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f499c00cb08 size 128 | #305 spent 0.123 milliseconds in ikev2_parent_outI1() | RESET processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #53 ikev2.ike failed too-many-retransmits | pstats #53 ikev2.ike deleted too-many-retransmits | #53 spent 2.37 milliseconds in total | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-53" #53: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #53: PARENT_I1(half-open IKE SA) => delete | crypto helper 6 resuming | crypto helper 6 starting work-order 305 for state #305 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 305 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #53 "road-eastnet-nonat-53" #53: deleting IKE SA for connection 'road-eastnet-nonat-53' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-53' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-53 | State DB: deleting IKEv2 state #53 in PARENT_I1 | parent state #53: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 305 time elapsed 0.000941 seconds | (#305) spent 0.947 milliseconds in crypto helper computing work-order 305: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 305 for state #305 to event queue | scheduling resume sending helper answer for #305 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 | crypto helper 6 waiting (nothing to do) | stop processing: state #53 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498c043b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | in statetime_stop() and could not find #53 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-53 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-53' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-53" | stop processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:349) | spent 0.0832 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 305 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #305 | **emit ISAKMP Message: | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | ikev2 g^x 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | ikev2 g^x aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | ikev2 g^x a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | ikev2 g^x 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | ikev2 g^x fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | ikev2 g^x 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | ikev2 g^x b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | ikev2 g^x 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | ikev2 g^x 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | ikev2 g^x e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | ikev2 g^x c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | ikev2 g^x 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | ikev2 g^x da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | ikev2 g^x a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | ikev2 g^x 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9c ce db e8 a1 7e fa d3 67 24 39 06 f1 54 af ee | IKEv2 nonce c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 e7 cb 59 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 49 52 fa 0d da 38 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 35 | natd_hash: port=500 | natd_hash: hash= 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a 4e c3 62 a0 | natd_hash: hash= d4 17 75 ba | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a 4e c3 62 a0 | Notify data d4 17 75 ba | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 49 52 fa 0d da 38 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | natd_hash: hash= 11 fc c3 a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | Notify data 11 fc c3 a2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #305 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #305: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #305 to 4294967295 after switching state | Message ID: IKE #305 skipping update_recv as MD is fake | Message ID: sent #305 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.53:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | state #305 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c00cb08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f4990012488 size 128 | #305 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.35955 | resume sending helper answer for #305 suppresed complete_v2_state_transition() and stole MD | #305 spent 0.557 milliseconds in resume sending helper answer | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0012388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.376847; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | libevent_free: release ptr-libevent@0x7f49b0012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #297 spent 0.22 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.107 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.383403; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f49b0012488 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | libevent_free: release ptr-libevent@0x7f498000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #289 spent 0.203 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.386979; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f498000c908 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | libevent_free: release ptr-libevent@0x7f49a0004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #274 spent 0.268 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.128 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.438643; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #298 spent 0.43 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.441594; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | libevent_free: release ptr-libevent@0x7f497400cb08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #290 spent 0.416 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.444615; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004887 exceeds limit? YES "road-eastnet-nonat-54" #54: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-54" #54: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #306 at 0x55564d9cec48 | State DB: adding IKEv2 state #306 in UNDEFINED | pstats #306 ikev2.ike started | Message ID: init #306: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #306: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #306; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-54" #306: initiating v2 parent SA to replace #54 | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 306 for state #306 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f497400cb08 size 128 | #306 spent 0.288 milliseconds in ikev2_parent_outI1() | RESET processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #54 ikev2.ike failed too-many-retransmits | pstats #54 ikev2.ike deleted too-many-retransmits | #54 spent 6.54 milliseconds in total | crypto helper 7 resuming | crypto helper 7 starting work-order 306 for state #306 | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 306 "road-eastnet-nonat-54" #54: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #54: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #54 "road-eastnet-nonat-54" #54: deleting IKE SA for connection 'road-eastnet-nonat-54' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-54' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-54 | State DB: deleting IKEv2 state #54 in PARENT_I1 | parent state #54: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 306 time elapsed 0.002567 seconds | (#306) spent 2.58 milliseconds in crypto helper computing work-order 306: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 306 for state #306 to event queue | stop processing: state #54 from 192.1.2.23 (in delete_state() at state.c:1143) | scheduling resume sending helper answer for #306 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 | libevent_free: release ptr-libevent@0x7f49900332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | in statetime_stop() and could not find #54 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 7 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-54 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-54' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-54" | stop processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:349) | spent 0.166 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 306 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #306 | **emit ISAKMP Message: | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | ikev2 g^x 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | ikev2 g^x c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | ikev2 g^x 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | ikev2 g^x 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | ikev2 g^x 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | ikev2 g^x 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | ikev2 g^x e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | ikev2 g^x bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ikev2 g^x ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | ikev2 g^x 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | ikev2 g^x 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | ikev2 g^x c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | ikev2 g^x 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | ikev2 g^x 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | ikev2 g^x c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 74 88 24 d4 | IKEv2 nonce f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 0d d4 6e 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0b af 40 2a 19 b8 b0 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 36 | natd_hash: port=500 | natd_hash: hash= 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 99 5a b9 26 | natd_hash: hash= fa ed d6 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 99 5a b9 26 | Notify data fa ed d6 25 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0b af 40 2a 19 b8 b0 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | natd_hash: hash= 83 d4 e2 ad | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | Notify data 83 d4 e2 ad | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #306 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #306: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #306 to 4294967295 after switching state | Message ID: IKE #306 skipping update_recv as MD is fake | Message ID: sent #306 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.54:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | state #306 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497400cb08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f4984012488 size 128 | #306 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.449659 | resume sending helper answer for #306 suppresed complete_v2_state_transition() and stole MD | #306 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40122d8 | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.449848; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | libevent_free: release ptr-libevent@0x7f4994004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #275 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.178 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.497964; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #299 spent 0.578 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.505994; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001988 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #291 spent 0.473 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.506573; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | libevent_free: release ptr-libevent@0x7f499800cce8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #276 spent 0.349 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.151 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.508416; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007823 exceeds limit? YES "road-eastnet-nonat-55" #55: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-55" #55: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #307 at 0x55564d9d02a8 | State DB: adding IKEv2 state #307 in UNDEFINED | pstats #307 ikev2.ike started | Message ID: init #307: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #307: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #307; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-55" #307: initiating v2 parent SA to replace #55 | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 307 for state #307 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f4998049be8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f499800cce8 size 128 | #307 spent 0.239 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | RESET processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 307 for state #307 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #55 ikev2.ike failed too-many-retransmits | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 307 | pstats #55 ikev2.ike deleted too-many-retransmits | #55 spent 3.07 milliseconds in total | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-55" #55: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #55: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #55 "road-eastnet-nonat-55" #55: deleting IKE SA for connection 'road-eastnet-nonat-55' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-55' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-55 | State DB: deleting IKEv2 state #55 in PARENT_I1 | parent state #55: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #55 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 307 time elapsed 0.002468 seconds | libevent_free: release ptr-libevent@0x7f49b003e2b8 | (#307) spent 2.45 milliseconds in crypto helper computing work-order 307: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | crypto helper 8 sending results from work-order 307 for state #307 to event queue | scheduling resume sending helper answer for #307 | in statetime_stop() and could not find #55 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49a80125a8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 8 waiting (nothing to do) Initiating connection road-eastnet-nonat-55 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-55' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-55" | stop processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:349) | spent 0.146 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 307 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #307 | **emit ISAKMP Message: | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | ikev2 g^x 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | ikev2 g^x 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | ikev2 g^x 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | ikev2 g^x 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | ikev2 g^x 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | ikev2 g^x 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | ikev2 g^x e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | ikev2 g^x e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | ikev2 g^x 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | ikev2 g^x 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | ikev2 g^x f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | ikev2 g^x 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ikev2 g^x ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | ikev2 g^x 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | ikev2 g^x 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 34 8d 39 46 aa 83 93 17 d2 f6 83 03 61 d9 8b f4 | IKEv2 nonce b8 27 fb ce 7e 78 34 16 05 69 c3 7b f8 4c d7 24 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e8 c2 b9 a4 99 6f d9 9e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 37 | natd_hash: port=500 | natd_hash: hash= f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 6e 83 be b7 | natd_hash: hash= 3e 40 70 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 6e 83 be b7 | Notify data 3e 40 70 a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e8 c2 b9 a4 99 6f d9 9e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | natd_hash: hash= 7a e8 af 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | Notify data 7a e8 af 6d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #307 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #307: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #307 to 4294967295 after switching state | Message ID: IKE #307 skipping update_recv as MD is fake | Message ID: sent #307 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.55:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | state #307 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499800cce8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f4998049be8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f4988012488 size 128 | #307 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.512574 | resume sending helper answer for #307 suppresed complete_v2_state_transition() and stole MD | #307 spent 0.956 milliseconds in resume sending helper answer | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a80125a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.12 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.558879; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f49a80125a8 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #300 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0489 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.56314; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | libevent_free: release ptr-libevent@0x7f498c00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #277 spent 0.0956 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.566411; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007443 exceeds limit? YES "road-eastnet-nonat-56" #56: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-56" #56: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #308 at 0x55564d9d1908 | State DB: adding IKEv2 state #308 in UNDEFINED | pstats #308 ikev2.ike started | Message ID: init #308: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #308: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #308; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-56" #308: initiating v2 parent SA to replace #56 | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 308 for state #308 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f498c00ca08 size 128 | #308 spent 0.0762 milliseconds in ikev2_parent_outI1() | RESET processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 308 for state #308 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 308 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #56 ikev2.ike failed too-many-retransmits | pstats #56 ikev2.ike deleted too-many-retransmits | #56 spent 2.44 milliseconds in total | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-56" #56: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #56: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #56 "road-eastnet-nonat-56" #56: deleting IKE SA for connection 'road-eastnet-nonat-56' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-56' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-56 | State DB: deleting IKEv2 state #56 in PARENT_I1 | parent state #56: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 308 time elapsed 0.000981 seconds | (#308) spent 0.987 milliseconds in crypto helper computing work-order 308: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 308 for state #308 to event queue | scheduling resume sending helper answer for #308 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 | crypto helper 9 waiting (nothing to do) | stop processing: state #56 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dac4528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | in statetime_stop() and could not find #56 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-56 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-56' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-56" | stop processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:349) | spent 0.0577 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 308 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #308 | **emit ISAKMP Message: | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | ikev2 g^x 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | ikev2 g^x 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | ikev2 g^x 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | ikev2 g^x 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | ikev2 g^x c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | ikev2 g^x 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | ikev2 g^x 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | ikev2 g^x 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | ikev2 g^x d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | ikev2 g^x 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | ikev2 g^x 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | ikev2 g^x 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | ikev2 g^x 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | ikev2 g^x 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | ikev2 g^x 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd 8b 1e 86 9c | IKEv2 nonce 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 4b b8 3b 21 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c9 24 ed 1c 59 63 68 f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 38 | natd_hash: port=500 | natd_hash: hash= df 8d 2f c1 db a2 b4 75 e0 a7 85 4f 3e c5 b9 45 | natd_hash: hash= 95 20 aa 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 8d 2f c1 db a2 b4 75 e0 a7 85 4f 3e c5 b9 45 | Notify data 95 20 aa 55 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c9 24 ed 1c 59 63 68 f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | natd_hash: hash= 52 05 12 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | Notify data 52 05 12 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #308 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #308: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #308 to 4294967295 after switching state | Message ID: IKE #308 skipping update_recv as MD is fake | Message ID: sent #308 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.56:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | state #308 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c00ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f497c0123d8 size 128 | #308 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.567982 | resume sending helper answer for #308 suppresed complete_v2_state_transition() and stole MD | #308 spent 0.346 milliseconds in resume sending helper answer | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0122d8 | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.568014; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #292 spent 0.067 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.617392; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500626 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | libevent_free: release ptr-libevent@0x7f49a00123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #301 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.625676; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00777 exceeds limit? YES "road-eastnet-nonat-57" #57: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-57" #57: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #309 at 0x55564d9d3088 | State DB: adding IKEv2 state #309 in UNDEFINED | pstats #309 ikev2.ike started | Message ID: init #309: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #309: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #309; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-57" #309: initiating v2 parent SA to replace #57 | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 309 for state #309 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f49a00123d8 size 128 | #309 spent 0.0748 milliseconds in ikev2_parent_outI1() | RESET processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 10 resuming | crypto helper 10 starting work-order 309 for state #309 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 309 | pstats #57 ikev2.ike failed too-many-retransmits | pstats #57 ikev2.ike deleted too-many-retransmits | #57 spent 2.05 milliseconds in total | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-57" #57: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #57: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #57 "road-eastnet-nonat-57" #57: deleting IKE SA for connection 'road-eastnet-nonat-57' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-57' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-57 | State DB: deleting IKEv2 state #57 in PARENT_I1 | parent state #57: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 309 time elapsed 0.000613 seconds | (#309) spent 0.619 milliseconds in crypto helper computing work-order 309: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 309 for state #309 to event queue | scheduling resume sending helper answer for #309 | libevent_malloc: new ptr-libevent@0x7f49a00124d8 size 128 | crypto helper 10 waiting (nothing to do) | stop processing: state #57 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498c02dae8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | in statetime_stop() and could not find #57 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-57 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-57' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-57" | stop processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:349) | spent 0.0582 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 309 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #309 | **emit ISAKMP Message: | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | ikev2 g^x 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | ikev2 g^x de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | ikev2 g^x 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | ikev2 g^x 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | ikev2 g^x 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | ikev2 g^x 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | ikev2 g^x 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ikev2 g^x ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | ikev2 g^x cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | ikev2 g^x 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | ikev2 g^x da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | ikev2 g^x c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | ikev2 g^x 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | ikev2 g^x c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | ikev2 g^x 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8a ba 5d 74 11 9a c8 db c1 cd 07 8c be c9 4a 89 | IKEv2 nonce 38 9e 72 16 2d 7f 7e 34 df c5 df 69 a8 91 d3 fc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 54 58 c3 09 30 2f 29 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 39 | natd_hash: port=500 | natd_hash: hash= 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff 3e 94 d7 e2 | natd_hash: hash= da b8 c5 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff 3e 94 d7 e2 | Notify data da b8 c5 8b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e 54 58 c3 09 30 2f 29 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | natd_hash: hash= 66 5c 15 f8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | Notify data 66 5c 15 f8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #309 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #309: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #309 to 4294967295 after switching state | Message ID: IKE #309 skipping update_recv as MD is fake | Message ID: sent #309 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.57:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | state #309 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00123d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f4980012488 size 128 | #309 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.626912 | resume sending helper answer for #309 suppresed complete_v2_state_transition() and stole MD | #309 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00124d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.630085; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f49a00124d8 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #293 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.639374; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00224 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | libevent_free: release ptr-libevent@0x7f499000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #278 spent 0.0953 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.680748; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f499000c908 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | libevent_free: release ptr-libevent@0x7f4994012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #302 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.697137; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f4994012488 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | libevent_free: release ptr-libevent@0x7f49b400f698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #279 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.702607; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f49b400f698 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | libevent_free: release ptr-libevent@0x7f49980066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #294 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.712076; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005819 exceeds limit? YES "road-eastnet-nonat-58" #58: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-58" #58: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #310 at 0x55564d9d4808 | State DB: adding IKEv2 state #310 in UNDEFINED | pstats #310 ikev2.ike started | Message ID: init #310: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #310: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #310; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-58" #310: initiating v2 parent SA to replace #58 | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 310 for state #310 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db088 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f49980066b8 size 128 | #310 spent 0.114 milliseconds in ikev2_parent_outI1() | RESET processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #58 ikev2.ike failed too-many-retransmits | pstats #58 ikev2.ike deleted too-many-retransmits | #58 spent 6.89 milliseconds in total | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-58" #58: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #58: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 11 resuming | crypto helper 11 starting work-order 310 for state #310 | picked newest_isakmp_sa #0 for #58 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 310 "road-eastnet-nonat-58" #58: deleting IKE SA for connection 'road-eastnet-nonat-58' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-58' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-58 | State DB: deleting IKEv2 state #58 in PARENT_I1 | parent state #58: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 310 time elapsed 0.000974 seconds | stop processing: state #58 from 192.1.2.23 (in delete_state() at state.c:1143) | (#310) spent 0.967 milliseconds in crypto helper computing work-order 310: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 310 for state #310 to event queue | libevent_free: release ptr-libevent@0x55564d9dc798 | scheduling resume sending helper answer for #310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | in statetime_stop() and could not find #58 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-58 which received a Delete/Notify but must remain up per local policy | crypto helper 11 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-58' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-58" | stop processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:349) | spent 0.0962 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 310 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #310 | **emit ISAKMP Message: | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | ikev2 g^x 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | ikev2 g^x 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | ikev2 g^x c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | ikev2 g^x e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | ikev2 g^x 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | ikev2 g^x 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | ikev2 g^x 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | ikev2 g^x 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | ikev2 g^x 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | ikev2 g^x c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | ikev2 g^x 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | ikev2 g^x 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | ikev2 g^x 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | ikev2 g^x d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | ikev2 g^x 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6b c7 08 61 df 03 55 2f d8 c7 8b 78 07 89 80 d7 | IKEv2 nonce f3 d9 f7 46 20 4e e3 32 59 dc d1 2e 4e e6 8c fd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d9 09 47 12 41 b0 45 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3a | natd_hash: port=500 | natd_hash: hash= c0 f0 64 86 06 1a df d9 a7 d7 3c 29 74 08 ce da | natd_hash: hash= 4f 51 88 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 f0 64 86 06 1a df d9 a7 d7 3c 29 74 08 ce da | Notify data 4f 51 88 16 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d9 09 47 12 41 b0 45 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | natd_hash: hash= ae 28 a4 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | Notify data ae 28 a4 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #310 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #310: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #310 to 4294967295 after switching state | Message ID: IKE #310 skipping update_recv as MD is fake | Message ID: sent #310 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.58:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | state #310 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49980066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db088 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f4974012488 size 128 | #310 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.714155 | resume sending helper answer for #310 suppresed complete_v2_state_transition() and stole MD | #310 spent 0.672 milliseconds in resume sending helper answer | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994012388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.737564; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | libevent_free: release ptr-libevent@0x7f49980125b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #303 spent 0.373 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.185 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.754435; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f49980125b8 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | libevent_free: release ptr-libevent@0x7f49b800f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #295 spent 0.425 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.757387; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f49b800f798 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | libevent_free: release ptr-libevent@0x7f498800ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #280 spent 0.391 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.796315; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010849 exceeds limit? YES "road-eastnet-nonat-59" #59: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-59" #59: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #311 at 0x55564d9d5f88 | State DB: adding IKEv2 state #311 in UNDEFINED | pstats #311 ikev2.ike started | Message ID: init #311: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #311: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #311; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-59" #311: initiating v2 parent SA to replace #59 | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 311 for state #311 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f498800ca08 size 128 | #311 spent 0.27 milliseconds in ikev2_parent_outI1() | RESET processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #59 ikev2.ike failed too-many-retransmits | pstats #59 ikev2.ike deleted too-many-retransmits | #59 spent 5.55 milliseconds in total | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 12 resuming "road-eastnet-nonat-59" #59: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #59: PARENT_I1(half-open IKE SA) => delete | crypto helper 12 starting work-order 311 for state #311 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 311 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #59 "road-eastnet-nonat-59" #59: deleting IKE SA for connection 'road-eastnet-nonat-59' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-59' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-59 | State DB: deleting IKEv2 state #59 in PARENT_I1 | parent state #59: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 311 time elapsed 0.002572 seconds | (#311) spent 2.57 milliseconds in crypto helper computing work-order 311: ikev2_outI1 KE (pcr) | stop processing: state #59 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da4c0a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | in statetime_stop() and could not find #59 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 12 sending results from work-order 311 for state #311 to event queue Initiating connection road-eastnet-nonat-59 which received a Delete/Notify but must remain up per local policy | scheduling resume sending helper answer for #311 | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-59' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-59" | stop processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:349) | spent 0.235 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.799967; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | libevent_free: release ptr-libevent@0x7f498c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #304 spent 0.371 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 311 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #311 | **emit ISAKMP Message: | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | ikev2 g^x f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | ikev2 g^x 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | ikev2 g^x 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | ikev2 g^x a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | ikev2 g^x 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | ikev2 g^x 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | ikev2 g^x 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | ikev2 g^x 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | ikev2 g^x 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | ikev2 g^x 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | ikev2 g^x 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | ikev2 g^x 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | ikev2 g^x 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | ikev2 g^x 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | ikev2 g^x 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 8e c4 49 9c | IKEv2 nonce a3 01 07 39 8b fc be fe ea f8 1a a3 d1 bb 39 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a8 18 61 1c 71 e1 c7 ad | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3b | natd_hash: port=500 | natd_hash: hash= b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae a5 28 66 2f | natd_hash: hash= 23 b7 2b 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae a5 28 66 2f | Notify data 23 b7 2b 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a8 18 61 1c 71 e1 c7 ad | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | natd_hash: hash= a7 36 2f ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | Notify data a7 36 2f ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #311 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #311: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #311 to 4294967295 after switching state | Message ID: IKE #311 skipping update_recv as MD is fake | Message ID: sent #311 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.59:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | state #311 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498800ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabb928 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 | #311 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.802154 | resume sending helper answer for #311 suppresed complete_v2_state_transition() and stole MD | #311 spent 1.48 milliseconds in resume sending helper answer | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499803e2b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.817712; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #296 spent 0.457 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.833684; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | libevent_free: release ptr-libevent@0x7f497c00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #281 spent 0.421 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.852603; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005703 exceeds limit? YES "road-eastnet-nonat-60" #60: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-60" #60: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #312 at 0x55564d9d7708 | State DB: adding IKEv2 state #312 in UNDEFINED | pstats #312 ikev2.ike started | Message ID: init #312: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #312: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #312; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-60" #312: initiating v2 parent SA to replace #60 | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 312 for state #312 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f497c00ca08 size 128 | #312 spent 0.283 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | RESET processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 312 for state #312 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #60 ikev2.ike failed too-many-retransmits | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 312 | pstats #60 ikev2.ike deleted too-many-retransmits | #60 spent 2.43 milliseconds in total | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-60" #60: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #60: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #60 "road-eastnet-nonat-60" #60: deleting IKE SA for connection 'road-eastnet-nonat-60' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-60' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-60 | State DB: deleting IKEv2 state #60 in PARENT_I1 | parent state #60: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #60 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 312 time elapsed 0.002724 seconds | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | in statetime_stop() and could not find #60 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#312) spent 2.72 milliseconds in crypto helper computing work-order 312: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 13 sending results from work-order 312 for state #312 to event queue | scheduling resume sending helper answer for #312 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 Initiating connection road-eastnet-nonat-60 which received a Delete/Notify but must remain up per local policy | crypto helper 13 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-60' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-60" | stop processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:349) | spent 0.224 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 312 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #312 | **emit ISAKMP Message: | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | ikev2 g^x 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | ikev2 g^x 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | ikev2 g^x 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | ikev2 g^x 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | ikev2 g^x 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | ikev2 g^x 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | ikev2 g^x 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | ikev2 g^x 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | ikev2 g^x 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ikev2 g^x ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | ikev2 g^x 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | ikev2 g^x aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | ikev2 g^x f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | ikev2 g^x 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | ikev2 g^x d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f 50 97 5a b3 | IKEv2 nonce 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 06 8b 0f 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 17 7f 88 4b a6 59 bb 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3c | natd_hash: port=500 | natd_hash: hash= a8 97 9e f5 20 f6 14 13 a9 44 a4 01 5c eb df cf | natd_hash: hash= bd 65 c7 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 97 9e f5 20 f6 14 13 a9 44 a4 01 5c eb df cf | Notify data bd 65 c7 72 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 17 7f 88 4b a6 59 bb 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | natd_hash: hash= 11 18 1a 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | Notify data 11 18 1a 2e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #312 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #312: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #312 to 4294967295 after switching state | Message ID: IKE #312 skipping update_recv as MD is fake | Message ID: sent #312 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.60:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | state #312 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c00ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f496c012538 size 128 | #312 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.857713 | resume sending helper answer for #312 suppresed complete_v2_state_transition() and stole MD | #312 spent 1.48 milliseconds in resume sending helper answer | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c0124d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.860299; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | libevent_free: release ptr-libevent@0x7f4990012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #305 spent 0.393 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.878173; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f4990012488 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #297 spent 0.431 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.912088; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | libevent_free: release ptr-libevent@0x7f49b4009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #282 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10643.913433; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008068 exceeds limit? YES "road-eastnet-nonat-61" #61: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-61" #61: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #313 at 0x55564d9d8e18 | State DB: adding IKEv2 state #313 in UNDEFINED | pstats #313 ikev2.ike started | Message ID: init #313: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #313: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #313; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-61" #313: initiating v2 parent SA to replace #61 | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 313 for state #313 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f49b4009cc8 size 128 | #313 spent 0.0986 milliseconds in ikev2_parent_outI1() | RESET processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #61 ikev2.ike failed too-many-retransmits | pstats #61 ikev2.ike deleted too-many-retransmits | #61 spent 2.72 milliseconds in total | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-61" #61: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #61: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #61 "road-eastnet-nonat-61" #61: deleting IKE SA for connection 'road-eastnet-nonat-61' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-61' added to the list and scheduled for 0 seconds | crypto helper 14 resuming | crypto helper 14 starting work-order 313 for state #313 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 313 | in connection_discard for connection road-eastnet-nonat-61 | State DB: deleting IKEv2 state #61 in PARENT_I1 | parent state #61: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 313 time elapsed 0.001122 seconds | (#313) spent 1.13 milliseconds in crypto helper computing work-order 313: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 313 for state #313 to event queue | scheduling resume sending helper answer for #313 | stop processing: state #61 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 | libevent_free: release ptr-libevent@0x55564daaa3f8 | crypto helper 14 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | in statetime_stop() and could not find #61 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-61 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-61' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-61" | stop processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:349) | spent 0.076 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 313 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #313 | **emit ISAKMP Message: | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | ikev2 g^x e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | ikev2 g^x 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | ikev2 g^x 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | ikev2 g^x 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | ikev2 g^x 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | ikev2 g^x fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | ikev2 g^x 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | ikev2 g^x b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | ikev2 g^x 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | ikev2 g^x 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | ikev2 g^x 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | ikev2 g^x 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | ikev2 g^x 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | ikev2 g^x 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | ikev2 g^x c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5d b5 15 2e 87 fc 17 b6 71 00 17 6f 5b db 42 92 | IKEv2 nonce 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 c0 59 28 e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 fc 4d 68 7b 7d 42 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3d | natd_hash: port=500 | natd_hash: hash= e5 aa b0 de 87 60 ca b4 6e a7 cc 0b 98 bf fb 60 | natd_hash: hash= 4e 76 b8 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 aa b0 de 87 60 ca b4 6e a7 cc 0b 98 bf fb 60 | Notify data 4e 76 b8 d9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 fc 4d 68 7b 7d 42 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | natd_hash: hash= 13 d9 fd e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | Notify data 13 d9 fd e0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #313 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #313: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #313 to 4294967295 after switching state | Message ID: IKE #313 skipping update_recv as MD is fake | Message ID: sent #313 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.61:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | state #313 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4009cc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 | #313 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10643.915309 | resume sending helper answer for #313 suppresed complete_v2_state_transition() and stole MD | #313 spent 0.427 milliseconds in resume sending helper answer | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499000cd68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.939613; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | libevent_free: release ptr-libevent@0x7f49a0004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #298 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10643.950055; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | libevent_free: release ptr-libevent@0x7f4984012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #306 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10643.982479; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f4984012488 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #283 spent 0.26 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.133 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10643.991151; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | libevent_free: release ptr-libevent@0x7f49b8009dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #253 spent 0.298 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.162 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10643.998913; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f49b8009dc8 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | libevent_free: release ptr-libevent@0x7f4994004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #299 spent 0.399 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.003802; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006589 exceeds limit? YES "road-eastnet-nonat-62" #62: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-62" #62: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #314 at 0x55564d9da528 | State DB: adding IKEv2 state #314 in UNDEFINED | pstats #314 ikev2.ike started | Message ID: init #314: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #314: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #314; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-62" #314: initiating v2 parent SA to replace #62 | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 314 for state #314 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac1658 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f4994004e48 size 128 | #314 spent 0.266 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | RESET processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 314 for state #314 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #62 ikev2.ike failed too-many-retransmits | pstats #62 ikev2.ike deleted too-many-retransmits | #62 spent 7.54 milliseconds in total | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 314 | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-62" #62: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #62: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #62 "road-eastnet-nonat-62" #62: deleting IKE SA for connection 'road-eastnet-nonat-62' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-62' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-62 | State DB: deleting IKEv2 state #62 in PARENT_I1 | parent state #62: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #62 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 314 time elapsed 0.002734 seconds | libevent_free: release ptr-libevent@0x7f496c033518 | (#314) spent 2.7 milliseconds in crypto helper computing work-order 314: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | crypto helper 15 sending results from work-order 314 for state #314 to event queue | in statetime_stop() and could not find #62 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #314 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f4984012388 size 128 Initiating connection road-eastnet-nonat-62 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 15 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-62' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-62" | stop processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:349) | spent 0.198 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 314 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #314 | **emit ISAKMP Message: | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | ikev2 g^x 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | ikev2 g^x bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | ikev2 g^x 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | ikev2 g^x f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | ikev2 g^x 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | ikev2 g^x 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | ikev2 g^x b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | ikev2 g^x 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | ikev2 g^x 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | ikev2 g^x a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | ikev2 g^x 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | ikev2 g^x 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | ikev2 g^x 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | ikev2 g^x b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | ikev2 g^x 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 91 6f 49 44 90 4b 41 1e f4 07 67 9a ad 40 03 | IKEv2 nonce 05 bb f0 01 85 4c ff 93 59 07 13 ed b5 40 58 d8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 a0 9a 34 36 df 88 f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3e | natd_hash: port=500 | natd_hash: hash= df ad 8b d7 e3 32 44 66 e7 e9 00 e7 7f 0a a2 5e | natd_hash: hash= 78 64 73 a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df ad 8b d7 e3 32 44 66 e7 e9 00 e7 7f 0a a2 5e | Notify data 78 64 73 a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 a0 9a 34 36 df 88 f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | natd_hash: hash= 0b 70 d5 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | Notify data 0b 70 d5 47 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #314 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #314: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #314 to 4294967295 after switching state | Message ID: IKE #314 skipping update_recv as MD is fake | Message ID: sent #314 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.62:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | state #314 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac1658 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 | #314 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.008861 | resume sending helper answer for #314 suppresed complete_v2_state_transition() and stole MD | #314 spent 1.49 milliseconds in resume sending helper answer | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984012388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.011411; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f4984012388 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | libevent_free: release ptr-libevent@0x7f4988012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #307 spent 0.405 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.053203; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f4988012488 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #284 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.059484; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | libevent_free: release ptr-libevent@0x7f49a80125a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #300 spent 0.0859 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.067752; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49977 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f49a80125a8 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | libevent_free: release ptr-libevent@0x7f497c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #308 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.090073; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005051 exceeds limit? YES "road-eastnet-nonat-63" #63: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-63" #63: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #315 at 0x55564d9dbca8 | State DB: adding IKEv2 state #315 in UNDEFINED | pstats #315 ikev2.ike started | Message ID: init #315: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #315: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #315; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-63" #315: initiating v2 parent SA to replace #63 | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 315 for state #315 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f497c0123d8 size 128 | #315 spent 0.077 milliseconds in ikev2_parent_outI1() | RESET processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #63 ikev2.ike failed too-many-retransmits | pstats #63 ikev2.ike deleted too-many-retransmits | #63 spent 5.64 milliseconds in total | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-63" #63: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #63: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #63 "road-eastnet-nonat-63" #63: deleting IKE SA for connection 'road-eastnet-nonat-63' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-63' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 16 resuming | crypto helper 16 starting work-order 315 for state #315 | in connection_discard for connection road-eastnet-nonat-63 | State DB: deleting IKEv2 state #63 in PARENT_I1 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 315 | parent state #63: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 315 time elapsed 0.00053 seconds | (#315) spent 0.531 milliseconds in crypto helper computing work-order 315: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 315 for state #315 to event queue | scheduling resume sending helper answer for #315 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | crypto helper 16 waiting (nothing to do) | stop processing: state #63 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da26698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | in statetime_stop() and could not find #63 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-63 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-63' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-63" | stop processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:349) | spent 0.109 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 315 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #315 | **emit ISAKMP Message: | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | ikev2 g^x 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | ikev2 g^x 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | ikev2 g^x 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | ikev2 g^x 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | ikev2 g^x 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | ikev2 g^x 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | ikev2 g^x 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | ikev2 g^x 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | ikev2 g^x f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | ikev2 g^x 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | ikev2 g^x 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | ikev2 g^x 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | ikev2 g^x 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | ikev2 g^x 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | ikev2 g^x 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 e2 1a 42 88 | IKEv2 nonce cd dc b5 a4 d6 28 6e 07 2a ff 0e ff 64 74 2b 64 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 79 0f a8 3a b3 e8 ad 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3f | natd_hash: port=500 | natd_hash: hash= 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 c3 e2 69 28 | natd_hash: hash= f2 55 d5 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 c3 e2 69 28 | Notify data f2 55 d5 20 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 79 0f a8 3a b3 e8 ad 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | natd_hash: hash= a7 3b a8 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | Notify data a7 3b a8 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #315 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #315: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #315 to 4294967295 after switching state | Message ID: IKE #315 skipping update_recv as MD is fake | Message ID: sent #315 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.63:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | state #315 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c0123d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f49b8014f08 size 128 | #315 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.091269 | resume sending helper answer for #315 suppresed complete_v2_state_transition() and stole MD | #315 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498803e3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.111538; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001423 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #254 spent 0.099 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.118901; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #301 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.126261; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | libevent_free: release ptr-libevent@0x7f4980012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #309 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.129776; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f4980012488 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | libevent_free: release ptr-libevent@0x7f49bc00f898 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #285 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.156292; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006514 exceeds limit? YES "road-eastnet-nonat-64" #64: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-64" #64: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #316 at 0x55564d9dd3b8 | State DB: adding IKEv2 state #316 in UNDEFINED | pstats #316 ikev2.ike started | Message ID: init #316: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #316: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #316; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-64" #316: initiating v2 parent SA to replace #64 | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 316 for state #316 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da603a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f49bc00f898 size 128 | #316 spent 0.231 milliseconds in ikev2_parent_outI1() | RESET processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #64 ikev2.ike failed too-many-retransmits | crypto helper 1 resuming | pstats #64 ikev2.ike deleted too-many-retransmits | #64 spent 2.96 milliseconds in total | crypto helper 1 starting work-order 316 for state #316 | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 316 "road-eastnet-nonat-64" #64: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #64: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #64 "road-eastnet-nonat-64" #64: deleting IKE SA for connection 'road-eastnet-nonat-64' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-64' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-64 | State DB: deleting IKEv2 state #64 in PARENT_I1 | parent state #64: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 316 time elapsed 0.002598 seconds | stop processing: state #64 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da54b18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | (#316) spent 2.6 milliseconds in crypto helper computing work-order 316: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 316 for state #316 to event queue | scheduling resume sending helper answer for #316 | libevent_malloc: new ptr-libevent@0x7f497c0122d8 size 128 | crypto helper 1 waiting (nothing to do) | in statetime_stop() and could not find #64 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-64 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-64' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-64" | stop processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:349) | spent 0.167 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 316 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #316 | **emit ISAKMP Message: | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | ikev2 g^x 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | ikev2 g^x 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | ikev2 g^x c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | ikev2 g^x 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | ikev2 g^x a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | ikev2 g^x d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | ikev2 g^x 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | ikev2 g^x 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | ikev2 g^x c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | ikev2 g^x 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | ikev2 g^x a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | ikev2 g^x c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | ikev2 g^x d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | ikev2 g^x 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | ikev2 g^x 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 93 42 44 90 80 6b 35 c2 5e 00 aa 18 61 3c 94 | IKEv2 nonce 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 47 15 b8 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fd c3 31 0a 53 0f cf 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 40 | natd_hash: port=500 | natd_hash: hash= e1 af 50 0e 75 32 2c 30 6a 5d 77 15 e7 d4 97 27 | natd_hash: hash= 34 92 b0 ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 af 50 0e 75 32 2c 30 6a 5d 77 15 e7 d4 97 27 | Notify data 34 92 b0 ef | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fd c3 31 0a 53 0f cf 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | natd_hash: hash= b2 04 88 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | Notify data b2 04 88 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #316 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #316: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #316 to 4294967295 after switching state | Message ID: IKE #316 skipping update_recv as MD is fake | Message ID: sent #316 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.64:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | state #316 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc00f898 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da603a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f49ac017c48 size 128 | #316 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.161372 | resume sending helper answer for #316 suppresed complete_v2_state_transition() and stole MD | #316 spent 1.51 milliseconds in resume sending helper answer | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c0122d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.175927; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f497c0122d8 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #255 spent 0.396 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.181854; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | libevent_free: release ptr-libevent@0x7f499000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #302 spent 0.406 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.1987; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f499000c908 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | libevent_free: release ptr-libevent@0x7f49b400f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #286 spent 0.421 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.214563; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f49b400f798 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | libevent_free: release ptr-libevent@0x7f4974012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #310 spent 0.421 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.216412; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006313 exceeds limit? YES "road-eastnet-nonat-65" #65: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-65" #65: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #317 at 0x55564d9debc8 | State DB: adding IKEv2 state #317 in UNDEFINED | pstats #317 ikev2.ike started | Message ID: init #317: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #317: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #317; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-65" #317: initiating v2 parent SA to replace #65 | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 317 for state #317 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db088 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f4974012488 size 128 | #317 spent 0.269 milliseconds in ikev2_parent_outI1() | RESET processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | crypto helper 3 starting work-order 317 for state #317 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 317 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #65 ikev2.ike failed too-many-retransmits | pstats #65 ikev2.ike deleted too-many-retransmits | #65 spent 3.49 milliseconds in total | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-65" #65: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #65: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #65 "road-eastnet-nonat-65" #65: deleting IKE SA for connection 'road-eastnet-nonat-65' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-65' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-65 | State DB: deleting IKEv2 state #65 in PARENT_I1 | parent state #65: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #65 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 317 time elapsed 0.006388 seconds | libevent_free: release ptr-libevent@0x7f49b8014d08 | (#317) spent 3.04 milliseconds in crypto helper computing work-order 317: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 317 for state #317 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | in statetime_stop() and could not find #65 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #317 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f4980012588 size 128 Initiating connection road-eastnet-nonat-65 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 3 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-65' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-65" | stop processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:349) | spent 0.268 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 317 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #317 | **emit ISAKMP Message: | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | ikev2 g^x 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | ikev2 g^x 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | ikev2 g^x 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | ikev2 g^x 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | ikev2 g^x 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | ikev2 g^x 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | ikev2 g^x 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | ikev2 g^x 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | ikev2 g^x 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ikev2 g^x ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | ikev2 g^x 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | ikev2 g^x b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | ikev2 g^x 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | ikev2 g^x 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | ikev2 g^x 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 09 d7 4e e9 | IKEv2 nonce f0 0d f0 bf 92 16 0c e0 4d f2 69 35 45 b1 37 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 06 d9 4f c1 06 2c 9d b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 41 | natd_hash: port=500 | natd_hash: hash= 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 4e 44 78 06 | natd_hash: hash= 9c 9c ee 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 4e 44 78 06 | Notify data 9c 9c ee 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 06 d9 4f c1 06 2c 9d b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | natd_hash: hash= 94 3d ab 83 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | Notify data 94 3d ab 83 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #317 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #317: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #317 to 4294967295 after switching state | Message ID: IKE #317 skipping update_recv as MD is fake | Message ID: sent #317 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.65:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | state #317 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db088 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f49b0017cf8 size 128 | #317 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.225537 | resume sending helper answer for #317 suppresed complete_v2_state_transition() and stole MD | #317 spent 1.59 milliseconds in resume sending helper answer | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980012588 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.232 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.230139; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f4980012588 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | libevent_free: release ptr-libevent@0x7f49a4004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #256 spent 0.602 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.327 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.238367; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | libevent_free: release ptr-libevent@0x7f4994012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #303 spent 0.401 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.258233; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | libevent_free: release ptr-libevent@0x7f49b800f698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #287 spent 0.304 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.279832; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008217 exceeds limit? YES "road-eastnet-nonat-66" #66: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-66" #66: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #318 at 0x55564d9e0228 | State DB: adding IKEv2 state #318 in UNDEFINED | pstats #318 ikev2.ike started | Message ID: init #318: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #318: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #318; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-66" #318: initiating v2 parent SA to replace #66 | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 318 for state #318 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab16d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f49b800f698 size 128 | #318 spent 0.129 milliseconds in ikev2_parent_outI1() | RESET processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | crypto helper 17 starting work-order 318 for state #318 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #66 ikev2.ike failed too-many-retransmits | pstats #66 ikev2.ike deleted too-many-retransmits | #66 spent 2.96 milliseconds in total | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 318 | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-66" #66: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #66: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #66 "road-eastnet-nonat-66" #66: deleting IKE SA for connection 'road-eastnet-nonat-66' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-66' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-66 | State DB: deleting IKEv2 state #66 in PARENT_I1 | parent state #66: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #66 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 318 time elapsed 0.001869 seconds | libevent_free: release ptr-libevent@0x7f49a40492e8 | (#318) spent 1.88 milliseconds in crypto helper computing work-order 318: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | in statetime_stop() and could not find #66 | crypto helper 17 sending results from work-order 318 for state #318 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #318 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f4974012588 size 128 Initiating connection road-eastnet-nonat-66 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 17 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-66' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-66" | stop processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:349) | spent 0.0818 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 318 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #318 | **emit ISAKMP Message: | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | ikev2 g^x c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | ikev2 g^x 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | ikev2 g^x b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | ikev2 g^x d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | ikev2 g^x e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | ikev2 g^x 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | ikev2 g^x 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | ikev2 g^x 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | ikev2 g^x a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | ikev2 g^x 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | ikev2 g^x 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | ikev2 g^x 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | ikev2 g^x 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | ikev2 g^x be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | ikev2 g^x 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 b9 45 73 df d3 2e d0 66 22 4a ac 3f 0f b4 09 | IKEv2 nonce 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb 73 4f a6 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a d0 ca cd d3 5f 41 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 42 | natd_hash: port=500 | natd_hash: hash= 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 eb 5b 31 b0 | natd_hash: hash= c5 89 e5 ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 eb 5b 31 b0 | Notify data c5 89 e5 ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a d0 ca cd d3 5f 41 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | natd_hash: hash= 42 94 26 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | Notify data 42 94 26 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #318 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #318: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #318 to 4294967295 after switching state | Message ID: IKE #318 skipping update_recv as MD is fake | Message ID: sent #318 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.66:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | state #318 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b800f698 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab16d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f49a4017b98 size 128 | #318 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.2828 | resume sending helper answer for #318 suppresed complete_v2_state_transition() and stole MD | #318 spent 0.693 milliseconds in resume sending helper answer | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974012588 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.294021; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f4974012588 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | libevent_free: release ptr-libevent@0x7f49a8004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #257 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.300336; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #304 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0517 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.301617; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | libevent_free: release ptr-libevent@0x7f498c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #311 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.323844; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | libevent_free: release ptr-libevent@0x7f49ac0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #288 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.336152; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005 exceeds limit? YES "road-eastnet-nonat-67" #67: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-67" #67: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #319 at 0x55564d9e1938 | State DB: adding IKEv2 state #319 in UNDEFINED | pstats #319 ikev2.ike started | Message ID: init #319: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #319: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #319; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-67" #319: initiating v2 parent SA to replace #67 | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 319 for state #319 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f49ac0123d8 size 128 | #319 spent 0.0766 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | crypto helper 18 starting work-order 319 for state #319 | RESET processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 319 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #67 ikev2.ike failed too-many-retransmits | pstats #67 ikev2.ike deleted too-many-retransmits | #67 spent 2.53 milliseconds in total | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-67" #67: deleting state (STATE_PARENT_I1) aged 64.006s and NOT sending notification | parent state #67: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #67 "road-eastnet-nonat-67" #67: deleting IKE SA for connection 'road-eastnet-nonat-67' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-67' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-67 | State DB: deleting IKEv2 state #67 in PARENT_I1 | parent state #67: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #67 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 319 time elapsed 0.000576 seconds | libevent_free: release ptr-libevent@0x55564da165d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | (#319) spent 0.577 milliseconds in crypto helper computing work-order 319: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #67 | crypto helper 18 sending results from work-order 319 for state #319 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #319 | libevent_malloc: new ptr-libevent@0x7f4978012388 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-67 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-67' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-67" | stop processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:349) | spent 0.0649 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 319 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #319 | **emit ISAKMP Message: | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | ikev2 g^x 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | ikev2 g^x 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | ikev2 g^x 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | ikev2 g^x 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | ikev2 g^x bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | ikev2 g^x 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | ikev2 g^x 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | ikev2 g^x bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | ikev2 g^x 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | ikev2 g^x 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | ikev2 g^x 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | ikev2 g^x d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | ikev2 g^x 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ikev2 g^x ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | ikev2 g^x 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c 72 54 86 26 | IKEv2 nonce 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb 89 83 d8 d2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a 27 75 17 f4 c9 a9 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 43 | natd_hash: port=500 | natd_hash: hash= 0e 07 48 cb 29 10 06 76 d4 be 74 e9 7a 22 65 d8 | natd_hash: hash= bd 1e d3 ce | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 07 48 cb 29 10 06 76 d4 be 74 e9 7a 22 65 d8 | Notify data bd 1e d3 ce | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a 27 75 17 f4 c9 a9 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | natd_hash: hash= d4 35 5a 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | Notify data d4 35 5a 53 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #319 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #319: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #319 to 4294967295 after switching state | Message ID: IKE #319 skipping update_recv as MD is fake | Message ID: sent #319 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.67:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | state #319 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac0123d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f49a8017d18 size 128 | #319 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.33727 | resume sending helper answer for #319 suppresed complete_v2_state_transition() and stole MD | #319 spent 0.309 milliseconds in resume sending helper answer | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978012388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.355459; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f4978012388 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #258 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.357743; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | libevent_free: release ptr-libevent@0x7f496c012538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #312 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.360994; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f496c012538 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #305 spent 0.0835 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.384264; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | libevent_free: release ptr-libevent@0x7f49b0012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #289 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.401548; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009094 exceeds limit? YES "road-eastnet-nonat-68" #68: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-68" #68: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #320 at 0x55564d9e3048 | State DB: adding IKEv2 state #320 in UNDEFINED | pstats #320 ikev2.ike started | Message ID: init #320: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #320: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #320; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-68" #320: initiating v2 parent SA to replace #68 | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 320 for state #320 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f49b0012488 size 128 | #320 spent 0.117 milliseconds in ikev2_parent_outI1() | RESET processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #68 ikev2.ike failed too-many-retransmits | pstats #68 ikev2.ike deleted too-many-retransmits | #68 spent 2.83 milliseconds in total | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 19 resuming "road-eastnet-nonat-68" #68: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | crypto helper 19 starting work-order 320 for state #320 | parent state #68: PARENT_I1(half-open IKE SA) => delete | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 320 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #68 "road-eastnet-nonat-68" #68: deleting IKE SA for connection 'road-eastnet-nonat-68' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-68' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-68 | State DB: deleting IKEv2 state #68 in PARENT_I1 | parent state #68: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #68 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c0494b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | in statetime_stop() and could not find #68 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 320 time elapsed 0.000566 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#320) spent 0.584 milliseconds in crypto helper computing work-order 320: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 320 for state #320 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #320 Initiating connection road-eastnet-nonat-68 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f496c012438 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 19 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-68' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-68" | stop processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:349) | spent 0.0781 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 320 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #320 | **emit ISAKMP Message: | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | ikev2 g^x 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | ikev2 g^x 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | ikev2 g^x b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | ikev2 g^x db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | ikev2 g^x 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | ikev2 g^x 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | ikev2 g^x dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | ikev2 g^x bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | ikev2 g^x 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | ikev2 g^x f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | ikev2 g^x 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | ikev2 g^x 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | ikev2 g^x 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | ikev2 g^x 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | ikev2 g^x f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 62 34 37 cb | IKEv2 nonce 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 64 0c a4 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 20 cf 3a fc 3d 3e 91 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 44 | natd_hash: port=500 | natd_hash: hash= 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 5b 05 7f 11 | natd_hash: hash= 4b 2f 85 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 5b 05 7f 11 | Notify data 4b 2f 85 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 20 cf 3a fc 3d 3e 91 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | natd_hash: hash= cc 55 b0 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | Notify data cc 55 b0 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #320 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #320: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #320 to 4294967295 after switching state | Message ID: IKE #320 skipping update_recv as MD is fake | Message ID: sent #320 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.68:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | state #320 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f499c017b98 size 128 | #320 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.403029 | resume sending helper answer for #320 suppresed complete_v2_state_transition() and stole MD | #320 spent 0.566 milliseconds in resume sending helper answer | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c012438 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.41439; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002698 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f496c012438 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #259 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.415769; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #313 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.442154; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #290 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.451441; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | libevent_free: release ptr-libevent@0x7f49a0004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #306 spent 0.351 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.45694; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004885 exceeds limit? YES "road-eastnet-nonat-69" #69: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-69" #69: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #321 at 0x55564d9e4758 | State DB: adding IKEv2 state #321 in UNDEFINED | pstats #321 ikev2.ike started | Message ID: init #321: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #321: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #321; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-69" #321: initiating v2 parent SA to replace #69 | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 321 for state #321 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f49a0004e48 size 128 | #321 spent 0.0846 milliseconds in ikev2_parent_outI1() | RESET processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #69 ikev2.ike failed too-many-retransmits | pstats #69 ikev2.ike deleted too-many-retransmits | #69 spent 2.57 milliseconds in total | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-69" #69: deleting state (STATE_PARENT_I1) aged 64.006s and NOT sending notification | parent state #69: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #69 "road-eastnet-nonat-69" #69: deleting IKE SA for connection 'road-eastnet-nonat-69' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-69' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-69 | State DB: deleting IKEv2 state #69 in PARENT_I1 | parent state #69: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 resuming | crypto helper 0 starting work-order 321 for state #321 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 321 | stop processing: state #69 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497802db68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | in statetime_stop() and could not find #69 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-69 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-69' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-69" | stop processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:349) | spent 0.0608 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 321 time elapsed 0.000563 seconds | (#321) spent 0.567 milliseconds in crypto helper computing work-order 321: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 321 for state #321 to event queue | scheduling resume sending helper answer for #321 | libevent_malloc: new ptr-libevent@0x7f49bc014e58 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 321 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #321 | **emit ISAKMP Message: | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | ikev2 g^x d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | ikev2 g^x 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | ikev2 g^x 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | ikev2 g^x 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | ikev2 g^x 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | ikev2 g^x 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ikev2 g^x ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | ikev2 g^x 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | ikev2 g^x 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | ikev2 g^x 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | ikev2 g^x 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | ikev2 g^x 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | ikev2 g^x f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | ikev2 g^x a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ikev2 g^x ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c b9 10 80 98 | IKEv2 nonce a3 5b 3e d4 f2 78 22 34 c7 00 5a ef aa c3 63 76 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fa 1e 45 d0 d6 bc c6 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 45 | natd_hash: port=500 | natd_hash: hash= b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 20 ce 13 c7 | natd_hash: hash= 6e ea bf 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 20 ce 13 c7 | Notify data 6e ea bf 24 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fa 1e 45 d0 d6 bc c6 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | natd_hash: hash= a8 3f 28 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | Notify data a8 3f 28 28 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #321 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #321: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #321 to 4294967295 after switching state | Message ID: IKE #321 skipping update_recv as MD is fake | Message ID: sent #321 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.69:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | state #321 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a0004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f49a0017b98 size 128 | #321 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.458066 | resume sending helper answer for #321 suppresed complete_v2_state_transition() and stole MD | #321 spent 0.339 milliseconds in resume sending helper answer | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc014e58 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.482253; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f49bc014e58 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | libevent_free: release ptr-libevent@0x7f499800cbe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #260 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.506534; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #291 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.508833; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #314 spent 0.0891 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.512078; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | libevent_free: release ptr-libevent@0x7f4984012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #307 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.521318; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010448 exceeds limit? YES "road-eastnet-nonat-70" #70: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-70" #70: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #322 at 0x55564d9e5e68 | State DB: adding IKEv2 state #322 in UNDEFINED | pstats #322 ikev2.ike started | Message ID: init #322: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #322: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #322; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-70" #322: initiating v2 parent SA to replace #70 | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 322 for state #322 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da2da88 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f4984012388 size 128 | #322 spent 0.0784 milliseconds in ikev2_parent_outI1() | RESET processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #70 ikev2.ike failed too-many-retransmits | pstats #70 ikev2.ike deleted too-many-retransmits | #70 spent 2.87 milliseconds in total | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-70" #70: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #70: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #70 "road-eastnet-nonat-70" #70: deleting IKE SA for connection 'road-eastnet-nonat-70' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-70' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-70 | State DB: deleting IKEv2 state #70 in PARENT_I1 | parent state #70: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 resuming | crypto helper 2 starting work-order 322 for state #322 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 322 | stop processing: state #70 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49bc040dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | in statetime_stop() and could not find #70 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-70 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-70' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-70" | stop processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:349) | spent 0.0598 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 322 time elapsed 0.00054 seconds | (#322) spent 0.543 milliseconds in crypto helper computing work-order 322: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 322 for state #322 to event queue | scheduling resume sending helper answer for #322 | libevent_malloc: new ptr-libevent@0x7f49b4014f58 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 322 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #322 | **emit ISAKMP Message: | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | ikev2 g^x 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | ikev2 g^x 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ikev2 g^x ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | ikev2 g^x 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ikev2 g^x ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | ikev2 g^x 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | ikev2 g^x 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | ikev2 g^x 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | ikev2 g^x 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | ikev2 g^x a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | ikev2 g^x 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | ikev2 g^x 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | ikev2 g^x 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | ikev2 g^x 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | ikev2 g^x 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ea 82 62 53 46 1f 85 0f 71 b9 78 41 e8 77 9f 5a | IKEv2 nonce ff aa 43 11 58 d2 95 af b4 93 dc 8d bc 49 aa 0d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b8 21 4c 9e b6 27 92 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 46 | natd_hash: port=500 | natd_hash: hash= 94 79 0a dd 3a 44 7c f2 60 47 19 e5 57 c3 c4 fb | natd_hash: hash= 7e 64 73 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 79 0a dd 3a 44 7c f2 60 47 19 e5 57 c3 c4 fb | Notify data 7e 64 73 39 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b8 21 4c 9e b6 27 92 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | natd_hash: hash= 1b e6 b4 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | Notify data 1b e6 b4 de | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #322 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #322: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #322 to 4294967295 after switching state | Message ID: IKE #322 skipping update_recv as MD is fake | Message ID: sent #322 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.70:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | state #322 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984012388 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da2da88 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 | #322 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.52239 | resume sending helper answer for #322 suppresed complete_v2_state_transition() and stole MD | #322 spent 0.333 milliseconds in resume sending helper answer | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4014f58 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0528 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.544602; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f49b4014f58 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #261 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.567908; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #292 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.568049; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | libevent_free: release ptr-libevent@0x7f49a80125a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #308 spent 0.0681 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.578334; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007952 exceeds limit? YES "road-eastnet-nonat-71" #71: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-71" #71: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #323 at 0x55564d9e7678 | State DB: adding IKEv2 state #323 in UNDEFINED | pstats #323 ikev2.ike started | Message ID: init #323: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #323: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #323; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-71" #323: initiating v2 parent SA to replace #71 | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 323 for state #323 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa16f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f49a80125a8 size 128 | #323 spent 0.0839 milliseconds in ikev2_parent_outI1() | RESET processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #71 ikev2.ike failed too-many-retransmits | pstats #71 ikev2.ike deleted too-many-retransmits | #71 spent 2.58 milliseconds in total | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-71" #71: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #71: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #71 "road-eastnet-nonat-71" #71: deleting IKE SA for connection 'road-eastnet-nonat-71' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-71' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-71 | State DB: deleting IKEv2 state #71 in PARENT_I1 | parent state #71: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 resuming | crypto helper 4 starting work-order 323 for state #323 | stop processing: state #71 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 323 | libevent_free: release ptr-libevent@0x55564d9f0cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | in statetime_stop() and could not find #71 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-71 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-71' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-71" | stop processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 323 time elapsed 0.000546 seconds | (#323) spent 0.549 milliseconds in crypto helper computing work-order 323: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 323 for state #323 to event queue | scheduling resume sending helper answer for #323 | libevent_malloc: new ptr-libevent@0x7f49b8014e08 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 323 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #323 | **emit ISAKMP Message: | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | ikev2 g^x a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | ikev2 g^x 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | ikev2 g^x 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | ikev2 g^x 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | ikev2 g^x 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | ikev2 g^x a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | ikev2 g^x 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | ikev2 g^x c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | ikev2 g^x bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | ikev2 g^x 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | ikev2 g^x 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | ikev2 g^x d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | ikev2 g^x 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | ikev2 g^x a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | ikev2 g^x 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce da df 6e 25 e5 71 cd 0d ad 5c ed 43 2a ee 25 13 | IKEv2 nonce 78 f2 69 6a a0 1c d6 00 52 c9 6e ec 32 51 c7 d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dd e3 f5 81 b7 50 be 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 47 | natd_hash: port=500 | natd_hash: hash= 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 be 21 f5 30 | natd_hash: hash= 04 18 c4 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 be 21 f5 30 | Notify data 04 18 c4 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dd e3 f5 81 b7 50 be 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | natd_hash: hash= ee 9d 46 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | Notify data ee 9d 46 b1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #323 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #323: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #323 to 4294967295 after switching state | Message ID: IKE #323 skipping update_recv as MD is fake | Message ID: sent #323 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.71:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | state #323 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a80125a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa16f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f4998017d78 size 128 | #323 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.57944 | resume sending helper answer for #323 suppresed complete_v2_state_transition() and stole MD | #323 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8014e08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.59263; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f49b8014e08 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | libevent_free: release ptr-libevent@0x7f49b8014f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #315 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.60593; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f49b8014f08 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #262 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.62724; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #309 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.631525; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003363 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | libevent_free: release ptr-libevent@0x7f49a00124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #293 spent 0.0877 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.635795; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006906 exceeds limit? YES "road-eastnet-nonat-72" #72: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-72" #72: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #324 at 0x55564d9e8cd8 | State DB: adding IKEv2 state #324 in UNDEFINED | pstats #324 ikev2.ike started | Message ID: init #324: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #324: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #324; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-72" #324: initiating v2 parent SA to replace #72 | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 324 for state #324 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f49a00124d8 size 128 | #324 spent 0.0911 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 324 for state #324 | RESET processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 324 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #72 ikev2.ike failed too-many-retransmits | pstats #72 ikev2.ike deleted too-many-retransmits | #72 spent 1.97 milliseconds in total | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-72" #72: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #72: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #72 "road-eastnet-nonat-72" #72: deleting IKE SA for connection 'road-eastnet-nonat-72' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-72' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-72 | State DB: deleting IKEv2 state #72 in PARENT_I1 | parent state #72: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #72 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 324 time elapsed 0.000546 seconds | libevent_free: release ptr-libevent@0x7f498c022ac8 | (#324) spent 0.551 milliseconds in crypto helper computing work-order 324: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | crypto helper 5 sending results from work-order 324 for state #324 to event queue | scheduling resume sending helper answer for #324 | in statetime_stop() and could not find #72 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-72 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-72' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-72" | stop processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:349) | spent 0.06 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 324 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #324 | **emit ISAKMP Message: | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | ikev2 g^x 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | ikev2 g^x 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | ikev2 g^x 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | ikev2 g^x 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | ikev2 g^x 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | ikev2 g^x 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | ikev2 g^x 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | ikev2 g^x 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | ikev2 g^x a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | ikev2 g^x b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | ikev2 g^x 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | ikev2 g^x 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | ikev2 g^x 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | ikev2 g^x c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | ikev2 g^x 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 26 f7 9a 01 | IKEv2 nonce 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 2e e3 3b db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b1 96 ef 40 1f a0 93 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 48 | natd_hash: port=500 | natd_hash: hash= d9 31 fc 40 6d b9 dc bb cd 0d e4 34 ae 2f a1 7a | natd_hash: hash= 55 96 7a 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 31 fc 40 6d b9 dc bb cd 0d e4 34 ae 2f a1 7a | Notify data 55 96 7a 62 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b1 96 ef 40 1f a0 93 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | natd_hash: hash= 46 af d1 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | Notify data 46 af d1 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #324 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #324: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #324 to 4294967295 after switching state | Message ID: IKE #324 skipping update_recv as MD is fake | Message ID: sent #324 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.72:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | state #324 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00124d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f498c017c48 size 128 | #324 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.636968 | resume sending helper answer for #324 suppresed complete_v2_state_transition() and stole MD | #324 spent 0.391 milliseconds in resume sending helper answer | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac017b48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.660135; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498763 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | libevent_free: release ptr-libevent@0x7f49ac017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #316 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.665462; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f49ac017c48 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | libevent_free: release ptr-libevent@0x7f49b00066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #263 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.696802; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008622 exceeds limit? YES "road-eastnet-nonat-73" #73: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-73" #73: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #325 at 0x55564d9ea3e8 | State DB: adding IKEv2 state #325 in UNDEFINED | pstats #325 ikev2.ike started | Message ID: init #325: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #325: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #325; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-73" #325: initiating v2 parent SA to replace #73 | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 325 for state #325 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8a488 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f49b00066b8 size 128 | #325 spent 0.0779 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 325 for state #325 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 325 | pstats #73 ikev2.ike failed too-many-retransmits | pstats #73 ikev2.ike deleted too-many-retransmits | #73 spent 2.31 milliseconds in total | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-73" #73: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #73: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #73 "road-eastnet-nonat-73" #73: deleting IKE SA for connection 'road-eastnet-nonat-73' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-73' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-73 | State DB: deleting IKEv2 state #73 in PARENT_I1 | parent state #73: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 325 time elapsed 0.000783 seconds | (#325) spent 0.79 milliseconds in crypto helper computing work-order 325: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 325 for state #325 to event queue | scheduling resume sending helper answer for #325 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 | crypto helper 6 waiting (nothing to do) | stop processing: state #73 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498c038ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | in statetime_stop() and could not find #73 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-73 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-73' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-73" | stop processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:349) | spent 0.081 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 325 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #325 | **emit ISAKMP Message: | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | ikev2 g^x c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | ikev2 g^x 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | ikev2 g^x 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | ikev2 g^x 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | ikev2 g^x 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | ikev2 g^x be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | ikev2 g^x 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | ikev2 g^x 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | ikev2 g^x b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | ikev2 g^x d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | ikev2 g^x f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | ikev2 g^x d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | ikev2 g^x 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | ikev2 g^x 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | ikev2 g^x d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 5f 40 f8 60 | IKEv2 nonce cf 7b b2 30 d7 99 37 db 5f 4f 58 34 7b dc 83 fa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 25 7e 33 f2 ba e9 f4 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 49 | natd_hash: port=500 | natd_hash: hash= 18 37 3d 75 93 36 42 9f 33 4c 13 4d 0a d0 ba c7 | natd_hash: hash= 78 a4 2a 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 37 3d 75 93 36 42 9f 33 4c 13 4d 0a d0 ba c7 | Notify data 78 a4 2a 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 25 7e 33 f2 ba e9 f4 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | natd_hash: hash= bb 13 9d 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | Notify data bb 13 9d 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #325 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #325: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #325 to 4294967295 after switching state | Message ID: IKE #325 skipping update_recv as MD is fake | Message ID: sent #325 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.73:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | state #325 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b00066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8a488 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f4990017cf8 size 128 | #325 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.698201 | resume sending helper answer for #325 suppresed complete_v2_state_transition() and stole MD | #325 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0017df8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.703374; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | libevent_free: release ptr-libevent@0x7f49b400f698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #294 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.715666; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f49b400f698 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | libevent_free: release ptr-libevent@0x7f49b400f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #310 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.722061; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f49b400f798 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #264 spent 0.093 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.725311; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | libevent_free: release ptr-libevent@0x7f49b0017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #317 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.755611; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f49b0017cf8 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | libevent_free: release ptr-libevent@0x7f49980125b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #295 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.772899; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010965 exceeds limit? YES "road-eastnet-nonat-74" #74: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-74" #74: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #326 at 0x55564d9ebb68 | State DB: adding IKEv2 state #326 in UNDEFINED | pstats #326 ikev2.ike started | Message ID: init #326: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #326: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #326; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-74" #326: initiating v2 parent SA to replace #74 | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 326 for state #326 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f49980125b8 size 128 | #326 spent 0.0795 milliseconds in ikev2_parent_outI1() | RESET processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #74 ikev2.ike failed too-many-retransmits | pstats #74 ikev2.ike deleted too-many-retransmits | #74 spent 3.13 milliseconds in total | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-74" #74: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #74: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #74 "road-eastnet-nonat-74" #74: deleting IKE SA for connection 'road-eastnet-nonat-74' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-74' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-74 | State DB: deleting IKEv2 state #74 in PARENT_I1 | parent state #74: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 resuming | crypto helper 7 starting work-order 326 for state #326 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 326 | stop processing: state #74 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dae89b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | in statetime_stop() and could not find #74 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-74 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-74' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-74" | stop processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:349) | spent 0.0604 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 326 time elapsed 0.001184 seconds | (#326) spent 1.19 milliseconds in crypto helper computing work-order 326: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 326 for state #326 to event queue | scheduling resume sending helper answer for #326 | libevent_malloc: new ptr-libevent@0x7f49a4017a98 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 326 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #326 | **emit ISAKMP Message: | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | ikev2 g^x c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ikev2 g^x ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | ikev2 g^x 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | ikev2 g^x a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | ikev2 g^x a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | ikev2 g^x f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | ikev2 g^x 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | ikev2 g^x f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ikev2 g^x ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | ikev2 g^x d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | ikev2 g^x 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | ikev2 g^x 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | ikev2 g^x 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | ikev2 g^x fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | ikev2 g^x a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 e9 1b 66 8f | IKEv2 nonce c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 83 dc 9d a5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 4f 20 65 14 f7 75 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4a | natd_hash: port=500 | natd_hash: hash= f1 18 2e 60 04 47 a0 57 5b 6e 63 88 25 eb bf a4 | natd_hash: hash= 03 b4 6d b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 18 2e 60 04 47 a0 57 5b 6e 63 88 25 eb bf a4 | Notify data 03 b4 6d b7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 4f 20 65 14 f7 75 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | natd_hash: hash= df a4 4e 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | Notify data df a4 4e 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #326 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #326: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #326 to 4294967295 after switching state | Message ID: IKE #326 skipping update_recv as MD is fake | Message ID: sent #326 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.74:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | state #326 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49980125b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f4984017c48 size 128 | #326 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.774754 | resume sending helper answer for #326 suppresed complete_v2_state_transition() and stole MD | #326 spent 0.483 milliseconds in resume sending helper answer | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4017a98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.782955; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f49a4017a98 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | libevent_free: release ptr-libevent@0x7f49a4017b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #318 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.783088; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003287 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f49a4017b98 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #265 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.802344; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #311 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.818679; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | libevent_free: release ptr-libevent@0x7f499803e2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #296 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.82799; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007372 exceeds limit? YES "road-eastnet-nonat-75" #75: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-75" #75: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #327 at 0x55564d9ed2e8 | State DB: adding IKEv2 state #327 in UNDEFINED | pstats #327 ikev2.ike started | Message ID: init #327: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #327: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #327; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-75" #327: initiating v2 parent SA to replace #75 | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 327 for state #327 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f499803e2b8 size 128 | #327 spent 0.121 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | RESET processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 327 for state #327 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #75 ikev2.ike failed too-many-retransmits | pstats #75 ikev2.ike deleted too-many-retransmits | #75 spent 2.4 milliseconds in total | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 327 | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-75" #75: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #75: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #75 "road-eastnet-nonat-75" #75: deleting IKE SA for connection 'road-eastnet-nonat-75' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-75' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-75 | State DB: deleting IKEv2 state #75 in PARENT_I1 | parent state #75: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 327 time elapsed 0.00063 seconds | stop processing: state #75 from 192.1.2.23 (in delete_state() at state.c:1143) | (#327) spent 0.614 milliseconds in crypto helper computing work-order 327: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 327 for state #327 to event queue | libevent_free: release ptr-libevent@0x55564daea0c8 | scheduling resume sending helper answer for #327 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | in statetime_stop() and could not find #75 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 8 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-75 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-75' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-75" | stop processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:349) | spent 0.0819 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 327 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #327 | **emit ISAKMP Message: | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | ikev2 g^x e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | ikev2 g^x 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | ikev2 g^x 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | ikev2 g^x 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | ikev2 g^x 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | ikev2 g^x 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | ikev2 g^x 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | ikev2 g^x af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | ikev2 g^x 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | ikev2 g^x e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | ikev2 g^x 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | ikev2 g^x 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | ikev2 g^x cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | ikev2 g^x 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | ikev2 g^x 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a f2 27 34 b8 | IKEv2 nonce 1d c6 ee 3b f3 62 43 91 91 f2 42 4d 05 4f b2 21 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 95 fe 82 f2 7b 90 d3 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4b | natd_hash: port=500 | natd_hash: hash= d5 59 36 81 c0 06 e7 b1 82 f1 fc fb b1 0e 20 a2 | natd_hash: hash= 19 35 44 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 59 36 81 c0 06 e7 b1 82 f1 fc fb b1 0e 20 a2 | Notify data 19 35 44 9e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 95 fe 82 f2 7b 90 d3 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | natd_hash: hash= 57 26 54 f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | Notify data 57 26 54 f1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #327 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #327: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #327 to 4294967295 after switching state | Message ID: IKE #327 skipping update_recv as MD is fake | Message ID: sent #327 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.75:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | state #327 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499803e2b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f4988017c48 size 128 | #327 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.829409 | resume sending helper answer for #327 suppresed complete_v2_state_transition() and stole MD | #327 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8017c18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.838591; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501321 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | libevent_free: release ptr-libevent@0x7f49a8017d18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #319 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.842954; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f49a8017d18 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #266 spent 0.0959 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.858333; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #312 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.879623; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | libevent_free: release ptr-libevent@0x7f4990012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #297 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.901993; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f4990012488 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #267 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.90328; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | libevent_free: release ptr-libevent@0x7f499c017b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #320 spent 0.0858 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.911524; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006185 exceeds limit? YES "road-eastnet-nonat-76" #76: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-76" #76: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #328 at 0x55564d9eea68 | State DB: adding IKEv2 state #328 in UNDEFINED | pstats #328 ikev2.ike started | Message ID: init #328: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #328: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #328; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-76" #328: initiating v2 parent SA to replace #76 | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 328 for state #328 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f499c017b98 size 128 | #328 spent 0.0782 milliseconds in ikev2_parent_outI1() | RESET processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #76 ikev2.ike failed too-many-retransmits | pstats #76 ikev2.ike deleted too-many-retransmits | #76 spent 6.56 milliseconds in total | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-76" #76: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #76: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #76 "road-eastnet-nonat-76" #76: deleting IKE SA for connection 'road-eastnet-nonat-76' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-76' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-76 | State DB: deleting IKEv2 state #76 in PARENT_I1 | parent state #76: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 resuming | crypto helper 9 starting work-order 328 for state #328 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 328 | stop processing: state #76 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f496c043d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | in statetime_stop() and could not find #76 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-76 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-76' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-76" | stop processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:349) | spent 0.0615 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 328 time elapsed 0.000554 seconds | (#328) spent 0.557 milliseconds in crypto helper computing work-order 328: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 328 for state #328 to event queue | scheduling resume sending helper answer for #328 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 328 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #328 | **emit ISAKMP Message: | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | ikev2 g^x 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | ikev2 g^x a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | ikev2 g^x 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | ikev2 g^x 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | ikev2 g^x 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | ikev2 g^x 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | ikev2 g^x 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | ikev2 g^x c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | ikev2 g^x 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | ikev2 g^x fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | ikev2 g^x 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | ikev2 g^x 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | ikev2 g^x da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | ikev2 g^x 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | ikev2 g^x 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b6 98 22 88 58 98 e1 0f 5f 9a a5 17 44 8b 1c c7 | IKEv2 nonce 79 5e a5 70 90 7f cc 87 df 3a 70 f1 d5 bb 7c ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= eb 74 a9 f7 4c 68 88 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4c | natd_hash: port=500 | natd_hash: hash= 1c 25 98 0f fb 01 b9 01 a1 60 05 72 08 8d 42 90 | natd_hash: hash= fb 70 4f 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 25 98 0f fb 01 b9 01 a1 60 05 72 08 8d 42 90 | Notify data fb 70 4f 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= eb 74 a9 f7 4c 68 88 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | natd_hash: hash= ea a0 15 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | Notify data ea a0 15 3e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #328 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #328: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #328 to 4294967295 after switching state | Message ID: IKE #328 skipping update_recv as MD is fake | Message ID: sent #328 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.76:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | state #328 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c017b98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 | #328 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.91258 | resume sending helper answer for #328 suppresed complete_v2_state_transition() and stole MD | #328 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c017a98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10644.916737; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #313 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.940057; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #298 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10644.958419; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | libevent_free: release ptr-libevent@0x7f49a0017b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #321 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10644.963706; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f49a0017b98 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | libevent_free: release ptr-libevent@0x7f497400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #268 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10644.973158; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008702 exceeds limit? YES "road-eastnet-nonat-77" #77: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-77" #77: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #329 at 0x55564d9f0178 | State DB: adding IKEv2 state #329 in UNDEFINED | pstats #329 ikev2.ike started | Message ID: init #329: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #329: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #329; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-77" #329: initiating v2 parent SA to replace #77 | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 329 for state #329 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f497400ca08 size 128 | #329 spent 0.124 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 329 for state #329 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 329 | RESET processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #77 ikev2.ike failed too-many-retransmits | pstats #77 ikev2.ike deleted too-many-retransmits | #77 spent 2.97 milliseconds in total | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-77" #77: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #77: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #77 "road-eastnet-nonat-77" #77: deleting IKE SA for connection 'road-eastnet-nonat-77' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-77' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-77 | State DB: deleting IKEv2 state #77 in PARENT_I1 | parent state #77: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #77 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 329 time elapsed 0.001018 seconds | libevent_free: release ptr-libevent@0x55564da8a4f8 | (#329) spent 1.02 milliseconds in crypto helper computing work-order 329: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 329 for state #329 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | in statetime_stop() and could not find #77 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #329 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 Initiating connection road-eastnet-nonat-77 which received a Delete/Notify but must remain up per local policy | crypto helper 10 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-77' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-77" | stop processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:349) | spent 0.108 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 329 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #329 | **emit ISAKMP Message: | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | ikev2 g^x 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | ikev2 g^x 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | ikev2 g^x 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | ikev2 g^x fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | ikev2 g^x c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | ikev2 g^x c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | ikev2 g^x a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | ikev2 g^x 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | ikev2 g^x e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | ikev2 g^x c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | ikev2 g^x 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | ikev2 g^x 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | ikev2 g^x 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | ikev2 g^x 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | ikev2 g^x 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 a0 9c eb 00 11 4e 73 d3 94 18 14 0e 02 be ad | IKEv2 nonce 8a af 21 29 ef a2 53 ad 2f cd 82 9e e3 6d 59 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7f a8 92 b3 85 8f 06 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4d | natd_hash: port=500 | natd_hash: hash= 61 5b c2 f8 9d fd ba ee ef 3d 90 3c 66 21 39 2a | natd_hash: hash= 31 cb b0 ca | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 5b c2 f8 9d fd ba ee ef 3d 90 3c 66 21 39 2a | Notify data 31 cb b0 ca | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7f a8 92 b3 85 8f 06 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | natd_hash: hash= 9a ea 24 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | Notify data 9a ea 24 98 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #329 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #329: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #329 to 4294967295 after switching state | Message ID: IKE #329 skipping update_recv as MD is fake | Message ID: sent #329 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.77:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | state #329 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497400ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 | #329 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10644.975086 | resume sending helper answer for #329 suppresed complete_v2_state_transition() and stole MD | #329 spent 0.525 milliseconds in resume sending helper answer | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0022a08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10644.999414; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | libevent_free: release ptr-libevent@0x7f49b8009dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #299 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.010667; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f49b8009dc8 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #314 spent 0.0951 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.022941; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #322 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.030193; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | libevent_free: release ptr-libevent@0x7f497800cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #269 spent 0.0934 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.032426; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006927 exceeds limit? YES "road-eastnet-nonat-78" #78: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-78" #78: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #330 at 0x55564d9f1988 | State DB: adding IKEv2 state #330 in UNDEFINED | pstats #330 ikev2.ike started | Message ID: init #330: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #330: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #330; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-78" #330: initiating v2 parent SA to replace #78 | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 330 for state #330 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f497800cab8 size 128 | #330 spent 0.0887 milliseconds in ikev2_parent_outI1() | RESET processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #78 ikev2.ike failed too-many-retransmits | pstats #78 ikev2.ike deleted too-many-retransmits | #78 spent 3.22 milliseconds in total | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-78" #78: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #78: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #78 "road-eastnet-nonat-78" #78: deleting IKE SA for connection 'road-eastnet-nonat-78' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-78' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-78 | crypto helper 11 resuming | crypto helper 11 starting work-order 330 for state #330 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 330 | State DB: deleting IKEv2 state #78 in PARENT_I1 | parent state #78: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 330 time elapsed 0.000683 seconds | (#330) spent 0.689 milliseconds in crypto helper computing work-order 330: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 330 for state #330 to event queue | scheduling resume sending helper answer for #330 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 | crypto helper 11 waiting (nothing to do) | stop processing: state #78 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da8bc08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | in statetime_stop() and could not find #78 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-78 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-78' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-78" | stop processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:349) | spent 0.0641 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 330 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #330 | **emit ISAKMP Message: | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | ikev2 g^x cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | ikev2 g^x 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | ikev2 g^x a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | ikev2 g^x 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | ikev2 g^x 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | ikev2 g^x e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | ikev2 g^x a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | ikev2 g^x 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | ikev2 g^x 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | ikev2 g^x 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | ikev2 g^x a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | ikev2 g^x 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | ikev2 g^x 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | ikev2 g^x a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | ikev2 g^x 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b 0f f6 35 6a | IKEv2 nonce e7 a7 83 98 25 3e 1f db ad 79 47 5b e1 06 d1 df | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 01 34 68 3c 51 f3 a1 2e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4e | natd_hash: port=500 | natd_hash: hash= 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb df f2 c0 17 | natd_hash: hash= 64 a5 a0 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb df f2 c0 17 | Notify data 64 a5 a0 c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 01 34 68 3c 51 f3 a1 2e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | natd_hash: hash= dc 09 83 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | Notify data dc 09 83 63 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #330 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #330: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #330 to 4294967295 after switching state | Message ID: IKE #330 skipping update_recv as MD is fake | Message ID: sent #330 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.78:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | state #330 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497800cab8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f4974017cf8 size 128 | #330 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.033753 | resume sending helper answer for #330 suppresed complete_v2_state_transition() and stole MD | #330 spent 0.366 milliseconds in resume sending helper answer | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994017df8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.059942; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #300 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0486 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.080255; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | libevent_free: release ptr-libevent@0x7f4998017d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #323 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0497 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.092577; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008832 exceeds limit? YES "road-eastnet-nonat-79" #79: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-79" #79: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #331 at 0x55564d9f2fe8 | State DB: adding IKEv2 state #331 in UNDEFINED | pstats #331 ikev2.ike started | Message ID: init #331: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #331: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #331; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-79" #331: initiating v2 parent SA to replace #79 | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 331 for state #331 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa16f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f4998017d78 size 128 | #331 spent 0.141 milliseconds in ikev2_parent_outI1() | RESET processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #79 ikev2.ike failed too-many-retransmits | pstats #79 ikev2.ike deleted too-many-retransmits | #79 spent 2.2 milliseconds in total | crypto helper 12 resuming | crypto helper 12 starting work-order 331 for state #331 | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 331 "road-eastnet-nonat-79" #79: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #79: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #79 "road-eastnet-nonat-79" #79: deleting IKE SA for connection 'road-eastnet-nonat-79' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-79' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-79 | State DB: deleting IKEv2 state #79 in PARENT_I1 | parent state #79: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 331 time elapsed 0.000687 seconds | stop processing: state #79 from 192.1.2.23 (in delete_state() at state.c:1143) | (#331) spent 0.694 milliseconds in crypto helper computing work-order 331: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7f497400cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | crypto helper 12 sending results from work-order 331 for state #331 to event queue | scheduling resume sending helper answer for #331 | in statetime_stop() and could not find #79 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f4998017c78 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-79 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-79' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-79" | stop processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:349) | spent 0.0881 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.093661; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f4978018128 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | libevent_free: release ptr-libevent@0x7f49b8014e08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #315 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 331 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #331 | **emit ISAKMP Message: | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | ikev2 g^x b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | ikev2 g^x 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | ikev2 g^x fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | ikev2 g^x cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | ikev2 g^x fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | ikev2 g^x 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | ikev2 g^x f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | ikev2 g^x 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | ikev2 g^x 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | ikev2 g^x fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | ikev2 g^x c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | ikev2 g^x c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | ikev2 g^x 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | ikev2 g^x 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | ikev2 g^x 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 76 75 df b5 79 59 65 63 28 fd 6f f7 33 b2 80 | IKEv2 nonce 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 6c 88 6c e9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 30 eb 38 c0 4c 62 f2 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4f | natd_hash: port=500 | natd_hash: hash= 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 d6 d4 c9 c6 | natd_hash: hash= 48 a7 59 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 d6 d4 c9 c6 | Notify data 48 a7 59 8e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 30 eb 38 c0 4c 62 f2 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | natd_hash: hash= f2 b9 12 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | Notify data f2 b9 12 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #331 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #331: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #331 to 4294967295 after switching state | Message ID: IKE #331 skipping update_recv as MD is fake | Message ID: sent #331 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.79:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | state #331 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998017d78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa16f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f49b8014e08 size 128 | #331 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.094309 | resume sending helper answer for #331 suppresed complete_v2_state_transition() and stole MD | #331 spent 0.355 milliseconds in resume sending helper answer | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998017c78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.10348; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004167 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f4998017c78 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #270 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0499 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.120797; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #301 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.137099; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | libevent_free: release ptr-libevent@0x7f498c017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #324 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.15541; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008389 exceeds limit? YES "road-eastnet-nonat-80" #80: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-80" #80: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #332 at 0x55564d9f47f8 | State DB: adding IKEv2 state #332 in UNDEFINED | pstats #332 ikev2.ike started | Message ID: init #332: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #332: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #332; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-80" #332: initiating v2 parent SA to replace #80 | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 332 for state #332 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f498c017c48 size 128 | #332 spent 0.12 milliseconds in ikev2_parent_outI1() | RESET processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #80 ikev2.ike failed too-many-retransmits | pstats #80 ikev2.ike deleted too-many-retransmits | #80 spent 2.97 milliseconds in total | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 13 resuming "road-eastnet-nonat-80" #80: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #80: PARENT_I1(half-open IKE SA) => delete | crypto helper 13 starting work-order 332 for state #332 | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 332 | picked newest_isakmp_sa #0 for #80 "road-eastnet-nonat-80" #80: deleting IKE SA for connection 'road-eastnet-nonat-80' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-80' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-80 | State DB: deleting IKEv2 state #80 in PARENT_I1 | parent state #80: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 332 time elapsed 0.000692 seconds | (#332) spent 0.689 milliseconds in crypto helper computing work-order 332: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 332 for state #332 to event queue | scheduling resume sending helper answer for #332 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 | crypto helper 13 waiting (nothing to do) | stop processing: state #80 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da27e18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | in statetime_stop() and could not find #80 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-80 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-80' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-80" | stop processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:349) | spent 0.0634 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 332 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #332 | **emit ISAKMP Message: | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | ikev2 g^x 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | ikev2 g^x e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | ikev2 g^x 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | ikev2 g^x 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | ikev2 g^x cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | ikev2 g^x 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ikev2 g^x ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | ikev2 g^x c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | ikev2 g^x 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | ikev2 g^x c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | ikev2 g^x 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | ikev2 g^x 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | ikev2 g^x 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | ikev2 g^x 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | ikev2 g^x 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 d0 a9 ed e3 | IKEv2 nonce 9f a0 37 35 54 00 90 dd c0 c4 f3 49 c1 d3 17 d8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8f d8 a3 33 bd b3 b2 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 50 | natd_hash: port=500 | natd_hash: hash= 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c a3 20 ba 7e | natd_hash: hash= 45 ea 83 1a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c a3 20 ba 7e | Notify data 45 ea 83 1a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8f d8 a3 33 bd b3 b2 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | natd_hash: hash= ff 6c ae e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | Notify data ff 6c ae e0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #332 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #332: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #332 to 4294967295 after switching state | Message ID: IKE #332 skipping update_recv as MD is fake | Message ID: sent #332 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.80:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | state #332 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c017c48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f496c017da8 size 128 | #332 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.156816 | resume sending helper answer for #332 suppresed complete_v2_state_transition() and stole MD | #332 spent 0.372 milliseconds in resume sending helper answer | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c017b48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.160996; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #316 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.168317; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #271 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.18262; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #302 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.197954; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | libevent_free: release ptr-libevent@0x7f4990017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #325 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.226335; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f4990017cf8 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #317 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.235637; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #272 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.239903; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | libevent_free: release ptr-libevent@0x7f49a4004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #303 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.244138; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007471 exceeds limit? YES "road-eastnet-nonat-81" #81: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-81" #81: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #333 at 0x55564d9f5e58 | State DB: adding IKEv2 state #333 in UNDEFINED | pstats #333 ikev2.ike started | Message ID: init #333: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #333: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #333; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-81" #333: initiating v2 parent SA to replace #81 | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 333 for state #333 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8d238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f49a4004e48 size 128 | #333 spent 0.0717 milliseconds in ikev2_parent_outI1() | RESET processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #81 ikev2.ike failed too-many-retransmits | pstats #81 ikev2.ike deleted too-many-retransmits | #81 spent 4.61 milliseconds in total | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-81" #81: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #81: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #81 "road-eastnet-nonat-81" #81: deleting IKE SA for connection 'road-eastnet-nonat-81' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-81' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-81 | State DB: deleting IKEv2 state #81 in PARENT_I1 | parent state #81: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 resuming | crypto helper 14 starting work-order 333 for state #333 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 333 | stop processing: state #81 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da137b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | in statetime_stop() and could not find #81 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-81 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-81' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-81" | stop processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 333 time elapsed 0.00054 seconds | (#333) spent 0.541 milliseconds in crypto helper computing work-order 333: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 333 for state #333 to event queue | scheduling resume sending helper answer for #333 | libevent_malloc: new ptr-libevent@0x7f4990017bf8 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 333 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #333 | **emit ISAKMP Message: | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | ikev2 g^x 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | ikev2 g^x 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | ikev2 g^x af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | ikev2 g^x e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | ikev2 g^x 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | ikev2 g^x 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | ikev2 g^x bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | ikev2 g^x 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | ikev2 g^x f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | ikev2 g^x cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | ikev2 g^x 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ikev2 g^x ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ikev2 g^x ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | ikev2 g^x 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | ikev2 g^x 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f 86 35 c2 ac | IKEv2 nonce e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 f9 34 db 06 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= af cf b4 ff 0d 28 e6 d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 51 | natd_hash: port=500 | natd_hash: hash= 69 11 60 56 89 bb 47 db 31 01 b6 f5 3c 07 67 bb | natd_hash: hash= 46 48 08 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 11 60 56 89 bb 47 db 31 01 b6 f5 3c 07 67 bb | Notify data 46 48 08 36 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= af cf b4 ff 0d 28 e6 d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | natd_hash: hash= 0c 95 20 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | Notify data 0c 95 20 d5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #333 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #333: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #333 to 4294967295 after switching state | Message ID: IKE #333 skipping update_recv as MD is fake | Message ID: sent #333 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.81:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | state #333 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8d238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 | #333 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.245187 | resume sending helper answer for #333 suppresed complete_v2_state_transition() and stole MD | #333 spent 0.305 milliseconds in resume sending helper answer | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990017bf8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.275341; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f4990017bf8 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | libevent_free: release ptr-libevent@0x7f4984017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #326 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.284631; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f4984017c48 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | libevent_free: release ptr-libevent@0x7f49a4017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #318 spent 0.0938 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.301902; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f49a4017a98 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | libevent_free: release ptr-libevent@0x7f49a8004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #304 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.30211; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00527 exceeds limit? YES "road-eastnet-nonat-82" #82: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-82" #82: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #334 at 0x55564d9f74b8 | State DB: adding IKEv2 state #334 in UNDEFINED | pstats #334 ikev2.ike started | Message ID: init #334: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #334: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #334; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-82" #334: initiating v2 parent SA to replace #82 | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 334 for state #334 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa8c08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f49a8004e48 size 128 | #334 spent 0.0749 milliseconds in ikev2_parent_outI1() | RESET processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #82 ikev2.ike failed too-many-retransmits | pstats #82 ikev2.ike deleted too-many-retransmits | crypto helper 15 starting work-order 334 for state #334 | #82 spent 3.42 milliseconds in total | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 334 | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-82" #82: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #82: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #82 "road-eastnet-nonat-82" #82: deleting IKE SA for connection 'road-eastnet-nonat-82' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-82' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-82 | State DB: deleting IKEv2 state #82 in PARENT_I1 | parent state #82: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #82 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 334 time elapsed 0.000901 seconds | libevent_free: release ptr-libevent@0x55564d99b3b8 | (#334) spent 0.912 milliseconds in crypto helper computing work-order 334: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | in statetime_stop() and could not find #82 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 15 sending results from work-order 334 for state #334 to event queue | scheduling resume sending helper answer for #334 | libevent_malloc: new ptr-libevent@0x7f4984017d48 size 128 | crypto helper 15 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-82 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-82' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-82" | stop processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:349) | spent 0.0987 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 334 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #334 | **emit ISAKMP Message: | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | ikev2 g^x 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | ikev2 g^x aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | ikev2 g^x a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | ikev2 g^x 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | ikev2 g^x 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ikev2 g^x ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | ikev2 g^x 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | ikev2 g^x 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | ikev2 g^x d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | ikev2 g^x d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | ikev2 g^x e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | ikev2 g^x 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | ikev2 g^x 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | ikev2 g^x 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | ikev2 g^x 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 1e e0 d4 28 | IKEv2 nonce 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a 03 48 e4 9b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 01 41 51 fc 2c 67 7a b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 52 | natd_hash: port=500 | natd_hash: hash= a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 39 df f3 87 | natd_hash: hash= e0 9e f9 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 39 df f3 87 | Notify data e0 9e f9 9c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 01 41 51 fc 2c 67 7a b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | natd_hash: hash= 75 2a 33 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | Notify data 75 2a 33 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #334 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #334: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #334 to 4294967295 after switching state | Message ID: IKE #334 skipping update_recv as MD is fake | Message ID: sent #334 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.82:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | state #334 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa8c08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f49b401a608 size 128 | #334 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.303904 | resume sending helper answer for #334 suppresed complete_v2_state_transition() and stole MD | #334 spent 0.502 milliseconds in resume sending helper answer | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984017d48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.329122; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003715 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f4984017d48 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #273 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.330403; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | libevent_free: release ptr-libevent@0x7f4988017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #327 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.339678; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f4988017c48 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #319 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.00553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.362039; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | libevent_free: release ptr-libevent@0x7f496c012538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #305 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.365323; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006812 exceeds limit? YES "road-eastnet-nonat-83" #83: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-83" #83: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #335 at 0x55564d9f8cc8 | State DB: adding IKEv2 state #335 in UNDEFINED | pstats #335 ikev2.ike started | Message ID: init #335: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #335: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #335; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-83" #335: initiating v2 parent SA to replace #83 | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 335 for state #335 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f496c012538 size 128 | #335 spent 0.0777 milliseconds in ikev2_parent_outI1() | RESET processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #83 ikev2.ike failed too-many-retransmits | pstats #83 ikev2.ike deleted too-many-retransmits | crypto helper 16 resuming | crypto helper 16 starting work-order 335 for state #335 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 335 | #83 spent 2.59 milliseconds in total | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-83" #83: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #83: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #83 "road-eastnet-nonat-83" #83: deleting IKE SA for connection 'road-eastnet-nonat-83' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-83' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-83 | State DB: deleting IKEv2 state #83 in PARENT_I1 | parent state #83: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 335 time elapsed 0.000612 seconds | stop processing: state #83 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da9e8d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | (#335) spent 0.619 milliseconds in crypto helper computing work-order 335: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 335 for state #335 to event queue | in statetime_stop() and could not find #83 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #335 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-83 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 | crypto helper 16 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-83' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-83" | stop processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:349) | spent 0.0748 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 335 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #335 | **emit ISAKMP Message: | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | ikev2 g^x 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ikev2 g^x ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | ikev2 g^x eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | ikev2 g^x 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | ikev2 g^x b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | ikev2 g^x bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | ikev2 g^x 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | ikev2 g^x 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | ikev2 g^x 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | ikev2 g^x 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | ikev2 g^x e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | ikev2 g^x fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | ikev2 g^x 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | ikev2 g^x d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ikev2 g^x ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 22 8f 4f fc | IKEv2 nonce 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef ad 0b b2 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7f 60 e7 69 1e bd f7 2f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 53 | natd_hash: port=500 | natd_hash: hash= b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 a3 4d 33 66 | natd_hash: hash= bf f8 48 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 a3 4d 33 66 | Notify data bf f8 48 b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7f 60 e7 69 1e bd f7 2f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | natd_hash: hash= 37 a3 88 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | Notify data 37 a3 88 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #335 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #335: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #335 to 4294967295 after switching state | Message ID: IKE #335 skipping update_recv as MD is fake | Message ID: sent #335 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.83:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | state #335 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c012538 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f49b801a778 size 128 | #335 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.366502 | resume sending helper answer for #335 suppresed complete_v2_state_transition() and stole MD | #335 spent 0.306 milliseconds in resume sending helper answer | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988017b48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.388672; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | libevent_free: release ptr-libevent@0x7f498000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #274 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.404108; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f498000c908 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #320 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.413416; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | libevent_free: release ptr-libevent@0x7f497c017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #328 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.449839; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #275 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.452153; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #306 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.453432; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004689 exceeds limit? YES "road-eastnet-nonat-84" #84: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-84" #84: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #336 at 0x55564d9fa328 | State DB: adding IKEv2 state #336 in UNDEFINED | pstats #336 ikev2.ike started | Message ID: init #336: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #336: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #336; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-84" #336: initiating v2 parent SA to replace #84 | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 336 for state #336 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 | #336 spent 0.0784 milliseconds in ikev2_parent_outI1() | RESET processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 336 for state #336 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 336 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #84 ikev2.ike failed too-many-retransmits | pstats #84 ikev2.ike deleted too-many-retransmits | #84 spent 5.88 milliseconds in total | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-84" #84: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #84: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #84 "road-eastnet-nonat-84" #84: deleting IKE SA for connection 'road-eastnet-nonat-84' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-84' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-84 | State DB: deleting IKEv2 state #84 in PARENT_I1 | parent state #84: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 336 time elapsed 0.001017 seconds | (#336) spent 1.02 milliseconds in crypto helper computing work-order 336: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 336 for state #336 to event queue | scheduling resume sending helper answer for #336 | libevent_malloc: new ptr-libevent@0x7f497c017b48 size 128 | stop processing: state #84 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 1 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7f49ac03e388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | in statetime_stop() and could not find #84 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-84 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-84' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-84" | stop processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:349) | spent 0.06 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 336 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #336 | **emit ISAKMP Message: | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | ikev2 g^x b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | ikev2 g^x 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | ikev2 g^x 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | ikev2 g^x 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | ikev2 g^x be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | ikev2 g^x c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | ikev2 g^x f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | ikev2 g^x 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | ikev2 g^x cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | ikev2 g^x b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | ikev2 g^x b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | ikev2 g^x f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | ikev2 g^x 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | ikev2 g^x 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | ikev2 g^x 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 f7 36 a9 39 84 5f 75 de b6 72 88 9a f6 b1 83 | IKEv2 nonce 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a 9d ac 55 f2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 75 a1 ac 21 0c 5a 47 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 54 | natd_hash: port=500 | natd_hash: hash= b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 a5 e3 c4 a4 | natd_hash: hash= 69 72 48 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 a5 e3 c4 a4 | Notify data 69 72 48 d1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 75 a1 ac 21 0c 5a 47 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | natd_hash: hash= 03 5c 44 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | Notify data 03 5c 44 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #336 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #336: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #336 to 4294967295 after switching state | Message ID: IKE #336 skipping update_recv as MD is fake | Message ID: sent #336 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.84:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | state #336 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 | #336 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.455037 | resume sending helper answer for #336 suppresed complete_v2_state_transition() and stole MD | #336 spent 0.325 milliseconds in resume sending helper answer | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c017b48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.459199; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f497c017b48 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #321 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.475525; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #329 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.506833; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #276 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.513129; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #307 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.524414; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #322 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.534697; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500944 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | libevent_free: release ptr-libevent@0x7f4974017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #330 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0172 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.536005; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006213 exceeds limit? YES "road-eastnet-nonat-85" #85: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-85" #85: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #337 at 0x55564d9fba38 | State DB: adding IKEv2 state #337 in UNDEFINED | pstats #337 ikev2.ike started | Message ID: init #337: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #337: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #337; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-85" #337: initiating v2 parent SA to replace #85 | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 337 for state #337 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f4974017cf8 size 128 | #337 spent 0.0739 milliseconds in ikev2_parent_outI1() | RESET processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #85 ikev2.ike failed too-many-retransmits | pstats #85 ikev2.ike deleted too-many-retransmits | #85 spent 3.46 milliseconds in total | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-85" #85: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #85: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #85 "road-eastnet-nonat-85" #85: deleting IKE SA for connection 'road-eastnet-nonat-85' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-85' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-85 | State DB: deleting IKEv2 state #85 in PARENT_I1 | parent state #85: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 resuming | crypto helper 3 starting work-order 337 for state #337 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 337 | stop processing: state #85 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a4038c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | in statetime_stop() and could not find #85 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-85 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-85' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-85" | stop processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:349) | spent 0.0604 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 337 time elapsed 0.000523 seconds | (#337) spent 0.527 milliseconds in crypto helper computing work-order 337: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 337 for state #337 to event queue | scheduling resume sending helper answer for #337 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 337 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #337 | **emit ISAKMP Message: | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | ikev2 g^x 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | ikev2 g^x 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | ikev2 g^x 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | ikev2 g^x 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | ikev2 g^x 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | ikev2 g^x 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | ikev2 g^x 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | ikev2 g^x dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | ikev2 g^x f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ikev2 g^x ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | ikev2 g^x 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | ikev2 g^x b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | ikev2 g^x 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | ikev2 g^x c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ikev2 g^x ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 94 23 17 ae 7d e2 69 72 5c a9 fc 58 a7 ea cd | IKEv2 nonce 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 ed 01 54 1c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd 42 0e 37 d8 1c a5 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 55 | natd_hash: port=500 | natd_hash: hash= dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 8b c8 a5 f2 | natd_hash: hash= de 2b b4 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 8b c8 a5 f2 | Notify data de 2b b4 a0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bd 42 0e 37 d8 1c a5 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | natd_hash: hash= cd 4c 28 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | Notify data cd 4c 28 1d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #337 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #337: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #337 to 4294967295 after switching state | Message ID: IKE #337 skipping update_recv as MD is fake | Message ID: sent #337 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.85:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | state #337 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974017cf8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49b001d568 size 128 | #337 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.537056 | resume sending helper answer for #337 suppresed complete_v2_state_transition() and stole MD | #337 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980018dc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.563233; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #277 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.569583; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #308 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.581839; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #323 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.595102; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | libevent_free: release ptr-libevent@0x7f49b8014e08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #331 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.597398; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00695 exceeds limit? YES "road-eastnet-nonat-86" #86: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-86" #86: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #338 at 0x55564d9fd1b8 | State DB: adding IKEv2 state #338 in UNDEFINED | pstats #338 ikev2.ike started | Message ID: init #338: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #338: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #338; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-86" #338: initiating v2 parent SA to replace #86 | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 338 for state #338 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa16f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f49b8014e08 size 128 | #338 spent 0.0776 milliseconds in ikev2_parent_outI1() | RESET processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #86 ikev2.ike failed too-many-retransmits | pstats #86 ikev2.ike deleted too-many-retransmits | #86 spent 2.58 milliseconds in total | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-86" #86: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #86: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #86 "road-eastnet-nonat-86" #86: deleting IKE SA for connection 'road-eastnet-nonat-86' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-86' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 17 resuming | crypto helper 17 starting work-order 338 for state #338 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 338 | in connection_discard for connection road-eastnet-nonat-86 | State DB: deleting IKEv2 state #86 in PARENT_I1 | parent state #86: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 338 time elapsed 0.00061 seconds | (#338) spent 0.608 milliseconds in crypto helper computing work-order 338: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 338 for state #338 to event queue | scheduling resume sending helper answer for #338 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 | crypto helper 17 waiting (nothing to do) | stop processing: state #86 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da34f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | in statetime_stop() and could not find #86 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-86 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-86' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-86" | stop processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:349) | spent 0.0583 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 338 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #338 | **emit ISAKMP Message: | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | ikev2 g^x 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | ikev2 g^x e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | ikev2 g^x 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | ikev2 g^x 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | ikev2 g^x b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | ikev2 g^x 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | ikev2 g^x e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | ikev2 g^x 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | ikev2 g^x 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | ikev2 g^x 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | ikev2 g^x 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | ikev2 g^x e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | ikev2 g^x a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | ikev2 g^x fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | ikev2 g^x 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e aa 21 7c c0 | IKEv2 nonce 69 0c 17 08 ac 52 32 98 7b 2c c5 97 e0 20 b6 9b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 67 c2 15 d5 b4 eb 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 56 | natd_hash: port=500 | natd_hash: hash= 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 98 8b 30 f2 | natd_hash: hash= 55 5f de 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 98 8b 30 f2 | Notify data 55 5f de 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 67 c2 15 d5 b4 eb 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | natd_hash: hash= 04 5b 82 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | Notify data 04 5b 82 d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #338 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #338: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #338 to 4294967295 after switching state | Message ID: IKE #338 skipping update_recv as MD is fake | Message ID: sent #338 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.86:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | state #338 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8014e08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa16f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 | #338 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.598584 | resume sending helper answer for #338 suppresed complete_v2_state_transition() and stole MD | #338 spent 0.304 milliseconds in resume sending helper answer | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974017df8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.628799; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #309 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.638065; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #324 spent 0.0969 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.640333; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #278 spent 0.0839 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.657567; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | libevent_free: release ptr-libevent@0x7f496c017da8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #332 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0996 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.658934; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009755 exceeds limit? YES "road-eastnet-nonat-87" #87: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-87" #87: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #339 at 0x55564d9fe8c8 | State DB: adding IKEv2 state #339 in UNDEFINED | pstats #339 ikev2.ike started | Message ID: init #339: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #339: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #339; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-87" #339: initiating v2 parent SA to replace #87 | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 339 for state #339 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f496c017da8 size 128 | #339 spent 0.105 milliseconds in ikev2_parent_outI1() | RESET processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #87 ikev2.ike failed too-many-retransmits | pstats #87 ikev2.ike deleted too-many-retransmits | #87 spent 2.39 milliseconds in total | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-87" #87: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #87: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #87 "road-eastnet-nonat-87" #87: deleting IKE SA for connection 'road-eastnet-nonat-87' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 18 resuming | crypto helper 18 starting work-order 339 for state #339 | add revival: connection 'road-eastnet-nonat-87' added to the list and scheduled for 0 seconds | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 339 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-87 | State DB: deleting IKEv2 state #87 in PARENT_I1 | parent state #87: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #87 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 339 time elapsed 0.000534 seconds | libevent_free: release ptr-libevent@0x7f4994017af8 | (#339) spent 0.539 milliseconds in crypto helper computing work-order 339: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 339 for state #339 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | scheduling resume sending helper answer for #339 | in statetime_stop() and could not find #87 | libevent_malloc: new ptr-libevent@0x7f497800cab8 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 18 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-87 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-87' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-87" | stop processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:349) | spent 0.0869 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 339 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #339 | **emit ISAKMP Message: | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | ikev2 g^x 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | ikev2 g^x 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | ikev2 g^x 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | ikev2 g^x cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | ikev2 g^x 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | ikev2 g^x 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | ikev2 g^x df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | ikev2 g^x 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | ikev2 g^x 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ikev2 g^x ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | ikev2 g^x 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | ikev2 g^x f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | ikev2 g^x 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | ikev2 g^x a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | ikev2 g^x 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d 9e 56 04 91 | IKEv2 nonce 10 84 ba 35 29 ea 56 20 5f 58 03 1b 60 13 ce e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7f 75 e1 e6 00 ce 45 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 57 | natd_hash: port=500 | natd_hash: hash= 30 3d 48 34 64 e2 0d b8 7a eb 38 95 12 e8 1c e7 | natd_hash: hash= c1 40 aa ba | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 3d 48 34 64 e2 0d b8 7a eb 38 95 12 e8 1c e7 | Notify data c1 40 aa ba | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7f 75 e1 e6 00 ce 45 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | natd_hash: hash= 06 99 14 ba | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | Notify data 06 99 14 ba | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #339 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #339: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #339 to 4294967295 after switching state | Message ID: IKE #339 skipping update_recv as MD is fake | Message ID: sent #339 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.87:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | state #339 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c017da8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49900058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 | #339 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.660249 | resume sending helper answer for #339 suppresed complete_v2_state_transition() and stole MD | #339 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497800cab8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.698441; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f497800cab8 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | libevent_free: release ptr-libevent@0x7f4994012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #279 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.699731; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f4994012488 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #325 spent 0.0849 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.715967; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | libevent_free: release ptr-libevent@0x7f49b400f698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #310 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.72327; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006379 exceeds limit? YES "road-eastnet-nonat-88" #88: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-88" #88: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #340 at 0x55564d9fffd8 | State DB: adding IKEv2 state #340 in UNDEFINED | pstats #340 ikev2.ike started | Message ID: init #340: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #340: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #340; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-88" #340: initiating v2 parent SA to replace #88 | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 340 for state #340 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f497c0058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f49b400f698 size 128 | #340 spent 0.108 milliseconds in ikev2_parent_outI1() | RESET processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #88 ikev2.ike failed too-many-retransmits | pstats #88 ikev2.ike deleted too-many-retransmits | #88 spent 3.95 milliseconds in total | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-88" #88: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #88: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 19 resuming | crypto helper 19 starting work-order 340 for state #340 | picked newest_isakmp_sa #0 for #88 "road-eastnet-nonat-88" #88: deleting IKE SA for connection 'road-eastnet-nonat-88' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 340 | add revival: connection 'road-eastnet-nonat-88' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-88 | State DB: deleting IKEv2 state #88 in PARENT_I1 | parent state #88: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 340 time elapsed 0.000925 seconds | (#340) spent 0.922 milliseconds in crypto helper computing work-order 340: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 340 for state #340 to event queue | scheduling resume sending helper answer for #340 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 | crypto helper 19 waiting (nothing to do) | stop processing: state #88 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a003e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | in statetime_stop() and could not find #88 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-88 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-88' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-88" | stop processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:349) | spent 0.0624 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 340 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #340 | **emit ISAKMP Message: | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | ikev2 g^x 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | ikev2 g^x 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ikev2 g^x ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | ikev2 g^x 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | ikev2 g^x bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | ikev2 g^x c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | ikev2 g^x 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | ikev2 g^x 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | ikev2 g^x f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | ikev2 g^x 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | ikev2 g^x 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | ikev2 g^x bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | ikev2 g^x c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | ikev2 g^x 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | ikev2 g^x 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c 84 4b 0c 04 | IKEv2 nonce 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 f8 11 3d d7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 81 42 69 72 ff c1 6c c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 58 | natd_hash: port=500 | natd_hash: hash= 48 77 67 38 80 78 8c 98 8d 7b ef 50 81 67 4f a0 | natd_hash: hash= a1 5d 53 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 77 67 38 80 78 8c 98 8d 7b ef 50 81 67 4f a0 | Notify data a1 5d 53 13 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 81 42 69 72 ff c1 6c c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | natd_hash: hash= fe b1 fa f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | Notify data fe b1 fa f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #340 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #340: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #340 to 4294967295 after switching state | Message ID: IKE #340 skipping update_recv as MD is fake | Message ID: sent #340 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.88:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | state #340 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b400f698 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f497c0058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f499c01d3f8 size 128 | #340 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.724917 | resume sending helper answer for #340 suppresed complete_v2_state_transition() and stole MD | #340 spent 0.391 milliseconds in resume sending helper answer | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c017ea8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.74611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | libevent_free: release ptr-libevent@0x7f49bc01a7b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #333 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.758378; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | libevent_free: release ptr-libevent@0x7f49b800f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #280 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.776733; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f49b800f798 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | libevent_free: release ptr-libevent@0x7f4990017bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #326 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.803022; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000868 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f4990017bf8 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #311 spent 0.527 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.804727; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | libevent_free: release ptr-libevent@0x7f49b401a608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #334 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.814036; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006545 exceeds limit? YES "road-eastnet-nonat-89" #89: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-89" #89: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #341 at 0x55564da016e8 | State DB: adding IKEv2 state #341 in UNDEFINED | pstats #341 ikev2.ike started | Message ID: init #341: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #341: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #341; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-89" #341: initiating v2 parent SA to replace #89 | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 341 for state #341 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa8c08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f49b401a608 size 128 | #341 spent 0.0984 milliseconds in ikev2_parent_outI1() | RESET processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #89 ikev2.ike failed too-many-retransmits | pstats #89 ikev2.ike deleted too-many-retransmits | #89 spent 6.22 milliseconds in total | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-89" #89: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #89: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #89 | crypto helper 0 resuming "road-eastnet-nonat-89" #89: deleting IKE SA for connection 'road-eastnet-nonat-89' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 0 starting work-order 341 for state #341 | add revival: connection 'road-eastnet-nonat-89' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 341 | in connection_discard for connection road-eastnet-nonat-89 | State DB: deleting IKEv2 state #89 in PARENT_I1 | parent state #89: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #89 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 341 time elapsed 0.000539 seconds | libevent_free: release ptr-libevent@0x55564d9bc908 | (#341) spent 0.54 milliseconds in crypto helper computing work-order 341: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 341 for state #341 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | scheduling resume sending helper answer for #341 | in statetime_stop() and could not find #89 | libevent_malloc: new ptr-libevent@0x7f49bc01a8b8 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 0 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-89 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-89' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-89" | stop processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:349) | spent 0.0843 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 341 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #341 | **emit ISAKMP Message: | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | ikev2 g^x 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | ikev2 g^x 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | ikev2 g^x 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | ikev2 g^x d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | ikev2 g^x b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | ikev2 g^x d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | ikev2 g^x 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | ikev2 g^x 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | ikev2 g^x 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | ikev2 g^x c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | ikev2 g^x f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | ikev2 g^x 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | ikev2 g^x 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | ikev2 g^x 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | ikev2 g^x 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 75 c1 bd 02 | IKEv2 nonce 2d 31 b8 d9 72 be e0 af 66 55 46 c6 f3 ef ce a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c0 d1 4c 29 5d ab 4d 17 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 59 | natd_hash: port=500 | natd_hash: hash= 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 e7 7e 3b 61 | natd_hash: hash= da 14 17 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 e7 7e 3b 61 | Notify data da 14 17 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c0 d1 4c 29 5d ab 4d 17 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | natd_hash: hash= 3f bf b8 0e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | Notify data 3f bf b8 0e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #341 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #341: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #341 to 4294967295 after switching state | Message ID: IKE #341 skipping update_recv as MD is fake | Message ID: sent #341 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.89:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | state #341 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b401a608 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa8c08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f49a001d3f8 size 128 | #341 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.815337 | resume sending helper answer for #341 suppresed complete_v2_state_transition() and stole MD | #341 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc01a8b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.831554; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f49bc01a8b8 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #327 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.834829; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004406 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #281 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.859072; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #312 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.867376; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | libevent_free: release ptr-libevent@0x7f49b801a778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #335 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.892667; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005853 exceeds limit? YES "road-eastnet-nonat-90" #90: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-90" #90: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #342 at 0x55564da02df8 | State DB: adding IKEv2 state #342 in UNDEFINED | pstats #342 ikev2.ike started | Message ID: init #342: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #342: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #342; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-90" #342: initiating v2 parent SA to replace #90 | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 342 for state #342 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f49b801a778 size 128 | #342 spent 0.114 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 342 for state #342 | RESET processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 342 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #90 ikev2.ike failed too-many-retransmits | pstats #90 ikev2.ike deleted too-many-retransmits | #90 spent 4.26 milliseconds in total | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-90" #90: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #90: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #90 "road-eastnet-nonat-90" #90: deleting IKE SA for connection 'road-eastnet-nonat-90' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-90' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-90 | State DB: deleting IKEv2 state #90 in PARENT_I1 | parent state #90: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #90 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 342 time elapsed 0.000857 seconds | libevent_free: release ptr-libevent@0x55564da022b8 | (#342) spent 0.865 milliseconds in crypto helper computing work-order 342: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | crypto helper 2 sending results from work-order 342 for state #342 to event queue | scheduling resume sending helper answer for #342 | in statetime_stop() and could not find #90 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 2 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-90 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-90' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-90" | stop processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:349) | spent 0.0814 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 342 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #342 | **emit ISAKMP Message: | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | ikev2 g^x 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | ikev2 g^x be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | ikev2 g^x 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | ikev2 g^x 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | ikev2 g^x 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | ikev2 g^x c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | ikev2 g^x 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | ikev2 g^x c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ikev2 g^x ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | ikev2 g^x 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | ikev2 g^x 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | ikev2 g^x d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | ikev2 g^x 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | ikev2 g^x cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | ikev2 g^x cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f9 38 58 1a e9 0b 1e df 68 05 19 12 e1 bf 5e 6c | IKEv2 nonce 64 ea f8 a1 12 90 5c 52 5b dd d6 63 d4 43 6c fc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 6e b2 3c 4c f4 84 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5a | natd_hash: port=500 | natd_hash: hash= 58 8f 21 02 c5 db 43 06 7b 15 2a 40 56 9d 06 78 | natd_hash: hash= 01 58 05 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 8f 21 02 c5 db 43 06 7b 15 2a 40 56 9d 06 78 | Notify data 01 58 05 72 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 6e b2 3c 4c f4 84 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | natd_hash: hash= 22 e8 85 86 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | Notify data 22 e8 85 86 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #342 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #342: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #342 to 4294967295 after switching state | Message ID: IKE #342 skipping update_recv as MD is fake | Message ID: sent #342 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.90:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | state #342 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b801a778 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae5ab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f499401d568 size 128 | #342 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.89438 | resume sending helper answer for #342 suppresed complete_v2_state_transition() and stole MD | #342 spent 0.511 milliseconds in resume sending helper answer | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b401a508 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.913588; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #282 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.91488; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #328 spent 0.0891 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10645.917124; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | libevent_free: release ptr-libevent@0x7f499c017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #313 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10645.955474; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #336 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10645.97675; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #329 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10645.976901; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006645 exceeds limit? YES "road-eastnet-nonat-91" #91: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-91" #91: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #343 at 0x55564da04458 | State DB: adding IKEv2 state #343 in UNDEFINED | pstats #343 ikev2.ike started | Message ID: init #343: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #343: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #343; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-91" #343: initiating v2 parent SA to replace #91 | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 343 for state #343 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f499000cd68 size 128 | #343 spent 0.0785 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | RESET processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 343 for state #343 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 343 | pstats #91 ikev2.ike failed too-many-retransmits | pstats #91 ikev2.ike deleted too-many-retransmits | #91 spent 5 milliseconds in total | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-91" #91: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #91: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #91 "road-eastnet-nonat-91" #91: deleting IKE SA for connection 'road-eastnet-nonat-91' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-91' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-91 | State DB: deleting IKEv2 state #91 in PARENT_I1 | parent state #91: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #91 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 343 time elapsed 0.000619 seconds | libevent_free: release ptr-libevent@0x55564da51dd8 | (#343) spent 0.625 milliseconds in crypto helper computing work-order 343: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | crypto helper 4 sending results from work-order 343 for state #343 to event queue | in statetime_stop() and could not find #91 | scheduling resume sending helper answer for #343 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b801a678 size 128 | crypto helper 4 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-91 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-91' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-91" | stop processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:349) | spent 0.0694 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 343 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #343 | **emit ISAKMP Message: | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | ikev2 g^x f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | ikev2 g^x c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | ikev2 g^x d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | ikev2 g^x e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | ikev2 g^x 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | ikev2 g^x 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | ikev2 g^x 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | ikev2 g^x b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | ikev2 g^x b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ikev2 g^x ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | ikev2 g^x c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | ikev2 g^x 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | ikev2 g^x c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ikev2 g^x ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | ikev2 g^x 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 52 c3 c5 23 5a 09 d5 36 97 73 4f 69 d9 e7 94 | IKEv2 nonce 37 71 a2 62 cb 27 ba 55 33 75 23 d4 7f 81 15 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f8 04 a4 a1 2d ac 54 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5b | natd_hash: port=500 | natd_hash: hash= 3d cf bf 6b 22 ea be 22 47 7f 19 e8 94 d8 12 ea | natd_hash: hash= 5d 02 32 c9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d cf bf 6b 22 ea be 22 47 7f 19 e8 94 d8 12 ea | Notify data 5d 02 32 c9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f8 04 a4 a1 2d ac 54 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | natd_hash: hash= 5b c0 29 c3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | Notify data 5b c0 29 c3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #343 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #343: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #343 to 4294967295 after switching state | Message ID: IKE #343 skipping update_recv as MD is fake | Message ID: sent #343 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.91:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | state #343 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499000cd68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f499801d5d8 size 128 | #343 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10645.978161 | resume sending helper answer for #343 suppresed complete_v2_state_transition() and stole MD | #343 spent 0.338 milliseconds in resume sending helper answer | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b801a678 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10645.983357; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f49b801a678 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | libevent_free: release ptr-libevent@0x7f4984012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #283 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.011726; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f4984012488 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | libevent_free: release ptr-libevent@0x7f49b8009dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #314 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.035087; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f49b8009dc8 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #330 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.037378; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | libevent_free: release ptr-libevent@0x7f49b001d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #337 spent 0.0986 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.05465; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f49b001d568 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | libevent_free: release ptr-libevent@0x7f4988012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #284 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.05798; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005113 exceeds limit? YES "road-eastnet-nonat-92" #92: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-92" #92: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #344 at 0x55564da05bd8 | State DB: adding IKEv2 state #344 in UNDEFINED | pstats #344 ikev2.ike started | Message ID: init #344: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #344: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #344; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-92" #344: initiating v2 parent SA to replace #92 | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 344 for state #344 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f4998049be8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f4988012488 size 128 | #344 spent 0.107 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 344 for state #344 | RESET processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 344 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #92 ikev2.ike failed too-many-retransmits | pstats #92 ikev2.ike deleted too-many-retransmits | #92 spent 4.29 milliseconds in total | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-92" #92: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #92: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #92 "road-eastnet-nonat-92" #92: deleting IKE SA for connection 'road-eastnet-nonat-92' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-92' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-92 | State DB: deleting IKEv2 state #92 in PARENT_I1 | parent state #92: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #92 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 344 time elapsed 0.000999 seconds | libevent_free: release ptr-libevent@0x55564da26778 | (#344) spent 0.992 milliseconds in crypto helper computing work-order 344: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | crypto helper 5 sending results from work-order 344 for state #344 to event queue | in statetime_stop() and could not find #92 | scheduling resume sending helper answer for #344 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-92 which received a Delete/Notify but must remain up per local policy | crypto helper 5 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-92' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-92" | stop processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:349) | spent 0.0701 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 344 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #344 | **emit ISAKMP Message: | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | ikev2 g^x e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | ikev2 g^x cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | ikev2 g^x 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | ikev2 g^x c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | ikev2 g^x bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | ikev2 g^x a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | ikev2 g^x c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | ikev2 g^x dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | ikev2 g^x 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | ikev2 g^x b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | ikev2 g^x 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | ikev2 g^x f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | ikev2 g^x 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | ikev2 g^x a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | ikev2 g^x 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e 46 24 18 6a | IKEv2 nonce ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 71 58 35 0e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0c 55 46 56 2c 47 da 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5c | natd_hash: port=500 | natd_hash: hash= e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d 01 7f ac bb | natd_hash: hash= cd 23 fb 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d 01 7f ac bb | Notify data cd 23 fb 89 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0c 55 46 56 2c 47 da 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | natd_hash: hash= 92 04 08 e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | Notify data 92 04 08 e0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #344 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #344: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #344 to 4294967295 after switching state | Message ID: IKE #344 skipping update_recv as MD is fake | Message ID: sent #344 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.92:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | state #344 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f4998049be8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f498c01d4b8 size 128 | #344 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.059773 | resume sending helper answer for #344 suppresed complete_v2_state_transition() and stole MD | #344 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac01d3b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.093975; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | libevent_free: release ptr-libevent@0x7f4978018128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #315 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.096322; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f4978018128 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #331 spent 0.0993 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.099611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | libevent_free: release ptr-libevent@0x7f49a401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #338 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.129995; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | libevent_free: release ptr-libevent@0x7f4980012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #285 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.150277; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004604 exceeds limit? YES "road-eastnet-nonat-93" #93: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-93" #93: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #345 at 0x55564da072e8 | State DB: adding IKEv2 state #345 in UNDEFINED | pstats #345 ikev2.ike started | Message ID: init #345: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #345: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #345; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-93" #345: initiating v2 parent SA to replace #93 | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 345 for state #345 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f4980012488 size 128 | #345 spent 0.104 milliseconds in ikev2_parent_outI1() | RESET processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | crypto helper 6 starting work-order 345 for state #345 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #93 ikev2.ike failed too-many-retransmits | pstats #93 ikev2.ike deleted too-many-retransmits | #93 spent 6.37 milliseconds in total | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 345 "road-eastnet-nonat-93" #93: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #93: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #93 "road-eastnet-nonat-93" #93: deleting IKE SA for connection 'road-eastnet-nonat-93' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-93' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-93 | State DB: deleting IKEv2 state #93 in PARENT_I1 | parent state #93: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #93 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dab00a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | in statetime_stop() and could not find #93 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 345 time elapsed 0.000582 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#345) spent 0.583 milliseconds in crypto helper computing work-order 345: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 345 for state #345 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #345 Initiating connection road-eastnet-nonat-93 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f49b001d668 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 6 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-93' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-93" | stop processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:349) | spent 0.0755 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 345 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #345 | **emit ISAKMP Message: | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | ikev2 g^x b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | ikev2 g^x 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | ikev2 g^x 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | ikev2 g^x f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | ikev2 g^x 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | ikev2 g^x 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | ikev2 g^x f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | ikev2 g^x d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | ikev2 g^x 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | ikev2 g^x 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | ikev2 g^x d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | ikev2 g^x c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | ikev2 g^x 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | ikev2 g^x e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | ikev2 g^x 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ec 31 c6 f2 30 16 37 38 9e 4b ae 2f 2a a6 bf 67 | IKEv2 nonce cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 b2 a3 ab 9f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 57 93 d8 0a cd 7a e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5d | natd_hash: port=500 | natd_hash: hash= e7 44 b5 2e 10 ba ef a4 3c 91 af e5 cf b9 45 4f | natd_hash: hash= 48 b0 93 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 44 b5 2e 10 ba ef a4 3c 91 af e5 cf b9 45 4f | Notify data 48 b0 93 2f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 57 93 d8 0a cd 7a e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | natd_hash: hash= 90 8f 48 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | Notify data 90 8f 48 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #345 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #345: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #345 to 4294967295 after switching state | Message ID: IKE #345 skipping update_recv as MD is fake | Message ID: sent #345 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.93:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | state #345 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da974e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 | #345 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.151642 | resume sending helper answer for #345 suppresed complete_v2_state_transition() and stole MD | #345 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b001d668 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.158808; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f49b001d668 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #332 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.160134; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #339 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.162469; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #316 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.199829; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | libevent_free: release ptr-libevent@0x7f499000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #286 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.225122; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f499000c908 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | libevent_free: release ptr-libevent@0x7f499c01d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #340 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.227407; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f499c01d3f8 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | libevent_free: release ptr-libevent@0x7f4990017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #317 spent 0.0913 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.242666; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007144 exceeds limit? YES "road-eastnet-nonat-94" #94: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-94" #94: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #346 at 0x55564da089f8 | State DB: adding IKEv2 state #346 in UNDEFINED | pstats #346 ikev2.ike started | Message ID: init #346: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #346: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #346; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-94" #346: initiating v2 parent SA to replace #94 | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 346 for state #346 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8a488 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f4990017cf8 size 128 | #346 spent 0.0793 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | RESET processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 starting work-order 346 for state #346 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 346 | pstats #94 ikev2.ike failed too-many-retransmits | pstats #94 ikev2.ike deleted too-many-retransmits | #94 spent 5.72 milliseconds in total | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-94" #94: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #94: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #94 "road-eastnet-nonat-94" #94: deleting IKE SA for connection 'road-eastnet-nonat-94' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-94' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-94 | State DB: deleting IKEv2 state #94 in PARENT_I1 | parent state #94: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #94 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 346 time elapsed 0.000979 seconds | libevent_free: release ptr-libevent@0x7f49940334c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | in statetime_stop() and could not find #94 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-94 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | (#346) spent 0.971 milliseconds in crypto helper computing work-order 346: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 346 for state #346 to event queue | scheduling resume sending helper answer for #346 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 | crypto helper 7 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-94' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-94" | stop processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:349) | spent 0.0793 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 346 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #346 | **emit ISAKMP Message: | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | ikev2 g^x f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | ikev2 g^x 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | ikev2 g^x 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | ikev2 g^x c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | ikev2 g^x 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | ikev2 g^x c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | ikev2 g^x cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | ikev2 g^x f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | ikev2 g^x 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | ikev2 g^x 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | ikev2 g^x d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | ikev2 g^x 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | ikev2 g^x 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | ikev2 g^x b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | ikev2 g^x 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 3c b5 92 b2 | IKEv2 nonce 19 31 17 4f 2c 02 37 34 9e 76 08 c6 33 20 35 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ca 73 64 76 6f a6 c2 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5e | natd_hash: port=500 | natd_hash: hash= 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 a2 5f 78 4b | natd_hash: hash= c4 d5 cc e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 a2 5f 78 4b | Notify data c4 d5 cc e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ca 73 64 76 6f a6 c2 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | natd_hash: hash= e7 4a 82 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | Notify data e7 4a 82 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #346 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #346: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #346 to 4294967295 after switching state | Message ID: IKE #346 skipping update_recv as MD is fake | Message ID: sent #346 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.94:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | state #346 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4990017cf8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8a488 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f498401d3f8 size 128 | #346 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.244261 | resume sending helper answer for #346 suppresed complete_v2_state_transition() and stole MD | #346 spent 0.351 milliseconds in resume sending helper answer | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40123d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.247446; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #333 spent 0.0957 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.259708; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | libevent_free: release ptr-libevent@0x7f4994012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #287 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.285106; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | libevent_free: release ptr-libevent@0x7f4984017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #318 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.30539; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001486 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f4984017c48 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #334 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.315723; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | libevent_free: release ptr-libevent@0x7f49a001d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #341 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.322013; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007371 exceeds limit? YES "road-eastnet-nonat-95" #95: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-95" #95: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #347 at 0x55564da0a108 | State DB: adding IKEv2 state #347 in UNDEFINED | pstats #347 ikev2.ike started | Message ID: init #347: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #347: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #347; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-95" #347: initiating v2 parent SA to replace #95 | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 347 for state #347 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa8c08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f49a001d3f8 size 128 | crypto helper 8 resuming | #347 spent 0.117 milliseconds in ikev2_parent_outI1() | crypto helper 8 starting work-order 347 for state #347 | RESET processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 347 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #95 ikev2.ike failed too-many-retransmits | pstats #95 ikev2.ike deleted too-many-retransmits | #95 spent 3.75 milliseconds in total | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-95" #95: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #95: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #95 "road-eastnet-nonat-95" #95: deleting IKE SA for connection 'road-eastnet-nonat-95' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-95' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-95 | State DB: deleting IKEv2 state #95 in PARENT_I1 | parent state #95: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 347 time elapsed 0.000825 seconds | (#347) spent 0.823 milliseconds in crypto helper computing work-order 347: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 347 for state #347 to event queue | scheduling resume sending helper answer for #347 | libevent_malloc: new ptr-libevent@0x7f49a801d688 size 128 | crypto helper 8 waiting (nothing to do) | stop processing: state #95 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497c03e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | in statetime_stop() and could not find #95 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-95 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-95' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-95" | stop processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:349) | spent 0.0787 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 347 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #347 | **emit ISAKMP Message: | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | ikev2 g^x 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | ikev2 g^x 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | ikev2 g^x 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | ikev2 g^x c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | ikev2 g^x cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | ikev2 g^x 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | ikev2 g^x 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | ikev2 g^x 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | ikev2 g^x cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | ikev2 g^x 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | ikev2 g^x 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | ikev2 g^x 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | ikev2 g^x e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | ikev2 g^x 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | ikev2 g^x 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e 14 f8 e8 de | IKEv2 nonce 1c cc 2b 99 64 8f ff 33 89 53 53 a8 69 6b ec ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0f 8f 59 62 6e c3 64 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5f | natd_hash: port=500 | natd_hash: hash= 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df 22 15 8d eb | natd_hash: hash= 4c 52 3d 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df 22 15 8d eb | Notify data 4c 52 3d 51 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0f 8f 59 62 6e c3 64 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | natd_hash: hash= 65 af 98 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | Notify data 65 af 98 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #347 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #347: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #347 to 4294967295 after switching state | Message ID: IKE #347 skipping update_recv as MD is fake | Message ID: sent #347 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.95:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | state #347 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a001d3f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa8c08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f498801d3f8 size 128 | #347 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.323563 | resume sending helper answer for #347 suppresed complete_v2_state_transition() and stole MD | #347 spent 0.392 milliseconds in resume sending helper answer | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a801d688 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.325732; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005536 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f49a801d688 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | libevent_free: release ptr-libevent@0x7f498c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #288 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.340083; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002813 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | libevent_free: release ptr-libevent@0x7f4988017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #319 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.368446; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001944 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f4988017c48 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #335 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0262 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.381812; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008664 exceeds limit? YES "road-eastnet-nonat-96" #96: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-96" #96: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #348 at 0x55564da0b918 | State DB: adding IKEv2 state #348 in UNDEFINED | pstats #348 ikev2.ike started | Message ID: init #348: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #348: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #348; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-96" #348: initiating v2 parent SA to replace #96 | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 348 for state #348 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da1dae8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f498c004e48 size 128 | #348 spent 0.114 milliseconds in ikev2_parent_outI1() | RESET processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #96 ikev2.ike failed too-many-retransmits | pstats #96 ikev2.ike deleted too-many-retransmits | #96 spent 2.12 milliseconds in total | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-96" #96: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #96: PARENT_I1(half-open IKE SA) => delete | crypto helper 9 resuming | crypto helper 9 starting work-order 348 for state #348 | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 348 | picked newest_isakmp_sa #0 for #96 "road-eastnet-nonat-96" #96: deleting IKE SA for connection 'road-eastnet-nonat-96' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-96' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-96 | State DB: deleting IKEv2 state #96 in PARENT_I1 | parent state #96: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #96 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 348 time elapsed 0.000556 seconds | libevent_free: release ptr-libevent@0x7f497403e3d8 | (#348) spent 0.563 milliseconds in crypto helper computing work-order 348: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | crypto helper 9 sending results from work-order 348 for state #348 to event queue | scheduling resume sending helper answer for #348 | in statetime_stop() and could not find #96 | libevent_malloc: new ptr-libevent@0x7f499c01d4f8 size 128 | crypto helper 9 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-96 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-96' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-96" | stop processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:349) | spent 0.0751 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 348 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #348 | **emit ISAKMP Message: | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ikev2 g^x ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | ikev2 g^x be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | ikev2 g^x e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | ikev2 g^x 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | ikev2 g^x b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | ikev2 g^x e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | ikev2 g^x 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | ikev2 g^x f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | ikev2 g^x 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | ikev2 g^x 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | ikev2 g^x a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | ikev2 g^x 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | ikev2 g^x 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | ikev2 g^x 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | ikev2 g^x b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a0 70 36 5c c8 40 bf 80 19 42 14 b5 c0 f3 cb 94 | IKEv2 nonce 11 77 50 73 6c 28 77 8e 64 31 9e a9 18 0d cf 13 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fc 6f 7d fb 7f c0 8c 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 60 | natd_hash: port=500 | natd_hash: hash= 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc 29 a7 11 4f | natd_hash: hash= 24 ee c4 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc 29 a7 11 4f | Notify data 24 ee c4 9e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fc 6f 7d fb 7f c0 8c 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | natd_hash: hash= df 84 f8 30 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | Notify data df 84 f8 30 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #348 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #348: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #348 to 4294967295 after switching state | Message ID: IKE #348 skipping update_recv as MD is fake | Message ID: sent #348 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.96:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | state #348 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da1dae8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 | #348 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.383187 | resume sending helper answer for #348 suppresed complete_v2_state_transition() and stole MD | #348 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c01d4f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.385376; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004745 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f499c01d4f8 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #289 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.394662; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | libevent_free: release ptr-libevent@0x7f499401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #342 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0333 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.404964; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f499401d568 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | libevent_free: release ptr-libevent@0x7f498000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #320 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.442238; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007968 exceeds limit? YES "road-eastnet-nonat-97" #97: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-97" #97: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #349 at 0x55564da0cf78 | State DB: adding IKEv2 state #349 in UNDEFINED | pstats #349 ikev2.ike started | Message ID: init #349: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #349: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #349; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-97" #349: initiating v2 parent SA to replace #97 | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 349 for state #349 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab44f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f498000c908 size 128 | #349 spent 0.0844 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | RESET processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #97 ikev2.ike failed too-many-retransmits | crypto helper 10 starting work-order 349 for state #349 | pstats #97 ikev2.ike deleted too-many-retransmits | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 349 | #97 spent 2.5 milliseconds in total | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-97" #97: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #97: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #97 "road-eastnet-nonat-97" #97: deleting IKE SA for connection 'road-eastnet-nonat-97' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-97' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-97 | State DB: deleting IKEv2 state #97 in PARENT_I1 | parent state #97: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #97 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 349 time elapsed 0.001014 seconds | libevent_free: release ptr-libevent@0x7f4974012288 | (#349) spent 1.02 milliseconds in crypto helper computing work-order 349: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | crypto helper 10 sending results from work-order 349 for state #349 to event queue | in statetime_stop() and could not find #97 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #349 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49a001d4f8 size 128 Initiating connection road-eastnet-nonat-97 which received a Delete/Notify but must remain up per local policy | crypto helper 10 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-97' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-97" | stop processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:349) | spent 0.0667 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.44351; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f498001d3e8 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #290 spent 0.087 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 349 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #349 | **emit ISAKMP Message: | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | ikev2 g^x 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | ikev2 g^x 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | ikev2 g^x 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | ikev2 g^x a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | ikev2 g^x d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | ikev2 g^x 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | ikev2 g^x df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | ikev2 g^x d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | ikev2 g^x 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | ikev2 g^x 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | ikev2 g^x 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | ikev2 g^x 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | ikev2 g^x e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | ikev2 g^x 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | ikev2 g^x b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 c4 31 20 0d fb 9e 78 54 2e b1 51 db 6a 2d 46 | IKEv2 nonce c5 cb 8a da 88 53 4f 11 07 ee 10 8f 86 4f d3 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf f8 ac 8b ac fd e9 d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 61 | natd_hash: port=500 | natd_hash: hash= b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 18 61 32 df | natd_hash: hash= 48 fc a1 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 18 61 32 df | Notify data 48 fc a1 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bf f8 ac 8b ac fd e9 d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | natd_hash: hash= c8 8a 18 c8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | Notify data c8 8a 18 c8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #349 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #349: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #349 to 4294967295 after switching state | Message ID: IKE #349 skipping update_recv as MD is fake | Message ID: sent #349 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.97:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | state #349 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498000c908 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab44f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 | #349 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.444031 | resume sending helper answer for #349 suppresed complete_v2_state_transition() and stole MD | #349 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a001d4f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0389 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.456197; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00116 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f49a001d4f8 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | libevent_free: release ptr-libevent@0x7f499c017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #336 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.460509; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | libevent_free: release ptr-libevent@0x7f497c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #321 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.478943; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f497c017b48 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | libevent_free: release ptr-libevent@0x7f499801d5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #343 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.505226; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008503 exceeds limit? YES "road-eastnet-nonat-98" #98: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-98" #98: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #350 at 0x55564da0e5d8 | State DB: adding IKEv2 state #350 in UNDEFINED | pstats #350 ikev2.ike started | Message ID: init #350: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #350: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #350; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-98" #350: initiating v2 parent SA to replace #98 | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 350 for state #350 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f499801d5d8 size 128 | #350 spent 0.115 milliseconds in ikev2_parent_outI1() | RESET processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #98 ikev2.ike failed too-many-retransmits | pstats #98 ikev2.ike deleted too-many-retransmits | #98 spent 3.08 milliseconds in total | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-98" #98: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | crypto helper 11 resuming | crypto helper 11 starting work-order 350 for state #350 | parent state #98: PARENT_I1(half-open IKE SA) => delete | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 350 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #98 "road-eastnet-nonat-98" #98: deleting IKE SA for connection 'road-eastnet-nonat-98' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-98' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-98 | State DB: deleting IKEv2 state #98 in PARENT_I1 | parent state #98: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #98 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 350 time elapsed 0.000727 seconds | libevent_free: release ptr-libevent@0x7f49b802b6f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | (#350) spent 0.731 milliseconds in crypto helper computing work-order 350: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #98 | crypto helper 11 sending results from work-order 350 for state #350 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #350 | libevent_malloc: new ptr-libevent@0x7f499401d668 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-98 which received a Delete/Notify but must remain up per local policy | crypto helper 11 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-98' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-98" | stop processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:349) | spent 0.0719 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 350 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #350 | **emit ISAKMP Message: | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | ikev2 g^x 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | ikev2 g^x a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | ikev2 g^x 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | ikev2 g^x 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | ikev2 g^x a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | ikev2 g^x 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | ikev2 g^x cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | ikev2 g^x 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | ikev2 g^x 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | ikev2 g^x 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | ikev2 g^x 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ikev2 g^x ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | ikev2 g^x be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | ikev2 g^x e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | ikev2 g^x a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f e8 30 52 e8 0a d4 90 4c 86 69 1b 3e 4a e0 af | IKEv2 nonce f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 89 9b 45 cb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 33 49 86 94 c5 85 e6 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 62 | natd_hash: port=500 | natd_hash: hash= d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 4c 40 7f cd | natd_hash: hash= 41 89 9e 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 4c 40 7f cd | Notify data 41 89 9e 73 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 33 49 86 94 c5 85 e6 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | natd_hash: hash= 49 31 09 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | Notify data 49 31 09 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #350 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #350: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #350 to 4294967295 after switching state | Message ID: IKE #350 skipping update_recv as MD is fake | Message ID: sent #350 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.98:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | state #350 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499801d5d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9edeb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f497401d568 size 128 | #350 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.506715 | resume sending helper answer for #350 suppresed complete_v2_state_transition() and stole MD | #350 spent 0.414 milliseconds in resume sending helper answer | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499401d668 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.507891; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f499401d668 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | libevent_free: release ptr-libevent@0x7f499800cbe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #291 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.525147; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #322 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.538425; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #337 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.560812; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | libevent_free: release ptr-libevent@0x7f498c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #344 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.563159; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006576 exceeds limit? YES "road-eastnet-nonat-99" #99: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-99" #99: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #351 at 0x55564da0fce8 | State DB: adding IKEv2 state #351 in UNDEFINED | pstats #351 ikev2.ike started | Message ID: init #351: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #351: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #351; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-99" #351: initiating v2 parent SA to replace #99 | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 351 for state #351 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f4998049be8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f498c01d4b8 size 128 | #351 spent 0.114 milliseconds in ikev2_parent_outI1() | RESET processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #99 ikev2.ike failed too-many-retransmits | pstats #99 ikev2.ike deleted too-many-retransmits | #99 spent 2.58 milliseconds in total | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-99" #99: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #99: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 12 resuming | picked newest_isakmp_sa #0 for #99 "road-eastnet-nonat-99" #99: deleting IKE SA for connection 'road-eastnet-nonat-99' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 12 starting work-order 351 for state #351 | add revival: connection 'road-eastnet-nonat-99' added to the list and scheduled for 0 seconds | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 351 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-99 | State DB: deleting IKEv2 state #99 in PARENT_I1 | parent state #99: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #99 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564daa2ee8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | in statetime_stop() and could not find #99 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-99 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 351 time elapsed 0.000598 seconds | (#351) spent 0.634 milliseconds in crypto helper computing work-order 351: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 351 for state #351 to event queue | scheduling resume sending helper answer for #351 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-99' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-99" | stop processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:349) | spent 0.076 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 351 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #351 | **emit ISAKMP Message: | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | ikev2 g^x 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | ikev2 g^x 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | ikev2 g^x c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | ikev2 g^x e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | ikev2 g^x 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | ikev2 g^x 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | ikev2 g^x fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | ikev2 g^x 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | ikev2 g^x 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | ikev2 g^x 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | ikev2 g^x a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ikev2 g^x ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | ikev2 g^x c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | ikev2 g^x 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | ikev2 g^x b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 6b db 37 a5 | IKEv2 nonce 5b 79 29 8e 51 03 7f 4b a5 62 39 58 e1 07 de 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad eb 12 ec 90 73 b7 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 63 | natd_hash: port=500 | natd_hash: hash= 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 6b 47 1f 57 | natd_hash: hash= bc 13 90 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 6b 47 1f 57 | Notify data bc 13 90 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad eb 12 ec 90 73 b7 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | natd_hash: hash= 04 4b 9d ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | Notify data 04 4b 9d ac | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #351 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #351: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #351 to 4294967295 after switching state | Message ID: IKE #351 skipping update_recv as MD is fake | Message ID: sent #351 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.99:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | state #351 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c01d4b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f4998049be8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f497801d998 size 128 | #351 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.564589 | resume sending helper answer for #351 suppresed complete_v2_state_transition() and stole MD | #351 spent 0.48 milliseconds in resume sending helper answer | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499801d6d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.569824; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #292 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.583165; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003725 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #323 spent 0.399 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.600781; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #338 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.622056; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006122 exceeds limit? YES "road-eastnet-nonat-100" #100: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-100" #100: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #352 at 0x55564da11468 | State DB: adding IKEv2 state #352 in UNDEFINED | pstats #352 ikev2.ike started | Message ID: init #352: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #352: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #352; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-100" #352: initiating v2 parent SA to replace #100 | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 352 for state #352 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da71a48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f49ac00ca08 size 128 | #352 spent 0.0941 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 352 for state #352 | RESET processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 352 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #100 ikev2.ike failed too-many-retransmits | pstats #100 ikev2.ike deleted too-many-retransmits | #100 spent 2.19 milliseconds in total | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-100" #100: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #100: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #100 "road-eastnet-nonat-100" #100: deleting IKE SA for connection 'road-eastnet-nonat-100' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-100' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-100 | State DB: deleting IKEv2 state #100 in PARENT_I1 | parent state #100: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #100 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498403e1a8 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 352 time elapsed 0.000928 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | (#352) spent 0.929 milliseconds in crypto helper computing work-order 352: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #100 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 sending results from work-order 352 for state #352 to event queue | scheduling resume sending helper answer for #352 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 Initiating connection road-eastnet-nonat-100 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-100' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-100" | stop processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:349) | spent 0.0885 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 352 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #352 | **emit ISAKMP Message: | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | ikev2 g^x d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | ikev2 g^x 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | ikev2 g^x e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | ikev2 g^x a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | ikev2 g^x 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | ikev2 g^x 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | ikev2 g^x 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | ikev2 g^x 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | ikev2 g^x 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ikev2 g^x ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | ikev2 g^x 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | ikev2 g^x 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | ikev2 g^x 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | ikev2 g^x 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | ikev2 g^x 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9f de 6f 2b 8d bf ca dd b1 75 b4 97 9d 63 43 25 | IKEv2 nonce 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 d0 d0 dd 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= da c5 d6 0a 78 8e d6 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 64 | natd_hash: port=500 | natd_hash: hash= 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a 26 23 31 a7 | natd_hash: hash= 4f 55 7a 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a 26 23 31 a7 | Notify data 4f 55 7a 24 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= da c5 d6 0a 78 8e d6 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | natd_hash: hash= 0b 70 7d 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | Notify data 0b 70 7d 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #352 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #352: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #352 to 4294967295 after switching state | Message ID: IKE #352 skipping update_recv as MD is fake | Message ID: sent #352 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.100:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | state #352 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac00ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da71a48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f496c01d568 size 128 | #352 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.62366 | resume sending helper answer for #352 suppresed complete_v2_state_transition() and stole MD | #352 spent 0.382 milliseconds in resume sending helper answer | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c01d5b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.632825; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #293 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.63918; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #324 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.652543; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #345 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0806 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.661942; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #339 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.683279; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008407 exceeds limit? YES "road-eastnet-nonat-101" #101: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-101" #101: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #353 at 0x55564da12be8 | State DB: adding IKEv2 state #353 in UNDEFINED | pstats #353 ikev2.ike started | Message ID: init #353: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #353: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #353; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-101" #353: initiating v2 parent SA to replace #101 | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 353 for state #353 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f49740065b8 size 128 | #353 spent 0.11 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 353 for state #353 | RESET processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 353 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #101 ikev2.ike failed too-many-retransmits | pstats #101 ikev2.ike deleted too-many-retransmits | #101 spent 2.77 milliseconds in total | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-101" #101: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #101: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #101 "road-eastnet-nonat-101" #101: deleting IKE SA for connection 'road-eastnet-nonat-101' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-101' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-101 | State DB: deleting IKEv2 state #101 in PARENT_I1 | parent state #101: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #101 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 353 time elapsed 0.001027 seconds | libevent_free: release ptr-libevent@0x55564d9c8478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | (#353) spent 1.03 milliseconds in crypto helper computing work-order 353: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #101 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 353 for state #353 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #353 Initiating connection road-eastnet-nonat-101 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f499001d5b8 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-101' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-101" | stop processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:349) | spent 0.0753 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 353 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #353 | **emit ISAKMP Message: | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | ikev2 g^x 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | ikev2 g^x b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | ikev2 g^x 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | ikev2 g^x 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | ikev2 g^x b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | ikev2 g^x 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | ikev2 g^x 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | ikev2 g^x c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | ikev2 g^x 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | ikev2 g^x 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | ikev2 g^x 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | ikev2 g^x 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | ikev2 g^x 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | ikev2 g^x 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | ikev2 g^x f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed 87 41 70 28 | IKEv2 nonce 68 7e 91 66 c5 84 28 de e0 fc 8d 73 d6 3d b7 9a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ba e0 36 e3 6e f6 31 32 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 65 | natd_hash: port=500 | natd_hash: hash= 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 9b d2 04 e7 | natd_hash: hash= 50 fc ea 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 9b d2 04 e7 | Notify data 50 fc ea 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ba e0 36 e3 6e f6 31 32 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | natd_hash: hash= c5 cb 13 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | Notify data c5 cb 13 aa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #353 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #353: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #353 to 4294967295 after switching state | Message ID: IKE #353 skipping update_recv as MD is fake | Message ID: sent #353 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.101:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | state #353 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49740065b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab0038 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f49bc020028 size 128 | #353 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.685092 | resume sending helper answer for #353 suppresed complete_v2_state_transition() and stole MD | #353 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499001d5b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.700304; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f499001d5b8 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | libevent_free: release ptr-libevent@0x7f4994012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #325 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.704593; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f4994012488 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #294 spent 0.0986 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.726847; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00193 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | libevent_free: release ptr-libevent@0x7f499000c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #340 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.051 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.741192; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006564 exceeds limit? YES "road-eastnet-nonat-102" #102: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-102" #102: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #354 at 0x55564da142f8 | State DB: adding IKEv2 state #354 in UNDEFINED | pstats #354 ikev2.ike started | Message ID: init #354: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #354: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #354; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-102" #354: initiating v2 parent SA to replace #102 | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 354 for state #354 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da98c68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f499000c908 size 128 | crypto helper 15 resuming | #354 spent 0.0893 milliseconds in ikev2_parent_outI1() | crypto helper 15 starting work-order 354 for state #354 | RESET processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 354 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #102 ikev2.ike failed too-many-retransmits | pstats #102 ikev2.ike deleted too-many-retransmits | #102 spent 2.75 milliseconds in total | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-102" #102: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #102: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #102 "road-eastnet-nonat-102" #102: deleting IKE SA for connection 'road-eastnet-nonat-102' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-102' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-102 | State DB: deleting IKEv2 state #102 in PARENT_I1 | parent state #102: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #102 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 354 time elapsed 0.000575 seconds | libevent_free: release ptr-libevent@0x7f49b8041748 | (#354) spent 0.576 milliseconds in crypto helper computing work-order 354: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | crypto helper 15 sending results from work-order 354 for state #354 to event queue | in statetime_stop() and could not find #102 | scheduling resume sending helper answer for #354 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f498401d2f8 size 128 | crypto helper 15 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-102 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-102' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-102" | stop processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:349) | spent 0.0636 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 354 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #354 | **emit ISAKMP Message: | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | ikev2 g^x b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | ikev2 g^x 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | ikev2 g^x 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | ikev2 g^x 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | ikev2 g^x 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | ikev2 g^x 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | ikev2 g^x d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | ikev2 g^x cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | ikev2 g^x 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | ikev2 g^x 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | ikev2 g^x 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | ikev2 g^x 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | ikev2 g^x 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | ikev2 g^x c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | ikev2 g^x 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 31 18 6e cf 32 57 6e cc 61 18 b3 67 54 81 27 | IKEv2 nonce e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 79 0d 63 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db cd 35 e8 4c a8 e5 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 66 | natd_hash: port=500 | natd_hash: hash= e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 25 44 61 cf | natd_hash: hash= e0 f3 26 f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 25 44 61 cf | Notify data e0 f3 26 f6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= db cd 35 e8 4c a8 e5 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | natd_hash: hash= ab 1c 67 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | Notify data ab 1c 67 e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #354 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #354: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #354 to 4294967295 after switching state | Message ID: IKE #354 skipping update_recv as MD is fake | Message ID: sent #354 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.102:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | state #354 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499000c908 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da98c68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f49b401fe78 size 128 | #354 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.742362 | resume sending helper answer for #354 suppresed complete_v2_state_transition() and stole MD | #354 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498401d2f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.745537; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f498401d2f8 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | libevent_free: release ptr-libevent@0x7f498401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #346 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.756904; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f498401d3f8 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | libevent_free: release ptr-libevent@0x7f49b0017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #295 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.777255; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f49b0017cf8 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | libevent_free: release ptr-libevent@0x7f49b800f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #326 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.80352; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005313 exceeds limit? YES "road-eastnet-nonat-103" #103: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-103" #103: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #355 at 0x55564da15a08 | State DB: adding IKEv2 state #355 in UNDEFINED | pstats #355 ikev2.ike started | Message ID: init #355: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #355: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #355; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-103" #355: initiating v2 parent SA to replace #103 | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 355 for state #355 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da78ed8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f49b800f798 size 128 | #355 spent 0.0804 milliseconds in ikev2_parent_outI1() | RESET processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #103 ikev2.ike failed too-many-retransmits | pstats #103 ikev2.ike deleted too-many-retransmits | #103 spent 3.09 milliseconds in total | crypto helper 16 resuming | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 16 starting work-order 355 for state #355 "road-eastnet-nonat-103" #103: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 355 | parent state #103: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #103 "road-eastnet-nonat-103" #103: deleting IKE SA for connection 'road-eastnet-nonat-103' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-103' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-103 | State DB: deleting IKEv2 state #103 in PARENT_I1 | parent state #103: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 355 time elapsed 0.000575 seconds | stop processing: state #103 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499403e548 | (#355) spent 0.572 milliseconds in crypto helper computing work-order 355: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 355 for state #355 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | in statetime_stop() and could not find #103 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #355 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f498801d4f8 size 128 Initiating connection road-eastnet-nonat-103 which received a Delete/Notify but must remain up per local policy | crypto helper 16 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-103' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-103" | stop processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:349) | spent 0.0671 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 355 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #355 | **emit ISAKMP Message: | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | ikev2 g^x 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | ikev2 g^x 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | ikev2 g^x 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | ikev2 g^x 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | ikev2 g^x 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | ikev2 g^x 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | ikev2 g^x 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | ikev2 g^x cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | ikev2 g^x e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ikev2 g^x ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | ikev2 g^x 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | ikev2 g^x 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | ikev2 g^x 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | ikev2 g^x 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | ikev2 g^x bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ac 74 8a 4c 44 2d 71 91 6c 59 54 0e 2e f6 28 d5 | IKEv2 nonce 81 41 ac 57 d4 af 19 3a c6 60 74 cf 66 c5 2e e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8e ed 3f f1 12 1b f4 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 67 | natd_hash: port=500 | natd_hash: hash= 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 a2 97 35 19 | natd_hash: hash= 8a 69 32 ce | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 a2 97 35 19 | Notify data 8a 69 32 ce | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8e ed 3f f1 12 1b f4 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | natd_hash: hash= e3 ee ad 86 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | Notify data e3 ee ad 86 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #355 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #355: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #355 to 4294967295 after switching state | Message ID: IKE #355 skipping update_recv as MD is fake | Message ID: sent #355 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.103:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | state #355 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b800f798 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da78ed8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f49b801ffe8 size 128 | #355 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.804706 | resume sending helper answer for #355 suppresed complete_v2_state_transition() and stole MD | #355 spent 0.33 milliseconds in resume sending helper answer | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498801d4f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.816917; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f498801d4f8 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #341 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.819194; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #296 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.824526; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | libevent_free: release ptr-libevent@0x7f498801d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #347 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.832868; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003459 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f498801d3f8 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | libevent_free: release ptr-libevent@0x7f49bc01a8b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #327 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.869219; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00586 exceeds limit? YES "road-eastnet-nonat-104" #104: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-104" #104: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #356 at 0x55564da17118 | State DB: adding IKEv2 state #356 in UNDEFINED | pstats #356 ikev2.ike started | Message ID: init #356: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #356: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #356; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-104" #356: initiating v2 parent SA to replace #104 | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 356 for state #356 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b27d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f49bc01a8b8 size 128 | #356 spent 0.0821 milliseconds in ikev2_parent_outI1() | RESET processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 356 for state #356 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 356 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #104 ikev2.ike failed too-many-retransmits | pstats #104 ikev2.ike deleted too-many-retransmits | #104 spent 3.07 milliseconds in total | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-104" #104: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #104: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #104 "road-eastnet-nonat-104" #104: deleting IKE SA for connection 'road-eastnet-nonat-104' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-104' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-104 | State DB: deleting IKEv2 state #104 in PARENT_I1 | parent state #104: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #104 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49ac043b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | in statetime_stop() and could not find #104 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-104 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-104' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-104" | stop processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:349) | spent 0.0871 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 356 time elapsed 0.000832 seconds | (#356) spent 0.847 milliseconds in crypto helper computing work-order 356: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 356 for state #356 to event queue | scheduling resume sending helper answer for #356 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 356 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #356 | **emit ISAKMP Message: | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | ikev2 g^x 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | ikev2 g^x 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ikev2 g^x ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | ikev2 g^x 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | ikev2 g^x c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | ikev2 g^x 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | ikev2 g^x 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | ikev2 g^x 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | ikev2 g^x 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | ikev2 g^x 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | ikev2 g^x 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | ikev2 g^x 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | ikev2 g^x d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | ikev2 g^x 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | ikev2 g^x 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 32 5a 61 bd | IKEv2 nonce 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 24 96 6d 33 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 69 49 3b ce df c3 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 68 | natd_hash: port=500 | natd_hash: hash= 30 86 78 39 96 56 7d a1 51 cb ce 04 24 6e 64 86 | natd_hash: hash= 43 cf c3 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 86 78 39 96 56 7d a1 51 cb ce 04 24 6e 64 86 | Notify data 43 cf c3 a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 69 49 3b ce df c3 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | natd_hash: hash= 2e aa 2d 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | Notify data 2e aa 2d 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #356 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #356: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #356 to 4294967295 after switching state | Message ID: IKE #356 skipping update_recv as MD is fake | Message ID: sent #356 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.104:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | state #356 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc01a8b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b27d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f49ac022d28 size 128 | #356 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.871197 | resume sending helper answer for #356 suppresed complete_v2_state_transition() and stole MD | #356 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c01d5b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.880389; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #297 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.883692; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #348 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.89498; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #342 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.916333; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #328 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.930612; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007664 exceeds limit? YES "road-eastnet-nonat-105" #105: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-105" #105: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #357 at 0x55564da18898 | State DB: adding IKEv2 state #357 in UNDEFINED | pstats #357 ikev2.ike started | Message ID: init #357: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #357: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #357; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-105" #357: initiating v2 parent SA to replace #105 | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 357 for state #357 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dad2d68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 | #357 spent 0.117 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 357 for state #357 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 357 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 357 time elapsed 0.000992 seconds | (#357) spent 0.992 milliseconds in crypto helper computing work-order 357: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 357 for state #357 to event queue | scheduling resume sending helper answer for #357 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 | crypto helper 3 waiting (nothing to do) | RESET processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #105 ikev2.ike failed too-many-retransmits | pstats #105 ikev2.ike deleted too-many-retransmits | #105 spent 2.05 milliseconds in total | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-105" #105: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #105: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #105 "road-eastnet-nonat-105" #105: deleting IKE SA for connection 'road-eastnet-nonat-105' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-105' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-105 | State DB: deleting IKEv2 state #105 in PARENT_I1 | parent state #105: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #105 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da39558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | in statetime_stop() and could not find #105 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 357 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #357 | **emit ISAKMP Message: | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | ikev2 g^x 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | ikev2 g^x 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | ikev2 g^x dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | ikev2 g^x 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | ikev2 g^x 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | ikev2 g^x 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | ikev2 g^x 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | ikev2 g^x a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | ikev2 g^x 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | ikev2 g^x d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | ikev2 g^x 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | ikev2 g^x c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | ikev2 g^x 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | ikev2 g^x 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | ikev2 g^x 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 62 40 9a d1 | IKEv2 nonce 24 47 e4 af 5c 71 e7 18 68 06 9d 81 13 a3 92 29 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7c 39 37 2c e6 b6 e5 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 69 | natd_hash: port=500 | natd_hash: hash= 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 24 36 41 6b | natd_hash: hash= 2c 3f 64 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 24 36 41 6b | Notify data 2c 3f 64 a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7c 39 37 2c e6 b6 e5 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | natd_hash: hash= 20 96 e2 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | Notify data 20 96 e2 55 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #357 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #357: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #357 to 4294967295 after switching state | Message ID: IKE #357 skipping update_recv as MD is fake | Message ID: sent #357 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.105:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | state #357 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dad2d68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f49b0023598 size 128 | #357 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.932448 | resume sending helper answer for #357 suppresed complete_v2_state_transition() and stole MD | #357 spent 0.496 milliseconds in resume sending helper answer | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498001d4e8 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-105 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-105' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-105" | stop processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:349) | spent 0.0745 milliseconds in global timer EVENT_REVIVE_CONNS recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10646.941741; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #298 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10646.944133; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500102 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #349 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10646.977561; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002475 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #329 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10646.982808; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | libevent_free: release ptr-libevent@0x7f497c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #343 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10646.988188; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006232 exceeds limit? YES "road-eastnet-nonat-106" #106: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-106" #106: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #358 at 0x55564da19fa8 | State DB: adding IKEv2 state #358 in UNDEFINED | pstats #358 ikev2.ike started | Message ID: init #358: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #358: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #358; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-106" #358: initiating v2 parent SA to replace #106 | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 358 for state #358 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d0e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f497c017b48 size 128 | #358 spent 0.121 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | crypto helper 17 starting work-order 358 for state #358 | RESET processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 358 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #106 ikev2.ike failed too-many-retransmits | pstats #106 ikev2.ike deleted too-many-retransmits | #106 spent 2.27 milliseconds in total | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-106" #106: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #106: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #106 "road-eastnet-nonat-106" #106: deleting IKE SA for connection 'road-eastnet-nonat-106' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-106' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-106 | State DB: deleting IKEv2 state #106 in PARENT_I1 | parent state #106: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 358 time elapsed 0.001012 seconds | (#358) spent 0.992 milliseconds in crypto helper computing work-order 358: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 358 for state #358 to event queue | scheduling resume sending helper answer for #358 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 | crypto helper 17 waiting (nothing to do) | stop processing: state #106 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da6a748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | in statetime_stop() and could not find #106 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-106 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-106' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-106" | stop processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:349) | spent 0.0714 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 358 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #358 | **emit ISAKMP Message: | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | ikev2 g^x dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | ikev2 g^x 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | ikev2 g^x 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | ikev2 g^x 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | ikev2 g^x 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | ikev2 g^x 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | ikev2 g^x 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | ikev2 g^x e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | ikev2 g^x a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | ikev2 g^x 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | ikev2 g^x c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | ikev2 g^x 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | ikev2 g^x 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | ikev2 g^x 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | ikev2 g^x a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 64 60 5c 0f | IKEv2 nonce d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 59 75 3e 4f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 29 5f 07 28 12 83 21 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6a | natd_hash: port=500 | natd_hash: hash= de ce 72 2e 86 30 a8 0a 95 a3 97 00 1b 6e dd cc | natd_hash: hash= d7 04 66 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de ce 72 2e 86 30 a8 0a 95 a3 97 00 1b 6e dd cc | Notify data d7 04 66 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 29 5f 07 28 12 83 21 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | natd_hash: hash= c6 9a d6 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | Notify data c6 9a d6 bf | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #358 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #358: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #358 to 4294967295 after switching state | Message ID: IKE #358 skipping update_recv as MD is fake | Message ID: sent #358 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.106:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | state #358 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c017b48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d0e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f49a4022c68 size 128 | #358 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10646.99002 | resume sending helper answer for #358 suppresed complete_v2_state_transition() and stole MD | #358 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974012288 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.000228; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #299 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.007561; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | libevent_free: release ptr-libevent@0x7f497401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #350 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.036834; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f497401d568 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | libevent_free: release ptr-libevent@0x7f49b8009dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #330 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0777 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.048201; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006315 exceeds limit? YES "road-eastnet-nonat-107" #107: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-107" #107: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #359 at 0x55564da1b728 | State DB: adding IKEv2 state #359 in UNDEFINED | pstats #359 ikev2.ike started | Message ID: init #359: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #359: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #359; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-107" #359: initiating v2 parent SA to replace #107 | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 359 for state #359 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da46368 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f49b8009dc8 size 128 | #359 spent 0.101 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | RESET processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 starting work-order 359 for state #359 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 359 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 359 time elapsed 0.000911 seconds | (#359) spent 0.92 milliseconds in crypto helper computing work-order 359: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 359 for state #359 to event queue | scheduling resume sending helper answer for #359 | libevent_malloc: new ptr-libevent@0x7f497801d898 size 128 | crypto helper 18 waiting (nothing to do) | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #107 ikev2.ike failed too-many-retransmits | pstats #107 ikev2.ike deleted too-many-retransmits | #107 spent 2.58 milliseconds in total | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-107" #107: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #107: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #107 "road-eastnet-nonat-107" #107: deleting IKE SA for connection 'road-eastnet-nonat-107' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-107' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-107 | State DB: deleting IKEv2 state #107 in PARENT_I1 | parent state #107: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #107 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a80333d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | in statetime_stop() and could not find #107 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 359 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #359 | **emit ISAKMP Message: | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | ikev2 g^x 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | ikev2 g^x 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | ikev2 g^x 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | ikev2 g^x 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | ikev2 g^x d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | ikev2 g^x 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | ikev2 g^x 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | ikev2 g^x 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ikev2 g^x ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | ikev2 g^x 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | ikev2 g^x 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | ikev2 g^x dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | ikev2 g^x e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | ikev2 g^x 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | ikev2 g^x 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 10 a2 10 a0 | IKEv2 nonce 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 33 9a fd 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 e6 9e 2f a7 8a 52 c1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6b | natd_hash: port=500 | natd_hash: hash= 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d c1 30 8d cc | natd_hash: hash= 08 55 00 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d c1 30 8d cc | Notify data 08 55 00 21 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 e6 9e 2f a7 8a 52 c1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | natd_hash: hash= 2d 0c 56 f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | Notify data 2d 0c 56 f6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #359 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #359: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #359 to 4294967295 after switching state | Message ID: IKE #359 skipping update_recv as MD is fake | Message ID: sent #359 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.107:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | state #359 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8009dc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da46368 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f49a8022df8 size 128 | #359 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.049911 | resume sending helper answer for #359 suppresed complete_v2_state_transition() and stole MD | #359 spent 0.489 milliseconds in resume sending helper answer | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497801d898 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-107 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-107' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-107" | stop processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:349) | spent 0.0746 milliseconds in global timer EVENT_REVIVE_CONNS recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.061214; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001441 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f497801d898 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #344 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.061412; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #300 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.065766; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | libevent_free: release ptr-libevent@0x7f497801d998 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #351 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.097093; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002784 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f497801d998 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | libevent_free: release ptr-libevent@0x7f4978018128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #331 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.10844; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005756 exceeds limit? YES "road-eastnet-nonat-108" #108: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-108" #108: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #360 at 0x55564da1cea8 | State DB: adding IKEv2 state #360 in UNDEFINED | pstats #360 ikev2.ike started | Message ID: init #360: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #360: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #360; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-108" #360: initiating v2 parent SA to replace #108 | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 360 for state #360 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da066c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f4978018128 size 128 | #360 spent 0.106 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 360 for state #360 | RESET processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 360 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #108 ikev2.ike failed too-many-retransmits | pstats #108 ikev2.ike deleted too-many-retransmits | #108 spent 2.42 milliseconds in total | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-108" #108: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #108: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #108 "road-eastnet-nonat-108" #108: deleting IKE SA for connection 'road-eastnet-nonat-108' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-108' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-108 | State DB: deleting IKEv2 state #108 in PARENT_I1 | parent state #108: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #108 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 360 time elapsed 0.000706 seconds | libevent_free: release ptr-libevent@0x55564da10928 | (#360) spent 0.696 milliseconds in crypto helper computing work-order 360: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | crypto helper 19 sending results from work-order 360 for state #360 to event queue | in statetime_stop() and could not find #108 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #360 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 19 waiting (nothing to do) Initiating connection road-eastnet-nonat-108 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-108' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-108" | stop processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:349) | spent 0.072 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 360 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #360 | **emit ISAKMP Message: | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | ikev2 g^x 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | ikev2 g^x bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | ikev2 g^x 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | ikev2 g^x 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | ikev2 g^x 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ikev2 g^x ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | ikev2 g^x 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | ikev2 g^x 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | ikev2 g^x 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | ikev2 g^x fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | ikev2 g^x 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | ikev2 g^x 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | ikev2 g^x 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | ikev2 g^x 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | ikev2 g^x 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a0 6e 02 2d a4 cb 94 61 26 37 dc fa 9f 3f 80 f9 | IKEv2 nonce 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 d0 1f 99 72 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3b 7b e0 62 58 06 77 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6c | natd_hash: port=500 | natd_hash: hash= a2 db 23 e3 21 e7 55 ba 5b 29 27 bf 14 6a e2 dd | natd_hash: hash= b1 d7 27 c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 db 23 e3 21 e7 55 ba 5b 29 27 bf 14 6a e2 dd | Notify data b1 d7 27 c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3b 7b e0 62 58 06 77 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | natd_hash: hash= 58 c4 47 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | Notify data 58 c4 47 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #360 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #360: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #360 to 4294967295 after switching state | Message ID: IKE #360 skipping update_recv as MD is fake | Message ID: sent #360 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.108:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | state #360 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4978018128 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da066c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f499c022c68 size 128 | #360 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.109785 | resume sending helper answer for #360 suppresed complete_v2_state_transition() and stole MD | #360 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c01d468 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0865 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.121014; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #301 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.124298; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | libevent_free: release ptr-libevent@0x7f496c01d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #352 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.153579; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f496c01d568 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #345 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.160895; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | libevent_free: release ptr-libevent@0x7f49b001d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #332 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.170291; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009041 exceeds limit? YES "road-eastnet-nonat-109" #109: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-109" #109: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #361 at 0x55564da1e628 | State DB: adding IKEv2 state #361 in UNDEFINED | pstats #361 ikev2.ike started | Message ID: init #361: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #361: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #361; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-109" #361: initiating v2 parent SA to replace #109 | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 361 for state #361 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f49b001d668 size 128 | #361 spent 0.0817 milliseconds in ikev2_parent_outI1() | RESET processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #109 ikev2.ike failed too-many-retransmits | pstats #109 ikev2.ike deleted too-many-retransmits | crypto helper 0 starting work-order 361 for state #361 | #109 spent 2.12 milliseconds in total | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 361 | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-109" #109: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #109: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #109 "road-eastnet-nonat-109" #109: deleting IKE SA for connection 'road-eastnet-nonat-109' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-109' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-109 | State DB: deleting IKEv2 state #109 in PARENT_I1 | parent state #109: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #109 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 361 time elapsed 0.001008 seconds | libevent_free: release ptr-libevent@0x55564da120a8 | (#361) spent 1.02 milliseconds in crypto helper computing work-order 361: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | crypto helper 0 sending results from work-order 361 for state #361 to event queue | in statetime_stop() and could not find #109 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #361 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 Initiating connection road-eastnet-nonat-109 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-109' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | crypto helper 0 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-109" | stop processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:349) | spent 0.0697 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 361 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #361 | **emit ISAKMP Message: | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | ikev2 g^x 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | ikev2 g^x b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | ikev2 g^x 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | ikev2 g^x 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | ikev2 g^x b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | ikev2 g^x 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | ikev2 g^x 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | ikev2 g^x e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | ikev2 g^x 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | ikev2 g^x c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | ikev2 g^x f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | ikev2 g^x 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | ikev2 g^x 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | ikev2 g^x 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | ikev2 g^x 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d ff a3 08 99 dd 51 0b 33 80 a5 7e 55 cd 97 bb | IKEv2 nonce 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 d7 ee 11 29 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 9b ca b4 57 7b d8 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6d | natd_hash: port=500 | natd_hash: hash= 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c 70 ee 1a 73 | natd_hash: hash= f0 62 5d 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c 70 ee 1a 73 | Notify data f0 62 5d 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 9b ca b4 57 7b d8 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | natd_hash: hash= b1 67 8f ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | Notify data b1 67 8f ea | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #361 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #361: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #361 to 4294967295 after switching state | Message ID: IKE #361 skipping update_recv as MD is fake | Message ID: sent #361 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.109:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | state #361 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b001d668 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f49a0022bb8 size 128 | #361 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.171922 | resume sending helper answer for #361 suppresed complete_v2_state_transition() and stole MD | #361 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc01ff28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.183118; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.000843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #302 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.18539; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | libevent_free: release ptr-libevent@0x7f49bc020028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #353 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.241782; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f49bc020028 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #303 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.24311; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | libevent_free: release ptr-libevent@0x7f49b401fe78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #354 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.243221; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005948 exceeds limit? YES "road-eastnet-nonat-110" #110: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-110" #110: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #362 at 0x55564da1fda8 | State DB: adding IKEv2 state #362 in UNDEFINED | pstats #362 ikev2.ike started | Message ID: init #362: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #362: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #362; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-110" #362: initiating v2 parent SA to replace #110 | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 362 for state #362 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da98c68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f49b401fe78 size 128 | #362 spent 0.0796 milliseconds in ikev2_parent_outI1() | RESET processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 362 for state #362 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 362 | pstats #110 ikev2.ike failed too-many-retransmits | pstats #110 ikev2.ike deleted too-many-retransmits | #110 spent 4.59 milliseconds in total | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-110" #110: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #110: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #110 "road-eastnet-nonat-110" #110: deleting IKE SA for connection 'road-eastnet-nonat-110' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-110' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-110 | State DB: deleting IKEv2 state #110 in PARENT_I1 | parent state #110: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #110 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 362 time elapsed 0.000561 seconds | libevent_free: release ptr-libevent@0x55564da41f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | in statetime_stop() and could not find #110 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#362) spent 0.557 milliseconds in crypto helper computing work-order 362: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 362 for state #362 to event queue | scheduling resume sending helper answer for #362 recvmsg: received truncated IKE packet (MSG_TRUNC) | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 | **parse ISAKMP Message (raw): | crypto helper 2 waiting (nothing to do) | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-110 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-110' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-110" | stop processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:349) | spent 0.0769 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 362 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #362 | **emit ISAKMP Message: | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | ikev2 g^x d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | ikev2 g^x 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | ikev2 g^x 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | ikev2 g^x dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | ikev2 g^x 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | ikev2 g^x fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | ikev2 g^x 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | ikev2 g^x 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | ikev2 g^x c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | ikev2 g^x df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | ikev2 g^x 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | ikev2 g^x 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | ikev2 g^x b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | ikev2 g^x 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | ikev2 g^x 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 28 39 61 32 | IKEv2 nonce 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 d3 3b 88 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 d6 ce c2 63 d5 0b 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6e | natd_hash: port=500 | natd_hash: hash= 6c 91 f1 7f db 76 53 61 38 5c 1e 2c a8 41 96 f4 | natd_hash: hash= e7 ad 1b 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 91 f1 7f db 76 53 61 38 5c 1e 2c a8 41 96 f4 | Notify data e7 ad 1b 1e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 72 d6 ce c2 63 d5 0b 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | natd_hash: hash= 3f d2 76 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | Notify data 3f d2 76 33 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #362 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #362: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #362 to 4294967295 after switching state | Message ID: IKE #362 skipping update_recv as MD is fake | Message ID: sent #362 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.110:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | state #362 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b401fe78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da98c68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f4994022dd8 size 128 | #362 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.244472 | resume sending helper answer for #362 suppresed complete_v2_state_transition() and stole MD | #362 spent 0.371 milliseconds in resume sending helper answer | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b401fd78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.246628; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | libevent_free: release ptr-libevent@0x7f498401d2f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #346 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.247925; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002738 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f498401d2f8 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #333 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.30319; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | libevent_free: release ptr-libevent@0x7f49a4017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #304 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.305563; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f49a4017a98 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | libevent_free: release ptr-libevent@0x7f49b801ffe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #355 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.306933; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f49b801ffe8 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | libevent_free: release ptr-libevent@0x7f4984017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #334 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.318299; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006459 exceeds limit? YES "road-eastnet-nonat-111" #111: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-111" #111: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #363 at 0x55564da21528 | State DB: adding IKEv2 state #363 in UNDEFINED | pstats #363 ikev2.ike started | Message ID: init #363: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #363: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #363; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-111" #363: initiating v2 parent SA to replace #111 | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 363 for state #363 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f4984017c48 size 128 | #363 spent 0.0821 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 363 for state #363 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 363 | RESET processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #111 ikev2.ike failed too-many-retransmits | pstats #111 ikev2.ike deleted too-many-retransmits | #111 spent 4.39 milliseconds in total | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-111" #111: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #111: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #111 "road-eastnet-nonat-111" #111: deleting IKE SA for connection 'road-eastnet-nonat-111' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-111' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-111 | State DB: deleting IKEv2 state #111 in PARENT_I1 | parent state #111: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #111 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 363 time elapsed 0.000985 seconds | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | in statetime_stop() and could not find #111 | (#363) spent 0.988 milliseconds in crypto helper computing work-order 363: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 4 sending results from work-order 363 for state #363 to event queue | scheduling resume sending helper answer for #363 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 | crypto helper 4 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-111 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-111' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-111" | stop processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:349) | spent 0.0729 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 363 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #363 | **emit ISAKMP Message: | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | ikev2 g^x 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | ikev2 g^x b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | ikev2 g^x 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | ikev2 g^x 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | ikev2 g^x 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | ikev2 g^x 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | ikev2 g^x 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | ikev2 g^x 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | ikev2 g^x a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | ikev2 g^x 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | ikev2 g^x 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | ikev2 g^x c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | ikev2 g^x c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | ikev2 g^x 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | ikev2 g^x 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 45 1a 62 0e f9 ee 00 24 16 74 11 c7 cd 39 b4 ec | IKEv2 nonce 52 5b 27 06 25 49 55 19 3c 65 98 e2 12 fa a5 90 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad ae 09 cc b2 84 c7 e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6f | natd_hash: port=500 | natd_hash: hash= f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 b1 be 09 85 | natd_hash: hash= e6 e0 fb cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 b1 be 09 85 | Notify data e6 e0 fb cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad ae 09 cc b2 84 c7 e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | natd_hash: hash= 2f b5 df 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | Notify data 2f b5 df 4b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #363 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #363: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #363 to 4294967295 after switching state | Message ID: IKE #363 skipping update_recv as MD is fake | Message ID: sent #363 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.111:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | state #363 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984017c48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae4418 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 | #363 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.320027 | resume sending helper answer for #363 suppresed complete_v2_state_transition() and stole MD | #363 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8041748 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.32521; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #347 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.363506; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #305 spent 0.352 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.371833; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | libevent_free: release ptr-libevent@0x7f4988017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #335 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.371974; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f4988017c48 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | libevent_free: release ptr-libevent@0x7f49ac022d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #356 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.379838; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007756 exceeds limit? YES "road-eastnet-nonat-112" #112: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-112" #112: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #364 at 0x55564da22ca8 | State DB: adding IKEv2 state #364 in UNDEFINED | pstats #364 ikev2.ike started | Message ID: init #364: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #364: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #364; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-112" #364: initiating v2 parent SA to replace #112 | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 364 for state #364 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b27d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f49ac022d28 size 128 | #364 spent 0.0996 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 364 for state #364 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 364 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 364 time elapsed 0.000972 seconds | (#364) spent 0.97 milliseconds in crypto helper computing work-order 364: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 364 for state #364 to event queue | scheduling resume sending helper answer for #364 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 | crypto helper 5 waiting (nothing to do) | RESET processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #112 ikev2.ike failed too-many-retransmits | pstats #112 ikev2.ike deleted too-many-retransmits | #112 spent 2.44 milliseconds in total | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-112" #112: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #112: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #112 "road-eastnet-nonat-112" #112: deleting IKE SA for connection 'road-eastnet-nonat-112' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-112' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-112 | State DB: deleting IKEv2 state #112 in PARENT_I1 | parent state #112: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #112 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4998043b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | in statetime_stop() and could not find #112 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 364 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #364 | **emit ISAKMP Message: | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | ikev2 g^x cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | ikev2 g^x de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | ikev2 g^x 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | ikev2 g^x 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | ikev2 g^x 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | ikev2 g^x c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | ikev2 g^x 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | ikev2 g^x 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | ikev2 g^x 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | ikev2 g^x 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | ikev2 g^x 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ikev2 g^x ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | ikev2 g^x aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | ikev2 g^x 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | ikev2 g^x 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 0b c2 c3 3d | IKEv2 nonce 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 5c 4e bd 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d0 dc c3 a7 20 00 b5 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 70 | natd_hash: port=500 | natd_hash: hash= 94 3a bd 0a dc df 45 d2 3c e9 40 54 a2 47 06 3b | natd_hash: hash= 54 a8 a9 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 3a bd 0a dc df 45 d2 3c e9 40 54 a2 47 06 3b | Notify data 54 a8 a9 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d0 dc c3 a7 20 00 b5 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | natd_hash: hash= 3b cc 4a 79 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | Notify data 3b cc 4a 79 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #364 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #364: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #364 to 4294967295 after switching state | Message ID: IKE #364 skipping update_recv as MD is fake | Message ID: sent #364 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.112:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | state #364 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac022d28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b27d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f498c022c78 size 128 | #364 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.381589 | resume sending helper answer for #364 suppresed complete_v2_state_transition() and stole MD | #364 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac022e28 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-112 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-112' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-112" | stop processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:349) | spent 0.0642 milliseconds in global timer EVENT_REVIVE_CONNS recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.384804; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #348 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.433142; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | libevent_free: release ptr-libevent@0x7f49b0023598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #357 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.44041; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008717 exceeds limit? YES "road-eastnet-nonat-113" #113: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-113" #113: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #365 at 0x55564da24428 | State DB: adding IKEv2 state #365 in UNDEFINED | pstats #365 ikev2.ike started | Message ID: init #365: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #365: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #365; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-113" #365: initiating v2 parent SA to replace #113 | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 365 for state #365 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dad2d68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f49b0023598 size 128 | crypto helper 6 resuming | crypto helper 6 starting work-order 365 for state #365 | #365 spent 0.0771 milliseconds in ikev2_parent_outI1() | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 365 | RESET processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #113 ikev2.ike failed too-many-retransmits | pstats #113 ikev2.ike deleted too-many-retransmits | #113 spent 2.25 milliseconds in total | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-113" #113: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #113: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #113 "road-eastnet-nonat-113" #113: deleting IKE SA for connection 'road-eastnet-nonat-113' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-113' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-113 | State DB: deleting IKEv2 state #113 in PARENT_I1 | parent state #113: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #113 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499002da88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | in statetime_stop() and could not find #113 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-113 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-113' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-113" | stop processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:349) | spent 0.0697 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 365 time elapsed 0.001109 seconds | (#365) spent 1.11 milliseconds in crypto helper computing work-order 365: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 365 for state #365 to event queue | scheduling resume sending helper answer for #365 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 365 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #365 | **emit ISAKMP Message: | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | ikev2 g^x bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | ikev2 g^x fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | ikev2 g^x 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | ikev2 g^x bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | ikev2 g^x 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | ikev2 g^x 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | ikev2 g^x 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | ikev2 g^x bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | ikev2 g^x b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | ikev2 g^x cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ikev2 g^x ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | ikev2 g^x d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | ikev2 g^x 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | ikev2 g^x 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | ikev2 g^x 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 08 55 68 12 ed 18 3a 3b dc a6 3a 71 14 6d c1 04 | IKEv2 nonce ed 8b ae 02 38 34 1d 40 89 a3 cc 77 62 a5 ef 9f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 fa 9f a7 cb 8e 88 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 71 | natd_hash: port=500 | natd_hash: hash= ab 22 70 92 4e bc e3 3a 16 cc 0e 3f 68 1d fe 8c | natd_hash: hash= b1 06 0d bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab 22 70 92 4e bc e3 3a 16 cc 0e 3f 68 1d fe 8c | Notify data b1 06 0d bf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 fa 9f a7 cb 8e 88 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | natd_hash: hash= 37 b2 25 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | Notify data 37 b2 25 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #365 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #365: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #365 to 4294967295 after switching state | Message ID: IKE #365 skipping update_recv as MD is fake | Message ID: sent #365 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.113:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | state #365 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0023598 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dad2d68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f4990022bb8 size 128 | #365 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.442025 | resume sending helper answer for #365 suppresed complete_v2_state_transition() and stole MD | #365 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0012388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.445193; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #349 spent 0.0846 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.453447; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003788 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #306 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.457733; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | libevent_free: release ptr-libevent@0x7f49a001d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #336 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.490012; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f49a001d4f8 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | libevent_free: release ptr-libevent@0x7f49a4022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #358 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.496303; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005198 exceeds limit? YES "road-eastnet-nonat-114" #114: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-114" #114: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #366 at 0x55564da25ba8 | State DB: adding IKEv2 state #366 in UNDEFINED | pstats #366 ikev2.ike started | Message ID: init #366: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #366: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #366; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-114" #366: initiating v2 parent SA to replace #114 | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 366 for state #366 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d0e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f49a4022c68 size 128 | #366 spent 0.0781 milliseconds in ikev2_parent_outI1() | RESET processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #114 ikev2.ike failed too-many-retransmits | pstats #114 ikev2.ike deleted too-many-retransmits | #114 spent 2.88 milliseconds in total | crypto helper 7 resuming | crypto helper 7 starting work-order 366 for state #366 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 366 | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-114" #114: deleting state (STATE_PARENT_I1) aged 64.006s and NOT sending notification | parent state #114: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #114 "road-eastnet-nonat-114" #114: deleting IKE SA for connection 'road-eastnet-nonat-114' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-114' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-114 | State DB: deleting IKEv2 state #114 in PARENT_I1 | parent state #114: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 366 time elapsed 0.000594 seconds | stop processing: state #114 from 192.1.2.23 (in delete_state() at state.c:1143) | (#366) spent 0.601 milliseconds in crypto helper computing work-order 366: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x55564dacba18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | in statetime_stop() and could not find #114 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 7 sending results from work-order 366 for state #366 to event queue | scheduling resume sending helper answer for #366 | libevent_malloc: new ptr-libevent@0x7f49a4022b68 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 7 waiting (nothing to do) Initiating connection road-eastnet-nonat-114 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-114' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-114" | stop processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:349) | spent 0.0745 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 366 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #366 | **emit ISAKMP Message: | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | ikev2 g^x 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | ikev2 g^x 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | ikev2 g^x 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | ikev2 g^x 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | ikev2 g^x fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | ikev2 g^x 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | ikev2 g^x 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | ikev2 g^x 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | ikev2 g^x a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | ikev2 g^x 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | ikev2 g^x 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ikev2 g^x ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | ikev2 g^x a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | ikev2 g^x a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | ikev2 g^x 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 21 09 96 95 7d da 5e 13 bc c4 85 ff de 6f 42 | IKEv2 nonce d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 cd 51 52 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f7 81 d9 2d 82 87 25 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 72 | natd_hash: port=500 | natd_hash: hash= 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 2a a2 81 d4 | natd_hash: hash= c2 24 86 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 2a a2 81 d4 | Notify data c2 24 86 cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f7 81 d9 2d 82 87 25 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | natd_hash: hash= 41 af 8c 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | Notify data 41 af 8c 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #366 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #366: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #366 to 4294967295 after switching state | Message ID: IKE #366 skipping update_recv as MD is fake | Message ID: sent #366 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.114:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | state #366 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4022c68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d0e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f4984022c68 size 128 | #366 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.497505 | resume sending helper answer for #366 suppresed complete_v2_state_transition() and stole MD | #366 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4022b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.508676; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f49a4022b68 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #350 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.514173; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #307 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.539521; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #337 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.550844; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | libevent_free: release ptr-libevent@0x7f49a8022df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #359 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.557182; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006242 exceeds limit? YES "road-eastnet-nonat-115" #115: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-115" #115: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #367 at 0x55564da272b8 | State DB: adding IKEv2 state #367 in UNDEFINED | pstats #367 ikev2.ike started | Message ID: init #367: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #367: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #367; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-115" #367: initiating v2 parent SA to replace #115 | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 367 for state #367 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da46368 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f49a8022df8 size 128 | #367 spent 0.0764 milliseconds in ikev2_parent_outI1() | RESET processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 367 for state #367 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 367 | pstats #115 ikev2.ike failed too-many-retransmits | pstats #115 ikev2.ike deleted too-many-retransmits | #115 spent 3.23 milliseconds in total | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-115" #115: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #115: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #115 "road-eastnet-nonat-115" #115: deleting IKE SA for connection 'road-eastnet-nonat-115' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-115' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-115 | State DB: deleting IKEv2 state #115 in PARENT_I1 | parent state #115: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #115 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 367 time elapsed 0.000731 seconds | libevent_free: release ptr-libevent@0x55564dacd198 | (#367) spent 0.715 milliseconds in crypto helper computing work-order 367: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 367 for state #367 to event queue | scheduling resume sending helper answer for #367 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | in statetime_stop() and could not find #115 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49a8022cf8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 8 waiting (nothing to do) Initiating connection road-eastnet-nonat-115 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-115' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-115" | stop processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:349) | spent 0.0728 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 367 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #367 | **emit ISAKMP Message: | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | ikev2 g^x 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | ikev2 g^x e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | ikev2 g^x f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | ikev2 g^x 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | ikev2 g^x 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | ikev2 g^x 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | ikev2 g^x 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | ikev2 g^x 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | ikev2 g^x 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | ikev2 g^x bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | ikev2 g^x f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | ikev2 g^x 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | ikev2 g^x dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | ikev2 g^x 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | ikev2 g^x e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af b0 55 47 4b aa 7a e3 68 9d 12 06 80 d5 ca d4 | IKEv2 nonce c2 00 3e 35 b6 36 aa a1 17 32 49 37 82 05 08 cc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f7 d5 14 4e 02 47 da 15 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 73 | natd_hash: port=500 | natd_hash: hash= 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 3a 17 26 42 | natd_hash: hash= 63 ec 2f d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 3a 17 26 42 | Notify data 63 ec 2f d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f7 d5 14 4e 02 47 da 15 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | natd_hash: hash= 25 4e b3 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | Notify data 25 4e b3 65 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #367 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #367: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #367 to 4294967295 after switching state | Message ID: IKE #367 skipping update_recv as MD is fake | Message ID: sent #367 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.115:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | state #367 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8022df8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da46368 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 | #367 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.558497 | resume sending helper answer for #367 suppresed complete_v2_state_transition() and stole MD | #367 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8022cf8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.566679; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f49a8022cf8 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #351 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.569958; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #308 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.601218; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #338 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.610481; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | libevent_free: release ptr-libevent@0x7f499c022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #360 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.61889; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008531 exceeds limit? YES "road-eastnet-nonat-116" #116: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-116" #116: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #368 at 0x55564da28ac8 | State DB: adding IKEv2 state #368 in UNDEFINED | pstats #368 ikev2.ike started | Message ID: init #368: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #368: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #368; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-116" #368: initiating v2 parent SA to replace #116 | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 368 for state #368 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da066c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f499c022c68 size 128 | #368 spent 0.0751 milliseconds in ikev2_parent_outI1() | RESET processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #116 ikev2.ike failed too-many-retransmits | pstats #116 ikev2.ike deleted too-many-retransmits | #116 spent 2.88 milliseconds in total | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-116" #116: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #116: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #116 "road-eastnet-nonat-116" #116: deleting IKE SA for connection 'road-eastnet-nonat-116' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-116' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-116 | State DB: deleting IKEv2 state #116 in PARENT_I1 | parent state #116: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 resuming | crypto helper 9 starting work-order 368 for state #368 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 368 | stop processing: state #116 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c043ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | in statetime_stop() and could not find #116 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-116 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-116' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-116" | stop processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:349) | spent 0.0585 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 368 time elapsed 0.00052 seconds | (#368) spent 0.524 milliseconds in crypto helper computing work-order 368: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 368 for state #368 to event queue | scheduling resume sending helper answer for #368 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 368 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #368 | **emit ISAKMP Message: | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | ikev2 g^x 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | ikev2 g^x 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | ikev2 g^x 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | ikev2 g^x 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | ikev2 g^x 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | ikev2 g^x d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | ikev2 g^x 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | ikev2 g^x a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | ikev2 g^x 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | ikev2 g^x 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | ikev2 g^x 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | ikev2 g^x 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ikev2 g^x ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | ikev2 g^x 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | ikev2 g^x b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 c5 5b fd 40 | IKEv2 nonce f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 5c 60 4a 41 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 ae 30 e8 b0 40 fa 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 74 | natd_hash: port=500 | natd_hash: hash= 68 60 1c 54 6d 67 23 fc b6 28 30 9d ef 6b 07 db | natd_hash: hash= fe 4c eb 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 60 1c 54 6d 67 23 fc b6 28 30 9d ef 6b 07 db | Notify data fe 4c eb 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 ae 30 e8 b0 40 fa 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | natd_hash: hash= 24 db a3 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | Notify data 24 db a3 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #368 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #368: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #368 to 4294967295 after switching state | Message ID: IKE #368 skipping update_recv as MD is fake | Message ID: sent #368 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.116:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | state #368 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c022c68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da066c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f497c022d28 size 128 | #368 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.619958 | resume sending helper answer for #368 suppresed complete_v2_state_transition() and stole MD | #368 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c022b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.625102; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #352 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.629426; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #309 spent 0.0897 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.663786; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #339 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0803 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.672258; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | libevent_free: release ptr-libevent@0x7f49a0022bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #361 spent 0.204 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.676777; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007916 exceeds limit? YES "road-eastnet-nonat-117" #117: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-117" #117: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #369 at 0x55564da2a128 | State DB: adding IKEv2 state #369 in UNDEFINED | pstats #369 ikev2.ike started | Message ID: init #369: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #369: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #369; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-117" #369: initiating v2 parent SA to replace #117 | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 369 for state #369 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f49a0022bb8 size 128 | #369 spent 0.182 milliseconds in ikev2_parent_outI1() | RESET processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #117 ikev2.ike failed too-many-retransmits | pstats #117 ikev2.ike deleted too-many-retransmits | #117 spent 2.56 milliseconds in total | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-117" #117: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #117: PARENT_I1(half-open IKE SA) => delete | crypto helper 10 resuming | crypto helper 10 starting work-order 369 for state #369 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #117 "road-eastnet-nonat-117" #117: deleting IKE SA for connection 'road-eastnet-nonat-117' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 369 | add revival: connection 'road-eastnet-nonat-117' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-117 | State DB: deleting IKEv2 state #117 in PARENT_I1 | parent state #117: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 369 time elapsed 0.001624 seconds | (#369) spent 1.63 milliseconds in crypto helper computing work-order 369: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 369 for state #369 to event queue | scheduling resume sending helper answer for #369 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 | stop processing: state #117 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 10 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7f49a80122a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | in statetime_stop() and could not find #117 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-117 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-117' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-117" | stop processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:349) | spent 0.14 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 369 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #369 | **emit ISAKMP Message: | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | ikev2 g^x 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | ikev2 g^x 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | ikev2 g^x dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | ikev2 g^x 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ikev2 g^x ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | ikev2 g^x fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | ikev2 g^x 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | ikev2 g^x 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | ikev2 g^x 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | ikev2 g^x 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | ikev2 g^x 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | ikev2 g^x 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | ikev2 g^x 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | ikev2 g^x 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ikev2 g^x ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 66 fe 20 5a 26 d1 29 9d e4 36 1a fb ee 8b 30 dd | IKEv2 nonce 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 4d 0e 12 f1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c4 57 d9 1d 5c 32 93 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 75 | natd_hash: port=500 | natd_hash: hash= 31 ec 11 cc cb c8 bf 05 54 66 10 f9 90 4e 6b 27 | natd_hash: hash= 8f ce ba f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 ec 11 cc cb c8 bf 05 54 66 10 f9 90 4e 6b 27 | Notify data 8f ce ba f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c4 57 d9 1d 5c 32 93 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | natd_hash: hash= 7e 80 fc 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | Notify data 7e 80 fc 58 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #369 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #369: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #369 to 4294967295 after switching state | Message ID: IKE #369 skipping update_recv as MD is fake | Message ID: sent #369 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.117:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | state #369 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a0022bb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f4980022c58 size 128 | #369 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.680095 | resume sending helper answer for #369 suppresed complete_v2_state_transition() and stole MD | #369 spent 0.97 milliseconds in resume sending helper answer | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0022ab8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.686534; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #353 spent 0.422 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.717435; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #310 spent 0.558 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.28 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.728565; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #340 spent 0.415 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.744499; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #354 spent 0.452 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.745234; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | libevent_free: release ptr-libevent@0x7f4994022dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #362 spent 0.323 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.192 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada198 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.75803; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008429 exceeds limit? YES "road-eastnet-nonat-118" #118: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-118" #118: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #370 at 0x55564da2b938 | State DB: adding IKEv2 state #370 in UNDEFINED | pstats #370 ikev2.ike started | Message ID: init #370: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #370: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #370; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-118" #370: initiating v2 parent SA to replace #118 | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 370 for state #370 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da98c68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f4994022dd8 size 128 | #370 spent 0.267 milliseconds in ikev2_parent_outI1() | RESET processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #118 ikev2.ike failed too-many-retransmits | pstats #118 ikev2.ike deleted too-many-retransmits | #118 spent 3.6 milliseconds in total | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 11 resuming | crypto helper 11 starting work-order 370 for state #370 "road-eastnet-nonat-118" #118: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #118: PARENT_I1(half-open IKE SA) => delete | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 370 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #118 "road-eastnet-nonat-118" #118: deleting IKE SA for connection 'road-eastnet-nonat-118' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-118' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-118 | State DB: deleting IKEv2 state #118 in PARENT_I1 | parent state #118: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 370 time elapsed 0.002611 seconds | (#370) spent 2.6 milliseconds in crypto helper computing work-order 370: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 370 for state #370 to event queue | stop processing: state #118 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4980038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada198 | in statetime_stop() and could not find #118 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #370 | libevent_malloc: new ptr-libevent@0x7f4994022ed8 size 128 Initiating connection road-eastnet-nonat-118 which received a Delete/Notify but must remain up per local policy | crypto helper 11 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-118' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-118" | stop processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:349) | spent 0.207 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 370 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #370 | **emit ISAKMP Message: | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | ikev2 g^x 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | ikev2 g^x dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | ikev2 g^x 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ikev2 g^x ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ikev2 g^x ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | ikev2 g^x 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | ikev2 g^x 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | ikev2 g^x f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | ikev2 g^x eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | ikev2 g^x 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | ikev2 g^x 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | ikev2 g^x b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | ikev2 g^x a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | ikev2 g^x 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | ikev2 g^x d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a f3 b4 20 97 | IKEv2 nonce e1 12 4d e7 df a9 6b 09 5e 66 7c c8 92 78 2c 08 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b2 bf 0b 5f de e6 ea 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 76 | natd_hash: port=500 | natd_hash: hash= e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 e1 81 90 72 | natd_hash: hash= 13 77 21 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 e1 81 90 72 | Notify data 13 77 21 c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b2 bf 0b 5f de e6 ea 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | natd_hash: hash= 88 17 a3 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | Notify data 88 17 a3 bd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #370 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #370: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #370 to 4294967295 after switching state | Message ID: IKE #370 skipping update_recv as MD is fake | Message ID: sent #370 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.118:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | state #370 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994022dd8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da98c68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f4974022dd8 size 128 | #370 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.763025 | resume sending helper answer for #370 suppresed complete_v2_state_transition() and stole MD | #370 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994022ed8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.216 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.804635; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f4994022ed8 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | libevent_free: release ptr-libevent@0x7f4990017bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #311 spent 0.427 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.80657; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f4990017bf8 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | libevent_free: release ptr-libevent@0x7f49a4017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #355 spent 0.4 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.204 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.81549; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006073 exceeds limit? YES "road-eastnet-nonat-119" #119: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-119" #119: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #371 at 0x55564da2cf98 | State DB: adding IKEv2 state #371 in UNDEFINED | pstats #371 ikev2.ike started | Message ID: init #371: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #371: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #371; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-119" #371: initiating v2 parent SA to replace #119 | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 371 for state #371 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da136d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f49a4017a98 size 128 | #371 spent 0.343 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | RESET processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 starting work-order 371 for state #371 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #119 ikev2.ike failed too-many-retransmits | pstats #119 ikev2.ike deleted too-many-retransmits | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 371 | #119 spent 1.99 milliseconds in total | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-119" #119: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #119: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #119 "road-eastnet-nonat-119" #119: deleting IKE SA for connection 'road-eastnet-nonat-119' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-119' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-119 | State DB: deleting IKEv2 state #119 in PARENT_I1 | parent state #119: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #119 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 371 time elapsed 0.002695 seconds | libevent_free: release ptr-libevent@0x7f49a401d1f8 | (#371) spent 2.72 milliseconds in crypto helper computing work-order 371: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | crypto helper 12 sending results from work-order 371 for state #371 to event queue | in statetime_stop() and could not find #119 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #371 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-119 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-119' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-119" | stop processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:349) | spent 0.195 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.819213; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003876 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f49780239c8 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | libevent_free: release ptr-libevent@0x7f498801d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #341 spent 0.365 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.24 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 371 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #371 | **emit ISAKMP Message: | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | ikev2 g^x bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | ikev2 g^x 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | ikev2 g^x cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | ikev2 g^x 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | ikev2 g^x a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | ikev2 g^x 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | ikev2 g^x 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | ikev2 g^x 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | ikev2 g^x b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | ikev2 g^x d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | ikev2 g^x 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | ikev2 g^x 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | ikev2 g^x 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | ikev2 g^x dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | ikev2 g^x 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 aa 3e 92 58 | IKEv2 nonce ca fa d6 b2 70 f4 46 09 b9 e1 63 cd 57 0f 64 80 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f5 87 ff 81 03 d6 f9 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 77 | natd_hash: port=500 | natd_hash: hash= 22 03 b2 c1 42 0e a6 1b 6e 40 4f af 46 a0 2b db | natd_hash: hash= e2 44 e2 e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 22 03 b2 c1 42 0e a6 1b 6e 40 4f af 46 a0 2b db | Notify data e2 44 e2 e3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f5 87 ff 81 03 d6 f9 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | natd_hash: hash= 82 e2 3b d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | Notify data 82 e2 3b d0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #371 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #371: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #371 to 4294967295 after switching state | Message ID: IKE #371 skipping update_recv as MD is fake | Message ID: sent #371 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.119:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | state #371 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4017a98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da136d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f498801d4f8 size 128 | #371 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.821446 | resume sending helper answer for #371 suppresed complete_v2_state_transition() and stole MD | #371 spent 1.47 milliseconds in resume sending helper answer | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998033358 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.821847; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | libevent_free: release ptr-libevent@0x7f4998023608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #363 spent 0.323 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.186 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.860907; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #312 spent 0.445 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.873875; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | libevent_free: release ptr-libevent@0x7f4988017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #356 spent 0.437 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.877726; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006903 exceeds limit? YES "road-eastnet-nonat-120" #120: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-120" #120: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #372 at 0x55564da2e7a8 | State DB: adding IKEv2 state #372 in UNDEFINED | pstats #372 ikev2.ike started | Message ID: init #372: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #372: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #372; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-120" #372: initiating v2 parent SA to replace #120 | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 372 for state #372 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f4988017c48 size 128 | #372 spent 0.276 milliseconds in ikev2_parent_outI1() | RESET processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #120 ikev2.ike failed too-many-retransmits | pstats #120 ikev2.ike deleted too-many-retransmits | #120 spent 2.38 milliseconds in total | crypto helper 13 resuming | crypto helper 13 starting work-order 372 for state #372 | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 372 "road-eastnet-nonat-120" #120: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #120: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #120 "road-eastnet-nonat-120" #120: deleting IKE SA for connection 'road-eastnet-nonat-120' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-120' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-120 | State DB: deleting IKEv2 state #120 in PARENT_I1 | parent state #120: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #120 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 372 time elapsed 0.002733 seconds | libevent_free: release ptr-libevent@0x55564da7a5e8 | (#372) spent 2.73 milliseconds in crypto helper computing work-order 372: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 372 for state #372 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | scheduling resume sending helper answer for #372 | in statetime_stop() and could not find #120 | libevent_malloc: new ptr-libevent@0x7f498c022b78 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-120 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-120' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-120" | stop processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:349) | spent 0.2 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 372 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #372 | **emit ISAKMP Message: | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ikev2 g^x ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | ikev2 g^x 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | ikev2 g^x 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | ikev2 g^x 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ikev2 g^x ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | ikev2 g^x 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | ikev2 g^x 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | ikev2 g^x be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | ikev2 g^x a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | ikev2 g^x 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | ikev2 g^x 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | ikev2 g^x 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | ikev2 g^x dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | ikev2 g^x 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | ikev2 g^x 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 37 7a 01 60 | IKEv2 nonce 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 e2 26 7b dc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ef 90 93 36 17 74 e5 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 78 | natd_hash: port=500 | natd_hash: hash= 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 1f bf 72 b1 | natd_hash: hash= d1 68 51 da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 1f bf 72 b1 | Notify data d1 68 51 da | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ef 90 93 36 17 74 e5 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | natd_hash: hash= 83 5c 2e 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | Notify data 83 5c 2e 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #372 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #372: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #372 to 4294967295 after switching state | Message ID: IKE #372 skipping update_recv as MD is fake | Message ID: sent #372 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.120:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | state #372 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988017c48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f496c022dc8 size 128 | #372 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.883669 | resume sending helper answer for #372 suppresed complete_v2_state_transition() and stole MD | #372 spent 2.15 milliseconds in resume sending helper answer | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c022b78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.299 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.884276; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f498c022b78 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | libevent_free: release ptr-libevent@0x7f498c022c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #364 spent 0.508 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.292 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.89636; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f498c022c78 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #342 spent 0.325 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.215 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10647.91911; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003801 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #313 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0756 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.934466; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #357 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.936823; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006913 exceeds limit? YES "road-eastnet-nonat-121" #121: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-121" #121: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #373 at 0x55564da2fe08 | State DB: adding IKEv2 state #373 in UNDEFINED | pstats #373 ikev2.ike started | Message ID: init #373: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #373: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #373; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-121" #373: initiating v2 parent SA to replace #121 | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 373 for state #373 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 | #373 spent 0.12 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 373 for state #373 | RESET processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 373 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #121 ikev2.ike failed too-many-retransmits | pstats #121 ikev2.ike deleted too-many-retransmits | #121 spent 2.17 milliseconds in total | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-121" #121: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #121: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #121 "road-eastnet-nonat-121" #121: deleting IKE SA for connection 'road-eastnet-nonat-121' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-121' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-121 | State DB: deleting IKEv2 state #121 in PARENT_I1 | parent state #121: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #121 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 373 time elapsed 0.000912 seconds | libevent_free: release ptr-libevent@0x55564dad5c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | in statetime_stop() and could not find #121 | (#373) spent 0.912 milliseconds in crypto helper computing work-order 373: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 373 for state #373 to event queue | scheduling resume sending helper answer for #373 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 Initiating connection road-eastnet-nonat-121 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-121' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-121" | stop processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:349) | spent 0.084 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 373 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #373 | **emit ISAKMP Message: | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | ikev2 g^x 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | ikev2 g^x 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | ikev2 g^x be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | ikev2 g^x c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | ikev2 g^x 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ikev2 g^x ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | ikev2 g^x 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | ikev2 g^x 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | ikev2 g^x 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | ikev2 g^x 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | ikev2 g^x f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | ikev2 g^x 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | ikev2 g^x 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | ikev2 g^x d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | ikev2 g^x 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 98 5d e7 2b ce 1a fa ee 83 59 7c 3e 17 95 f7 7f | IKEv2 nonce 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 47 f0 ae f6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9f 93 87 76 d0 80 8e 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 79 | natd_hash: port=500 | natd_hash: hash= d3 24 5a f9 63 d8 4c 97 8d 60 81 9b 10 a1 b8 f6 | natd_hash: hash= 5d ac c5 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 24 5a f9 63 d8 4c 97 8d 60 81 9b 10 a1 b8 f6 | Notify data 5d ac c5 cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9f 93 87 76 d0 80 8e 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | natd_hash: hash= 70 3a 24 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | Notify data 70 3a 24 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #373 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #373: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #373 to 4294967295 after switching state | Message ID: IKE #373 skipping update_recv as MD is fake | Message ID: sent #373 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.121:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | state #373 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f49bc0257e8 size 128 | #373 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10647.938553 | resume sending helper answer for #373 suppresed complete_v2_state_transition() and stole MD | #373 spent 0.487 milliseconds in resume sending helper answer | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990022cb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.942784; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | libevent_free: release ptr-libevent@0x7f4990022bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #365 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0533 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10647.983092; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f4990022bb8 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #343 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10647.991382; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001362 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | libevent_free: release ptr-libevent@0x7f49a001d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #358 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10647.992739; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f49a001d4f8 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #253 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10647.998046; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | libevent_free: release ptr-libevent@0x7f4984022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #366 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10647.999388; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008232 exceeds limit? YES "road-eastnet-nonat-122" #122: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-122" #122: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #374 at 0x55564da31518 | State DB: adding IKEv2 state #374 in UNDEFINED | pstats #374 ikev2.ike started | Message ID: init #374: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #374: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #374; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-122" #374: initiating v2 parent SA to replace #122 | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 374 for state #374 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d0e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f4984022c68 size 128 | #374 spent 0.0768 milliseconds in ikev2_parent_outI1() | RESET processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #122 ikev2.ike failed too-many-retransmits | pstats #122 ikev2.ike deleted too-many-retransmits | #122 spent 3.14 milliseconds in total | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-122" #122: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #122: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #122 "road-eastnet-nonat-122" #122: deleting IKE SA for connection 'road-eastnet-nonat-122' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-122' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-122 | State DB: deleting IKEv2 state #122 in PARENT_I1 | crypto helper 15 resuming | crypto helper 15 starting work-order 374 for state #374 | parent state #122: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 374 | stop processing: state #122 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da95dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | in statetime_stop() and could not find #122 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-122 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-122' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-122" | stop processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:349) | spent 0.061 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 374 time elapsed 0.000553 seconds | (#374) spent 0.553 milliseconds in crypto helper computing work-order 374: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 374 for state #374 to event queue | scheduling resume sending helper answer for #374 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 374 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #374 | **emit ISAKMP Message: | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | ikev2 g^x c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | ikev2 g^x b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | ikev2 g^x df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | ikev2 g^x cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | ikev2 g^x 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | ikev2 g^x 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | ikev2 g^x 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | ikev2 g^x a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | ikev2 g^x c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ikev2 g^x ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | ikev2 g^x fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | ikev2 g^x 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | ikev2 g^x 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | ikev2 g^x 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | ikev2 g^x 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e 62 06 ae b6 | IKEv2 nonce 3e fd 0d ba c3 73 4c 82 48 25 40 e5 d4 48 c1 64 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0d f6 29 84 8d ec 57 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7a | natd_hash: port=500 | natd_hash: hash= 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f 12 4b 47 32 | natd_hash: hash= e0 10 07 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f 12 4b 47 32 | Notify data e0 10 07 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0d f6 29 84 8d ec 57 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | natd_hash: hash= af 09 64 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | Notify data af 09 64 cb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #374 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #374: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #374 to 4294967295 after switching state | Message ID: IKE #374 skipping update_recv as MD is fake | Message ID: sent #374 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.122:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | state #374 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984022c68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da9d0e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f49b40256e8 size 128 | #374 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.000475 | resume sending helper answer for #374 suppresed complete_v2_state_transition() and stole MD | #374 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984022d68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.012664; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | libevent_free: release ptr-libevent@0x7f4984012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #314 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.051972; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f4984012488 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #359 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.059255; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | libevent_free: release ptr-libevent@0x7f4988022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #367 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.062524; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | libevent_free: release ptr-libevent@0x7f497801d898 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #344 spent 0.0858 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.063767; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00849 exceeds limit? YES "road-eastnet-nonat-123" #123: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-123" #123: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #375 at 0x55564da32c98 | State DB: adding IKEv2 state #375 in UNDEFINED | pstats #375 ikev2.ike started | Message ID: init #375: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #375: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #375; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-123" #375: initiating v2 parent SA to replace #123 | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 375 for state #375 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da76048 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f497801d898 size 128 | #375 spent 0.0891 milliseconds in ikev2_parent_outI1() | RESET processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #123 ikev2.ike failed too-many-retransmits | pstats #123 ikev2.ike deleted too-many-retransmits | #123 spent 3.5 milliseconds in total | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-123" #123: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #123: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #123 "road-eastnet-nonat-123" #123: deleting IKE SA for connection 'road-eastnet-nonat-123' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-123' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-123 | State DB: deleting IKEv2 state #123 in PARENT_I1 | parent state #123: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 resuming | crypto helper 16 starting work-order 375 for state #375 | stop processing: state #123 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 375 | libevent_free: release ptr-libevent@0x7f498001d1e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | in statetime_stop() and could not find #123 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-123 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-123' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-123" | stop processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 375 time elapsed 0.00054 seconds | (#375) spent 0.542 milliseconds in crypto helper computing work-order 375: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 375 for state #375 to event queue | scheduling resume sending helper answer for #375 | libevent_malloc: new ptr-libevent@0x7f4988022b68 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 375 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #375 | **emit ISAKMP Message: | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | ikev2 g^x be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | ikev2 g^x 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | ikev2 g^x 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | ikev2 g^x fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | ikev2 g^x 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | ikev2 g^x 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | ikev2 g^x bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | ikev2 g^x 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ikev2 g^x ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | ikev2 g^x 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | ikev2 g^x 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | ikev2 g^x 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | ikev2 g^x 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | ikev2 g^x 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | ikev2 g^x 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 18 23 2e 4d a8 db f3 6e 79 8e e3 46 6a 9c fd 4c | IKEv2 nonce 74 05 36 1b 63 ea 83 0c ac e1 0d f7 e6 7d 1f c5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 de d1 a1 8b 6a 10 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7b | natd_hash: port=500 | natd_hash: hash= 6b 29 af dc 82 4c d2 01 66 6a de 21 9b e6 a2 bf | natd_hash: hash= af e2 8e ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 29 af dc 82 4c d2 01 66 6a de 21 9b e6 a2 bf | Notify data af e2 8e ef | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 54 de d1 a1 8b 6a 10 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | natd_hash: hash= 9b 58 da e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | Notify data 9b 58 da e3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #375 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #375: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #375 to 4294967295 after switching state | Message ID: IKE #375 skipping update_recv as MD is fake | Message ID: sent #375 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.123:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | state #375 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497801d898 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da76048 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 | #375 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.064874 | resume sending helper answer for #375 suppresed complete_v2_state_transition() and stole MD | #375 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988022b68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.095056; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f4988022b68 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | libevent_free: release ptr-libevent@0x7f49ac01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #315 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.111331; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #360 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.112616; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #254 spent 0.0876 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.120858; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | libevent_free: release ptr-libevent@0x7f497c022d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #368 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.122128; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005074 exceeds limit? YES "road-eastnet-nonat-124" #124: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-124" #124: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #376 at 0x55564da343a8 | State DB: adding IKEv2 state #376 in UNDEFINED | pstats #376 ikev2.ike started | Message ID: init #376: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #376: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #376; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-124" #376: initiating v2 parent SA to replace #124 | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 376 for state #376 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da066c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f497c022d28 size 128 | #376 spent 0.077 milliseconds in ikev2_parent_outI1() | RESET processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #124 ikev2.ike failed too-many-retransmits | pstats #124 ikev2.ike deleted too-many-retransmits | #124 spent 2.42 milliseconds in total | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-124" #124: deleting state (STATE_PARENT_I1) aged 64.006s and NOT sending notification | parent state #124: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #124 "road-eastnet-nonat-124" #124: deleting IKE SA for connection 'road-eastnet-nonat-124' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-124' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-124 | State DB: deleting IKEv2 state #124 in PARENT_I1 | crypto helper 1 resuming | crypto helper 1 starting work-order 376 for state #376 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 376 | parent state #124: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 376 time elapsed 0.000548 seconds | (#376) spent 0.552 milliseconds in crypto helper computing work-order 376: ikev2_outI1 KE (pcr) | stop processing: state #124 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 1 sending results from work-order 376 for state #376 to event queue | libevent_free: release ptr-libevent@0x7f497401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | scheduling resume sending helper answer for #376 | in statetime_stop() and could not find #124 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-124 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-124' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-124" | stop processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:349) | spent 0.0747 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 376 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #376 | **emit ISAKMP Message: | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | ikev2 g^x f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | ikev2 g^x 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ikev2 g^x ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | ikev2 g^x 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | ikev2 g^x 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | ikev2 g^x 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | ikev2 g^x a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | ikev2 g^x 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | ikev2 g^x 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | ikev2 g^x de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | ikev2 g^x 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | ikev2 g^x 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | ikev2 g^x 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | ikev2 g^x 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | ikev2 g^x 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 12 26 8e 75 fc 9b 02 49 82 f2 25 15 5e a9 47 97 | IKEv2 nonce 48 fd c5 41 95 61 18 7d a5 0f 17 fd 07 cd fa 3e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 16 e4 d8 2e 4e 76 bc 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7c | natd_hash: port=500 | natd_hash: hash= c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e 1b 69 f0 0b | natd_hash: hash= bb a9 e3 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e 1b 69 f0 0b | Notify data bb a9 e3 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 16 e4 d8 2e 4e 76 bc 98 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | natd_hash: hash= a4 ae c0 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | Notify data a4 ae c0 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #376 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #376: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #376 to 4294967295 after switching state | Message ID: IKE #376 skipping update_recv as MD is fake | Message ID: sent #376 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.124:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | state #376 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c022d28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da066c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 | #376 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.123272 | resume sending helper answer for #376 suppresed complete_v2_state_transition() and stole MD | #376 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c022e28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.154466; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | libevent_free: release ptr-libevent@0x7f496c01d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #345 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.163763; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002391 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f496c01d568 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #316 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.173066; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #361 spent 0.0963 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.17733; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | libevent_free: release ptr-libevent@0x7f497c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #255 spent 0.0939 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.18062; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f497c0122d8 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | libevent_free: release ptr-libevent@0x7f4980022c58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #369 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.183827; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008102 exceeds limit? YES "road-eastnet-nonat-125" #125: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-125" #125: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #377 at 0x55564da35ab8 | State DB: adding IKEv2 state #377 in UNDEFINED | pstats #377 ikev2.ike started | Message ID: init #377: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #377: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #377; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-125" #377: initiating v2 parent SA to replace #125 | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 377 for state #377 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f4980022c58 size 128 | #377 spent 0.0809 milliseconds in ikev2_parent_outI1() | RESET processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | crypto helper 3 starting work-order 377 for state #377 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #125 ikev2.ike failed too-many-retransmits | pstats #125 ikev2.ike deleted too-many-retransmits | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 377 | #125 spent 2.42 milliseconds in total | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-125" #125: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #125: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #125 "road-eastnet-nonat-125" #125: deleting IKE SA for connection 'road-eastnet-nonat-125' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-125' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-125 | State DB: deleting IKEv2 state #125 in PARENT_I1 | parent state #125: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #125 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49ac0493a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | in statetime_stop() and could not find #125 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 377 time elapsed 0.000568 seconds | (#377) spent 0.573 milliseconds in crypto helper computing work-order 377: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-125 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 3 sending results from work-order 377 for state #377 to event queue | scheduling resume sending helper answer for #377 | libevent_malloc: new ptr-libevent@0x7f4980022b58 size 128 | crypto helper 3 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-125' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-125" | stop processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:349) | spent 0.0726 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 377 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #377 | **emit ISAKMP Message: | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | ikev2 g^x 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | ikev2 g^x 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | ikev2 g^x 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | ikev2 g^x c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | ikev2 g^x 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | ikev2 g^x 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | ikev2 g^x 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | ikev2 g^x 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | ikev2 g^x b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | ikev2 g^x fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | ikev2 g^x 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | ikev2 g^x d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | ikev2 g^x b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | ikev2 g^x b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | ikev2 g^x 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 97 a1 55 2f | IKEv2 nonce 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 c0 ac 75 aa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2f 56 4c 93 10 55 89 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7d | natd_hash: port=500 | natd_hash: hash= 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf 5d 78 25 43 | natd_hash: hash= d1 b2 08 a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf 5d 78 25 43 | Notify data d1 b2 08 a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2f 56 4c 93 10 55 89 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | natd_hash: hash= 05 19 0f 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | Notify data 05 19 0f 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #377 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #377: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #377 to 4294967295 after switching state | Message ID: IKE #377 skipping update_recv as MD is fake | Message ID: sent #377 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.125:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | state #377 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980022c58 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 | #377 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.184948 | resume sending helper answer for #377 suppresed complete_v2_state_transition() and stole MD | #377 spent 0.338 milliseconds in resume sending helper answer | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980022b58 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.228143; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f4980022b58 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | libevent_free: release ptr-libevent@0x7f499c01d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #317 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0513 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.231457; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f499c01d3f8 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | libevent_free: release ptr-libevent@0x7f4980012588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #256 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.244822; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00781 exceeds limit? YES "road-eastnet-nonat-126" #126: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-126" #126: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #378 at 0x55564da371c8 | State DB: adding IKEv2 state #378 in UNDEFINED | pstats #378 ikev2.ike started | Message ID: init #378: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #378: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #378; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-126" #378: initiating v2 parent SA to replace #126 | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 378 for state #378 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ddf28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f4980012588 size 128 | #378 spent 0.0868 milliseconds in ikev2_parent_outI1() | RESET processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #126 ikev2.ike failed too-many-retransmits | pstats #126 ikev2.ike deleted too-many-retransmits | #126 spent 3 milliseconds in total | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-126" #126: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #126: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #126 "road-eastnet-nonat-126" #126: deleting IKE SA for connection 'road-eastnet-nonat-126' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-126' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-126 | State DB: deleting IKEv2 state #126 in PARENT_I1 | crypto helper 17 resuming | crypto helper 17 starting work-order 378 for state #378 | parent state #126: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 378 | stop processing: state #126 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49bc030658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | in statetime_stop() and could not find #126 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-126 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-126' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-126" | stop processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:349) | spent 0.0637 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 378 time elapsed 0.000711 seconds | (#378) spent 0.717 milliseconds in crypto helper computing work-order 378: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 378 for state #378 to event queue | scheduling resume sending helper answer for #378 | libevent_malloc: new ptr-libevent@0x7f4974022cd8 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 378 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #378 | **emit ISAKMP Message: | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | ikev2 g^x 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | ikev2 g^x 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | ikev2 g^x f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | ikev2 g^x 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | ikev2 g^x 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | ikev2 g^x 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | ikev2 g^x 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | ikev2 g^x fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | ikev2 g^x 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | ikev2 g^x 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | ikev2 g^x 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | ikev2 g^x d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | ikev2 g^x 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ikev2 g^x ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | ikev2 g^x 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a f6 d6 ff bf | IKEv2 nonce 20 55 8b a4 d5 2e 93 89 d1 db bb be c7 cf cd 83 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fd 2b bf 87 5d b7 90 ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7e | natd_hash: port=500 | natd_hash: hash= cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d 4a 70 f1 54 | natd_hash: hash= f6 ec f0 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d 4a 70 f1 54 | Notify data f6 ec f0 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fd 2b bf 87 5d b7 90 ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | natd_hash: hash= dc 88 d5 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | Notify data dc 88 d5 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #378 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #378: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #378 to 4294967295 after switching state | Message ID: IKE #378 skipping update_recv as MD is fake | Message ID: sent #378 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.126:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | state #378 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980012588 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ddf28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 | #378 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.246287 | resume sending helper answer for #378 suppresed complete_v2_state_transition() and stole MD | #378 spent 0.515 milliseconds in resume sending helper answer | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974022cd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.246382; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f4974022cd8 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #362 spent 0.0798 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.247708; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003447 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | libevent_free: release ptr-libevent@0x7f49b401fd78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #346 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.26197; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | libevent_free: release ptr-libevent@0x7f4974022dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #370 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.286383; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f4974022dd8 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | libevent_free: release ptr-libevent@0x7f4994012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #318 spent 0.241 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.109 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.296131; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | libevent_free: release ptr-libevent@0x7f4974012588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #257 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.179 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.302971; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007505 exceeds limit? YES "road-eastnet-nonat-127" #127: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-127" #127: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #379 at 0x55564da388d8 | State DB: adding IKEv2 state #379 in UNDEFINED | pstats #379 ikev2.ike started | Message ID: init #379: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #379: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #379; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-127" #379: initiating v2 parent SA to replace #127 | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 379 for state #379 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae71c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f4974012588 size 128 | #379 spent 0.282 milliseconds in ikev2_parent_outI1() | RESET processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 18 starting work-order 379 for state #379 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 379 | pstats #127 ikev2.ike failed too-many-retransmits | pstats #127 ikev2.ike deleted too-many-retransmits | #127 spent 2.27 milliseconds in total | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-127" #127: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #127: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #127 "road-eastnet-nonat-127" #127: deleting IKE SA for connection 'road-eastnet-nonat-127' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-127' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-127 | State DB: deleting IKEv2 state #127 in PARENT_I1 | parent state #127: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #127 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 379 time elapsed 0.002674 seconds | libevent_free: release ptr-libevent@0x55564da094e8 | (#379) spent 2.69 milliseconds in crypto helper computing work-order 379: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | crypto helper 18 sending results from work-order 379 for state #379 to event queue | in statetime_stop() and could not find #127 | scheduling resume sending helper answer for #379 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 18 waiting (nothing to do) Initiating connection road-eastnet-nonat-127 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-127' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-127" | stop processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:349) | spent 0.184 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 379 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #379 | **emit ISAKMP Message: | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | ikev2 g^x d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | ikev2 g^x e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | ikev2 g^x 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | ikev2 g^x 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | ikev2 g^x 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | ikev2 g^x 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | ikev2 g^x f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | ikev2 g^x 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | ikev2 g^x 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | ikev2 g^x b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | ikev2 g^x 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | ikev2 g^x 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | ikev2 g^x f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | ikev2 g^x 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | ikev2 g^x 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 ad a6 01 11 | IKEv2 nonce 10 f5 54 85 22 9b 14 46 ed f3 9e 9b 77 4f 09 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d5 d3 86 ec 52 31 cc 22 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7f | natd_hash: port=500 | natd_hash: hash= 69 dc 9e 63 66 16 3e 54 32 59 51 b0 18 95 0e b0 | natd_hash: hash= f2 09 98 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 dc 9e 63 66 16 3e 54 32 59 51 b0 18 95 0e b0 | Notify data f2 09 98 fe | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d5 d3 86 ec 52 31 cc 22 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | natd_hash: hash= 73 e7 99 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | Notify data 73 e7 99 98 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #379 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #379: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #379 to 4294967295 after switching state | Message ID: IKE #379 skipping update_recv as MD is fake | Message ID: sent #379 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.127:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | state #379 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974012588 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae71c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f49a8028668 size 128 | #379 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.308081 | resume sending helper answer for #379 suppresed complete_v2_state_transition() and stole MD | #379 spent 1.57 milliseconds in resume sending helper answer | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780242d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.320645; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | libevent_free: release ptr-libevent@0x7f498801d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #371 spent 0.481 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.322559; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002532 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f498801d4f8 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #363 spent 0.538 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.278 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.326626; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #347 spent 0.327 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.34122; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | libevent_free: release ptr-libevent@0x7f498c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #319 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.356593; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | libevent_free: release ptr-libevent@0x7f4978012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #258 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.363893; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00815 exceeds limit? YES "road-eastnet-nonat-128" #128: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-128" #128: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #380 at 0x55564da3a0e8 | State DB: adding IKEv2 state #380 in UNDEFINED | pstats #380 ikev2.ike started | Message ID: init #380: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #380: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #380; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-128" #380: initiating v2 parent SA to replace #128 | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 380 for state #380 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6dd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f4978012388 size 128 | crypto helper 19 resuming | crypto helper 19 starting work-order 380 for state #380 | #380 spent 0.0833 milliseconds in ikev2_parent_outI1() | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 380 | RESET processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #128 ikev2.ike failed too-many-retransmits | pstats #128 ikev2.ike deleted too-many-retransmits | #128 spent 1.86 milliseconds in total | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-128" #128: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #128: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #128 "road-eastnet-nonat-128" #128: deleting IKE SA for connection 'road-eastnet-nonat-128' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-128' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-128 | State DB: deleting IKEv2 state #128 in PARENT_I1 | parent state #128: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #128 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 380 time elapsed 0.000625 seconds | libevent_free: release ptr-libevent@0x55564da87668 | (#380) spent 0.631 milliseconds in crypto helper computing work-order 380: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | crypto helper 19 sending results from work-order 380 for state #380 to event queue | in statetime_stop() and could not find #128 | scheduling resume sending helper answer for #380 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f496c022cc8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-128 which received a Delete/Notify but must remain up per local policy | crypto helper 19 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-128' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-128" | stop processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:349) | spent 0.066 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 380 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #380 | **emit ISAKMP Message: | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | ikev2 g^x 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | ikev2 g^x 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | ikev2 g^x 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ikev2 g^x ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | ikev2 g^x 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | ikev2 g^x 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | ikev2 g^x 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | ikev2 g^x 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | ikev2 g^x 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ikev2 g^x ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | ikev2 g^x 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | ikev2 g^x 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | ikev2 g^x 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | ikev2 g^x c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ikev2 g^x ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 dd 8a fe a3 | IKEv2 nonce ee 1f 96 93 05 06 5d 95 e5 32 f4 1a 3b 00 c7 79 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1f fb 21 51 68 16 23 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 80 | natd_hash: port=500 | natd_hash: hash= 81 d9 ed cc af 71 48 ee b4 b7 10 bd fb a7 39 09 | natd_hash: hash= df cb 14 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 d9 ed cc af 71 48 ee b4 b7 10 bd fb a7 39 09 | Notify data df cb 14 7b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1f fb 21 51 68 16 23 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | natd_hash: hash= e6 83 0a da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | Notify data e6 83 0a da | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #380 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #380: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #380 to 4294967295 after switching state | Message ID: IKE #380 skipping update_recv as MD is fake | Message ID: sent #380 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.128:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | state #380 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4978012388 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6dd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f499c0284d8 size 128 | #380 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.365203 | resume sending helper answer for #380 suppresed complete_v2_state_transition() and stole MD | #380 spent 0.431 milliseconds in resume sending helper answer | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c022cc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.382394; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498725 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f496c022cc8 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | libevent_free: release ptr-libevent@0x7f496c022dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #372 spent 0.0987 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.385663; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f496c022dc8 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | libevent_free: release ptr-libevent@0x7f498c022b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #364 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.385771; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002584 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f498c022b78 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #348 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.406044; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | libevent_free: release ptr-libevent@0x7f499401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #320 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.4154; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f499401d568 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | libevent_free: release ptr-libevent@0x7f496c012438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #259 spent 0.0936 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.424754; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007613 exceeds limit? YES "road-eastnet-nonat-129" #129: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-129" #129: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #381 at 0x55564da3b748 | State DB: adding IKEv2 state #381 in UNDEFINED | pstats #381 ikev2.ike started | Message ID: init #381: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #381: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #381; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-129" #381: initiating v2 parent SA to replace #129 | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 381 for state #381 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daeb7d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f496c012438 size 128 | #381 spent 0.0793 milliseconds in ikev2_parent_outI1() | crypto helper 0 resuming | RESET processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 starting work-order 381 for state #381 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #129 ikev2.ike failed too-many-retransmits | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 381 | pstats #129 ikev2.ike deleted too-many-retransmits | #129 spent 2.4 milliseconds in total | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-129" #129: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #129: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #129 "road-eastnet-nonat-129" #129: deleting IKE SA for connection 'road-eastnet-nonat-129' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-129' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-129 | State DB: deleting IKEv2 state #129 in PARENT_I1 | parent state #129: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #129 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 381 time elapsed 0.00061 seconds | libevent_free: release ptr-libevent@0x7f49a8038c48 | (#381) spent 0.615 milliseconds in crypto helper computing work-order 381: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | crypto helper 0 sending results from work-order 381 for state #381 to event queue | in statetime_stop() and could not find #129 | scheduling resume sending helper answer for #381 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49bc0256e8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 0 waiting (nothing to do) Initiating connection road-eastnet-nonat-129 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-129' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-129" | stop processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:349) | spent 0.0667 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 381 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #381 | **emit ISAKMP Message: | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | ikev2 g^x c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | ikev2 g^x 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | ikev2 g^x 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | ikev2 g^x 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | ikev2 g^x 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | ikev2 g^x 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | ikev2 g^x a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | ikev2 g^x c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | ikev2 g^x d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | ikev2 g^x d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | ikev2 g^x dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | ikev2 g^x 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | ikev2 g^x 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | ikev2 g^x fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | ikev2 g^x fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c 46 1d ee 17 | IKEv2 nonce c9 8a 8d a9 b5 57 26 c1 44 45 63 6a d8 a6 59 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a 1f 30 7d cb 14 b0 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 81 | natd_hash: port=500 | natd_hash: hash= 45 45 78 44 05 40 86 8f 37 86 ea a7 ad d1 d4 e9 | natd_hash: hash= bb 9b 34 f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 45 78 44 05 40 86 8f 37 86 ea a7 ad d1 d4 e9 | Notify data bb 9b 34 f6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a 1f 30 7d cb 14 b0 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | natd_hash: hash= be 96 d3 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | Notify data be 96 d3 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #381 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #381: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #381 to 4294967295 after switching state | Message ID: IKE #381 skipping update_recv as MD is fake | Message ID: sent #381 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.129:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | state #381 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c012438 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daeb7d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f49a0028418 size 128 | #381 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.425939 | resume sending helper answer for #381 suppresed complete_v2_state_transition() and stole MD | #381 spent 0.339 milliseconds in resume sending helper answer | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc0256e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.439231; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f49bc0256e8 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | libevent_free: release ptr-libevent@0x7f49bc0257e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #373 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.443567; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f49bc0257e8 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | libevent_free: release ptr-libevent@0x7f4990022cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #365 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0842 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.445962; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #349 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.461352; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | libevent_free: release ptr-libevent@0x7f499c017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #321 spent 0.216 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.093 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.48395; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003745 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | libevent_free: release ptr-libevent@0x7f49bc014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #260 spent 0.595 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.304 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.500146; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f49bc014e58 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #366 spent 0.582 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.502304; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501829 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | libevent_free: release ptr-libevent@0x7f49b40256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #374 spent 0.555 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.277 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.509343; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f49b40256e8 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | libevent_free: release ptr-libevent@0x7f49a4022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #350 spent 0.367 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.51307; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004773 exceeds limit? YES "road-eastnet-nonat-130" #130: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-130" #130: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #382 at 0x55564da3cda8 | State DB: adding IKEv2 state #382 in UNDEFINED | pstats #382 ikev2.ike started | Message ID: init #382: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #382: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #382; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-130" #382: initiating v2 parent SA to replace #130 | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 382 for state #382 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da67858 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f49a4022b68 size 128 | #382 spent 0.206 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 382 for state #382 | RESET processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 382 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #130 ikev2.ike failed too-many-retransmits | pstats #130 ikev2.ike deleted too-many-retransmits | #130 spent 7.76 milliseconds in total | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-130" #130: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #130: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #130 "road-eastnet-nonat-130" #130: deleting IKE SA for connection 'road-eastnet-nonat-130' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-130' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-130 | State DB: deleting IKEv2 state #130 in PARENT_I1 | parent state #130: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #130 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 382 time elapsed 0.002251 seconds | libevent_free: release ptr-libevent@0x7f49a00493f8 | (#382) spent 2.25 milliseconds in crypto helper computing work-order 382: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | in statetime_stop() and could not find #130 | crypto helper 2 sending results from work-order 382 for state #382 to event queue | scheduling resume sending helper answer for #382 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b40257e8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 2 waiting (nothing to do) Initiating connection road-eastnet-nonat-130 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-130' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-130" | stop processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:349) | spent 0.139 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 382 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #382 | **emit ISAKMP Message: | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | ikev2 g^x 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | ikev2 g^x 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ikev2 g^x ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | ikev2 g^x 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | ikev2 g^x 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | ikev2 g^x 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | ikev2 g^x 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | ikev2 g^x 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | ikev2 g^x 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | ikev2 g^x 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | ikev2 g^x e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | ikev2 g^x 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | ikev2 g^x 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | ikev2 g^x 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | ikev2 g^x 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7d b7 78 20 92 2f 9d c1 11 df ec 0f 26 51 9d bb | IKEv2 nonce 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 33 2d 60 d4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 76 6f 35 c9 09 5c 32 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 82 | natd_hash: port=500 | natd_hash: hash= 3e 8b b9 40 53 da ac a7 32 7b cf 2f cf 66 3f e2 | natd_hash: hash= 95 99 bb 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 8b b9 40 53 da ac a7 32 7b cf 2f cf 66 3f e2 | Notify data 95 99 bb 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 76 6f 35 c9 09 5c 32 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | natd_hash: hash= a4 4d 66 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | Notify data a4 4d 66 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #382 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #382: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #382 to 4294967295 after switching state | Message ID: IKE #382 skipping update_recv as MD is fake | Message ID: sent #382 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.130:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | state #382 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4022b68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da67858 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f4994028648 size 128 | #382 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.517061 | resume sending helper answer for #382 suppresed complete_v2_state_transition() and stole MD | #382 spent 1.11 milliseconds in resume sending helper answer | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b40257e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.141 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.526398; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f49b40257e8 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | libevent_free: release ptr-libevent@0x7f499800cbe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #322 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0926 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.545829; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | libevent_free: release ptr-libevent@0x7f49b4014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #261 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.560155; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f49b4014f58 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #367 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.565467; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #375 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.56777; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | libevent_free: release ptr-libevent@0x7f49a8022cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #351 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.584077; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f49a8022cf8 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #323 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.607389; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | libevent_free: release ptr-libevent@0x7f49b8014f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #262 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.608675; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.0076 exceeds limit? YES "road-eastnet-nonat-131" #131: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-131" #131: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #383 at 0x55564da3e4b8 | State DB: adding IKEv2 state #383 in UNDEFINED | pstats #383 ikev2.ike started | Message ID: init #383: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #383: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #383; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-131" #383: initiating v2 parent SA to replace #131 | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 383 for state #383 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f49b8014f08 size 128 | #383 spent 0.0766 milliseconds in ikev2_parent_outI1() | RESET processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #131 ikev2.ike failed too-many-retransmits | pstats #131 ikev2.ike deleted too-many-retransmits | #131 spent 3.09 milliseconds in total | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-131" #131: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #131: PARENT_I1(half-open IKE SA) => delete | crypto helper 4 resuming | crypto helper 4 starting work-order 383 for state #383 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 383 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #131 "road-eastnet-nonat-131" #131: deleting IKE SA for connection 'road-eastnet-nonat-131' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-131' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-131 | State DB: deleting IKEv2 state #131 in PARENT_I1 | parent state #131: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 383 time elapsed 0.000537 seconds | (#383) spent 0.54 milliseconds in crypto helper computing work-order 383: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 383 for state #383 to event queue | scheduling resume sending helper answer for #383 | libevent_malloc: new ptr-libevent@0x7f49b8025758 size 128 | crypto helper 4 waiting (nothing to do) | stop processing: state #131 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | in statetime_stop() and could not find #131 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-131 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-131' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-131" | stop processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:349) | spent 0.0616 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 383 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #383 | **emit ISAKMP Message: | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | ikev2 g^x 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | ikev2 g^x cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | ikev2 g^x c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | ikev2 g^x 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | ikev2 g^x bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | ikev2 g^x d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | ikev2 g^x 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | ikev2 g^x c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | ikev2 g^x 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | ikev2 g^x 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | ikev2 g^x cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | ikev2 g^x 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | ikev2 g^x 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | ikev2 g^x 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | ikev2 g^x 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 99 6b fc ca | IKEv2 nonce a5 fa 15 1a de ce 8f 49 14 2d 8b 58 b3 f2 b9 d6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 01 65 1f b1 8e 7a ed 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 83 | natd_hash: port=500 | natd_hash: hash= 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b 64 de c4 53 | natd_hash: hash= 50 88 3d 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b 64 de c4 53 | Notify data 50 88 3d 69 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 01 65 1f b1 8e 7a ed 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | natd_hash: hash= 09 6a c7 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | Notify data 09 6a c7 72 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #383 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #383: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #383 to 4294967295 after switching state | Message ID: IKE #383 skipping update_recv as MD is fake | Message ID: sent #383 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.131:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | state #383 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8014f08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f4998028538 size 128 | #383 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.60981 | resume sending helper answer for #383 suppresed complete_v2_state_transition() and stole MD | #383 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8025758 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.621996; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002038 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f49b8025758 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #368 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.624258; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #376 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.626484; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | libevent_free: release ptr-libevent@0x7f499c022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #352 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.640919; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #324 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.666195; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | libevent_free: release ptr-libevent@0x7f49ac017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #263 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.670566; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007737 exceeds limit? YES "road-eastnet-nonat-132" #132: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-132" #132: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #384 at 0x55564da3fc38 | State DB: adding IKEv2 state #384 in UNDEFINED | pstats #384 ikev2.ike started | Message ID: init #384: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #384: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #384; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-132" #384: initiating v2 parent SA to replace #132 | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 384 for state #384 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da603a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f49ac017c48 size 128 | #384 spent 0.0965 milliseconds in ikev2_parent_outI1() | RESET processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #132 ikev2.ike failed too-many-retransmits | pstats #132 ikev2.ike deleted too-many-retransmits | #132 spent 2.57 milliseconds in total | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-132" #132: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #132: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #132 "road-eastnet-nonat-132" #132: deleting IKE SA for connection 'road-eastnet-nonat-132' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 5 resuming | crypto helper 5 starting work-order 384 for state #384 | add revival: connection 'road-eastnet-nonat-132' added to the list and scheduled for 0 seconds | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 384 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-132 | State DB: deleting IKEv2 state #132 in PARENT_I1 | parent state #132: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 384 time elapsed 0.000741 seconds | (#384) spent 0.744 milliseconds in crypto helper computing work-order 384: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 384 for state #384 to event queue | scheduling resume sending helper answer for #384 | libevent_malloc: new ptr-libevent@0x7f49ac0285e8 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #132 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4980012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | in statetime_stop() and could not find #132 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-132 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-132' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-132" | stop processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:349) | spent 0.0705 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 384 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #384 | **emit ISAKMP Message: | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | ikev2 g^x aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | ikev2 g^x 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | ikev2 g^x d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | ikev2 g^x 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | ikev2 g^x a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | ikev2 g^x 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ikev2 g^x ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | ikev2 g^x 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | ikev2 g^x f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | ikev2 g^x 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | ikev2 g^x cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | ikev2 g^x aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | ikev2 g^x 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ikev2 g^x ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | ikev2 g^x 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 ef 00 0c 61 2d da ca 95 29 62 35 86 11 b0 2f | IKEv2 nonce 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e 5f 36 ef 80 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8f 08 ab 9f fb 85 44 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 84 | natd_hash: port=500 | natd_hash: hash= 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c e4 d1 32 4f | natd_hash: hash= 89 b2 0d f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c e4 d1 32 4f | Notify data 89 b2 0d f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8f 08 ab 9f fb 85 44 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | natd_hash: hash= ad 66 5c 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | Notify data ad 66 5c 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #384 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #384: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #384 to 4294967295 after switching state | Message ID: IKE #384 skipping update_recv as MD is fake | Message ID: sent #384 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.132:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | state #384 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac017c48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da603a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f498c0284d8 size 128 | #384 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.672066 | resume sending helper answer for #384 suppresed complete_v2_state_transition() and stole MD | #384 spent 0.442 milliseconds in resume sending helper answer | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac0285e8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.681381; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f49ac0285e8 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | libevent_free: release ptr-libevent@0x7f497c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #369 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.084 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.686022; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f497c0122d8 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #377 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0976 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.687537; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002445 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | libevent_free: release ptr-libevent@0x7f49a0022ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #353 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0996 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.702082; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | libevent_free: release ptr-libevent@0x7f499001d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #325 spent 0.39 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.188 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.723952; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004441 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f499001d5b8 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | libevent_free: release ptr-libevent@0x7f49b400f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #264 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.733858; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008518 exceeds limit? YES "road-eastnet-nonat-133" #133: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-133" #133: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #385 at 0x55564da41348 | State DB: adding IKEv2 state #385 in UNDEFINED | pstats #385 ikev2.ike started | Message ID: init #385: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #385: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #385; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-133" #385: initiating v2 parent SA to replace #133 | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 385 for state #385 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dacd0b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f49b400f798 size 128 | #385 spent 0.393 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 385 for state #385 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #133 ikev2.ike failed too-many-retransmits | pstats #133 ikev2.ike deleted too-many-retransmits | #133 spent 2.51 milliseconds in total | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 385 | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-133" #133: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #133: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #133 "road-eastnet-nonat-133" #133: deleting IKE SA for connection 'road-eastnet-nonat-133' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-133' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-133 | State DB: deleting IKEv2 state #133 in PARENT_I1 | parent state #133: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #133 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 385 time elapsed 0.004539 seconds | libevent_free: release ptr-libevent@0x55564d98e708 | (#385) spent 4.5 milliseconds in crypto helper computing work-order 385: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 385 for state #385 to event queue | scheduling resume sending helper answer for #385 | libevent_malloc: new ptr-libevent@0x7f49b00283c8 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | crypto helper 6 waiting (nothing to do) | in statetime_stop() and could not find #133 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-133 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-133' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-133" | stop processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:349) | spent 0.218 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 385 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #385 | **emit ISAKMP Message: | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | ikev2 g^x 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | ikev2 g^x f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | ikev2 g^x 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | ikev2 g^x 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | ikev2 g^x 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | ikev2 g^x a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | ikev2 g^x e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | ikev2 g^x 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | ikev2 g^x 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | ikev2 g^x 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | ikev2 g^x 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | ikev2 g^x 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | ikev2 g^x 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | ikev2 g^x 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | ikev2 g^x 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 19 68 1d 6a | IKEv2 nonce ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c 8f c4 55 62 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 76 cf f4 e5 ce 74 1a d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 85 | natd_hash: port=500 | natd_hash: hash= 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e 32 70 ef 92 | natd_hash: hash= 86 d3 9e 38 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e 32 70 ef 92 | Notify data 86 d3 9e 38 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 76 cf f4 e5 ce 74 1a d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | natd_hash: hash= d7 68 1b b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | Notify data d7 68 1b b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #385 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #385: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #385 to 4294967295 after switching state | Message ID: IKE #385 skipping update_recv as MD is fake | Message ID: sent #385 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.133:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | state #385 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b400f798 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dacd0b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 | #385 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.741684 | resume sending helper answer for #385 suppresed complete_v2_state_transition() and stole MD | #385 spent 2.09 milliseconds in resume sending helper answer | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b00283c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.745196; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f49b00283c8 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #354 spent 0.249 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.131 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.746808; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #378 spent 0.286 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.141 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.763403; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | libevent_free: release ptr-libevent@0x7f49b401fd78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #370 spent 0.282 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.779118; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | libevent_free: release ptr-libevent@0x7f49b0017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #326 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.182 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.784983; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f49b0017cf8 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | libevent_free: release ptr-libevent@0x7f49a4017b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #265 spent 0.37 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.176 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.79582; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008066 exceeds limit? YES "road-eastnet-nonat-134" #134: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-134" #134: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #386 at 0x55564da42a58 | State DB: adding IKEv2 state #386 in UNDEFINED | pstats #386 ikev2.ike started | Message ID: init #386: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #386: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #386; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-134" #386: initiating v2 parent SA to replace #134 | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 386 for state #386 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab16d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f49a4017b98 size 128 | #386 spent 0.275 milliseconds in ikev2_parent_outI1() | RESET processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #134 ikev2.ike failed too-many-retransmits | pstats #134 ikev2.ike deleted too-many-retransmits | #134 spent 3.2 milliseconds in total | crypto helper 7 resuming | crypto helper 7 starting work-order 386 for state #386 | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-134" #134: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 386 | parent state #134: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #134 "road-eastnet-nonat-134" #134: deleting IKE SA for connection 'road-eastnet-nonat-134' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-134' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-134 | State DB: deleting IKEv2 state #134 in PARENT_I1 | parent state #134: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 386 time elapsed 0.002307 seconds | stop processing: state #134 from 192.1.2.23 (in delete_state() at state.c:1143) | (#386) spent 2.31 milliseconds in crypto helper computing work-order 386: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 386 for state #386 to event queue | libevent_free: release ptr-libevent@0x7f497c0121d8 | scheduling resume sending helper answer for #386 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | crypto helper 7 waiting (nothing to do) | in statetime_stop() and could not find #134 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-134 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-134' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-134" | stop processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:349) | spent 0.166 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 386 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #386 | **emit ISAKMP Message: | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | ikev2 g^x 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | ikev2 g^x 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | ikev2 g^x 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | ikev2 g^x b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | ikev2 g^x f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | ikev2 g^x 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | ikev2 g^x a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | ikev2 g^x 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | ikev2 g^x 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | ikev2 g^x 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | ikev2 g^x 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | ikev2 g^x b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | ikev2 g^x cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | ikev2 g^x 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | ikev2 g^x 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 5f b6 29 de | IKEv2 nonce 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 58 73 8c da | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 27 c6 b6 9f 8a 51 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 86 | natd_hash: port=500 | natd_hash: hash= 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee d9 38 af 5f | natd_hash: hash= 6e 43 6d be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee d9 38 af 5f | Notify data 6e 43 6d be | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e7 27 c6 b6 9f 8a 51 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | natd_hash: hash= f7 f7 31 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | Notify data f7 f7 31 87 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #386 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #386: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #386 to 4294967295 after switching state | Message ID: IKE #386 skipping update_recv as MD is fake | Message ID: sent #386 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.134:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | state #386 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a4017b98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab16d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f4984028c98 size 128 | #386 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.800392 | resume sending helper answer for #386 suppresed complete_v2_state_transition() and stole MD | #386 spent 1.35 milliseconds in resume sending helper answer | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a401d1f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.184 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.807918; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | libevent_free: release ptr-libevent@0x7f49a8028668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #379 spent 0.353 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.808328; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f49a8028668 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | libevent_free: release ptr-libevent@0x7f4990017bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #355 spent 0.285 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.19 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.157 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.822257; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f4990017bf8 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | libevent_free: release ptr-libevent@0x7f49780242d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #371 spent 0.377 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.83505; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | libevent_free: release ptr-libevent@0x7f498801d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #327 spent 0.405 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.845088; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f498801d3f8 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | libevent_free: release ptr-libevent@0x7f49a8017d18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #266 spent 0.455 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.853025; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006409 exceeds limit? YES "road-eastnet-nonat-135" #135: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-135" #135: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #387 at 0x55564da44168 | State DB: adding IKEv2 state #387 in UNDEFINED | pstats #387 ikev2.ike started | Message ID: init #387: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #387: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #387; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-135" #387: initiating v2 parent SA to replace #135 | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 387 for state #387 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f49a8017d18 size 128 | #387 spent 0.286 milliseconds in ikev2_parent_outI1() | RESET processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #135 ikev2.ike failed too-many-retransmits | pstats #135 ikev2.ike deleted too-many-retransmits | #135 spent 2.5 milliseconds in total | crypto helper 8 resuming | crypto helper 8 starting work-order 387 for state #387 | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 387 "road-eastnet-nonat-135" #135: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #135: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #135 "road-eastnet-nonat-135" #135: deleting IKE SA for connection 'road-eastnet-nonat-135' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-135' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-135 | State DB: deleting IKEv2 state #135 in PARENT_I1 | parent state #135: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 387 time elapsed 0.002595 seconds | (#387) spent 2.59 milliseconds in crypto helper computing work-order 387: ikev2_outI1 KE (pcr) | stop processing: state #135 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498c017a48 | crypto helper 8 sending results from work-order 387 for state #387 to event queue | scheduling resume sending helper answer for #387 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | in statetime_stop() and could not find #135 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 8 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-135 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-135' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-135" | stop processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:349) | spent 0.163 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 387 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #387 | **emit ISAKMP Message: | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | ikev2 g^x 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | ikev2 g^x 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | ikev2 g^x 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | ikev2 g^x 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ikev2 g^x ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | ikev2 g^x 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | ikev2 g^x b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | ikev2 g^x e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | ikev2 g^x 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | ikev2 g^x a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | ikev2 g^x 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | ikev2 g^x 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | ikev2 g^x 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | ikev2 g^x d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | ikev2 g^x 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af 30 46 08 68 1c ed e0 82 e1 74 56 6f 51 bf 1a | IKEv2 nonce 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 05 09 92 ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 15 a6 7e bc 33 e9 c3 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 87 | natd_hash: port=500 | natd_hash: hash= 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e 82 09 3b ef | natd_hash: hash= c6 ee a5 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e 82 09 3b ef | Notify data c6 ee a5 65 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 15 a6 7e bc 33 e9 c3 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | natd_hash: hash= ff c2 9c 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | Notify data ff c2 9c 91 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #387 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #387: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #387 to 4294967295 after switching state | Message ID: IKE #387 skipping update_recv as MD is fake | Message ID: sent #387 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.135:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | state #387 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8017d18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f49880284d8 size 128 | #387 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.858082 | resume sending helper answer for #387 suppresed complete_v2_state_transition() and stole MD | #387 spent 1.53 milliseconds in resume sending helper answer | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8028768 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.865655; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | libevent_free: release ptr-libevent@0x7f499c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #380 spent 0.606 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.293 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.874862; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003665 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f499c0284d8 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #356 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.883724; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | libevent_free: release ptr-libevent@0x7f496c022cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #372 spent 0.439 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.903573; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f496c022cc8 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | libevent_free: release ptr-libevent@0x7f4990012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #267 spent 0.417 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.913468; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007266 exceeds limit? YES "road-eastnet-nonat-136" #136: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-136" #136: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #388 at 0x55564da45878 | State DB: adding IKEv2 state #388 in UNDEFINED | pstats #388 ikev2.ike started | Message ID: init #388: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #388: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #388; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-136" #388: initiating v2 parent SA to replace #136 | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 388 for state #388 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f4990012488 size 128 | #388 spent 0.298 milliseconds in ikev2_parent_outI1() | RESET processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 388 for state #388 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 388 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #136 ikev2.ike failed too-many-retransmits | pstats #136 ikev2.ike deleted too-many-retransmits | #136 spent 2.33 milliseconds in total | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-136" #136: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #136: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #136 "road-eastnet-nonat-136" #136: deleting IKE SA for connection 'road-eastnet-nonat-136' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-136' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-136 | State DB: deleting IKEv2 state #136 in PARENT_I1 | parent state #136: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 388 time elapsed 0.002551 seconds | (#388) spent 2.56 milliseconds in crypto helper computing work-order 388: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 388 for state #388 to event queue | stop processing: state #136 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d9b56d8 | scheduling resume sending helper answer for #388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | in statetime_stop() and could not find #136 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f499c0285d8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-136 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 9 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-136' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-136" | stop processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:349) | spent 0.194 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 388 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #388 | **emit ISAKMP Message: | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | ikev2 g^x bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | ikev2 g^x 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | ikev2 g^x a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | ikev2 g^x fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | ikev2 g^x c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | ikev2 g^x 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | ikev2 g^x de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | ikev2 g^x 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | ikev2 g^x 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | ikev2 g^x d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | ikev2 g^x 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | ikev2 g^x 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | ikev2 g^x c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | ikev2 g^x af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | ikev2 g^x 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 bc ae ff e0 | IKEv2 nonce 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 b9 b8 d7 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 74 bc 1e cb 35 eb f2 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 88 | natd_hash: port=500 | natd_hash: hash= 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 29 71 07 29 | natd_hash: hash= 24 ef aa f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 29 71 07 29 | Notify data 24 ef aa f9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 74 bc 1e cb 35 eb f2 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | natd_hash: hash= 27 8b 12 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | Notify data 27 8b 12 3a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #388 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #388: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #388 to 4294967295 after switching state | Message ID: IKE #388 skipping update_recv as MD is fake | Message ID: sent #388 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.136:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | state #388 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4990012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f497c028598 size 128 | #388 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.918481 | resume sending helper answer for #388 suppresed complete_v2_state_transition() and stole MD | #388 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c0285d8 | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.918644; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f499c0285d8 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #328 spent 0.335 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10648.926652; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | libevent_free: release ptr-libevent@0x7f49a0028418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #381 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.935556; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003108 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f49a0028418 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #357 spent 0.412 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10648.940435; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | libevent_free: release ptr-libevent@0x7f49bc0256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | #373 spent 0.403 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10648.964304; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f49bc0256e8 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | libevent_free: release ptr-libevent@0x7f49a0017b98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #268 spent 0.435 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.216 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10648.971274; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005424 exceeds limit? YES "road-eastnet-nonat-137" #137: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-137" #137: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #389 at 0x55564da46f88 | State DB: adding IKEv2 state #389 in UNDEFINED | pstats #389 ikev2.ike started | Message ID: init #389: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #389: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #389; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-137" #389: initiating v2 parent SA to replace #137 | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 389 for state #389 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f49a0017b98 size 128 | #389 spent 0.405 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | RESET processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 starting work-order 389 for state #389 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #137 ikev2.ike failed too-many-retransmits | pstats #137 ikev2.ike deleted too-many-retransmits | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 389 | #137 spent 2.25 milliseconds in total | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-137" #137: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #137: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #137 "road-eastnet-nonat-137" #137: deleting IKE SA for connection 'road-eastnet-nonat-137' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-137' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-137 | State DB: deleting IKEv2 state #137 in PARENT_I1 | parent state #137: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #137 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 389 time elapsed 0.004693 seconds | libevent_free: release ptr-libevent@0x55564da0c408 | (#389) spent 4.7 milliseconds in crypto helper computing work-order 389: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | crypto helper 10 sending results from work-order 389 for state #389 to event queue | in statetime_stop() and could not find #137 | scheduling resume sending helper answer for #389 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 10 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-137 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-137' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-137" | stop processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:349) | spent 0.22 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 389 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #389 | **emit ISAKMP Message: | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | ikev2 g^x 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | ikev2 g^x 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | ikev2 g^x 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | ikev2 g^x b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ikev2 g^x ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | ikev2 g^x 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | ikev2 g^x 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | ikev2 g^x 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | ikev2 g^x 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | ikev2 g^x 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | ikev2 g^x 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | ikev2 g^x 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | ikev2 g^x 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | ikev2 g^x 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | ikev2 g^x df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d 93 99 84 46 | IKEv2 nonce f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 af 7b e7 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a8 89 be 22 84 d1 d1 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 89 | natd_hash: port=500 | natd_hash: hash= 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a bd 8b 1a 03 | natd_hash: hash= 2b c9 b7 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a bd 8b 1a 03 | Notify data 2b c9 b7 5c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a8 89 be 22 84 d1 d1 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | natd_hash: hash= 6d f0 f1 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | Notify data 6d f0 f1 bf | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #389 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #389: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #389 to 4294967295 after switching state | Message ID: IKE #389 skipping update_recv as MD is fake | Message ID: sent #389 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.137:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | state #389 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a0017b98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f49800284c8 size 128 | #389 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10648.979485 | resume sending helper answer for #389 suppresed complete_v2_state_transition() and stole MD | #389 spent 2.23 milliseconds in resume sending helper answer | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a000ca08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10648.979891; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #329 spent 0.355 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10648.992639; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002619 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #358 spent 0.207 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.003162; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #374 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.017505; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | libevent_free: release ptr-libevent@0x7f4994028648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #382 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.031802; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f4994028648 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #269 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.038095; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004342 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | libevent_free: release ptr-libevent@0x7f497401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #330 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.053361; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f497401d568 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | libevent_free: release ptr-libevent@0x7f4984012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #359 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.063636; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005966 exceeds limit? YES "road-eastnet-nonat-138" #138: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-138" #138: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #390 at 0x55564da48698 | State DB: adding IKEv2 state #390 in UNDEFINED | pstats #390 ikev2.ike started | Message ID: init #390: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #390: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #390; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-138" #390: initiating v2 parent SA to replace #138 | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 390 for state #390 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f4984012488 size 128 | #390 spent 0.0762 milliseconds in ikev2_parent_outI1() | RESET processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #138 ikev2.ike failed too-many-retransmits | pstats #138 ikev2.ike deleted too-many-retransmits | #138 spent 7.01 milliseconds in total | crypto helper 11 starting work-order 390 for state #390 | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 390 "road-eastnet-nonat-138" #138: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #138: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #138 "road-eastnet-nonat-138" #138: deleting IKE SA for connection 'road-eastnet-nonat-138' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-138' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-138 | State DB: deleting IKEv2 state #138 in PARENT_I1 | parent state #138: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 390 time elapsed 0.000781 seconds | (#390) spent 0.782 milliseconds in crypto helper computing work-order 390: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 390 for state #390 to event queue | scheduling resume sending helper answer for #390 | libevent_malloc: new ptr-libevent@0x7f4994028748 size 128 | crypto helper 11 waiting (nothing to do) | stop processing: state #138 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c0282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | in statetime_stop() and could not find #138 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-138 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-138' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-138" | stop processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:349) | spent 0.0589 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 390 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #390 | **emit ISAKMP Message: | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | ikev2 g^x 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | ikev2 g^x e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | ikev2 g^x 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | ikev2 g^x a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | ikev2 g^x 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | ikev2 g^x 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | ikev2 g^x 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | ikev2 g^x 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | ikev2 g^x 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | ikev2 g^x dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | ikev2 g^x e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | ikev2 g^x 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | ikev2 g^x b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | ikev2 g^x 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | ikev2 g^x 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e7 04 30 e4 1a c4 0f 3e 14 95 31 ac 5b 98 80 c2 | IKEv2 nonce 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 12 98 de ad | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 91 6a 31 61 8c d9 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8a | natd_hash: port=500 | natd_hash: hash= 4d 44 64 a1 46 96 c1 48 f2 cc db a6 2a c8 f2 18 | natd_hash: hash= af c8 9e 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 44 64 a1 46 96 c1 48 f2 cc db a6 2a c8 f2 18 | Notify data af c8 9e 40 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 49 91 6a 31 61 8c d9 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | natd_hash: hash= 62 fc 07 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | Notify data 62 fc 07 fd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #390 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #390: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #390 to 4294967295 after switching state | Message ID: IKE #390 skipping update_recv as MD is fake | Message ID: sent #390 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.138:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | state #390 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f4974028648 size 128 | #390 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.064999 | resume sending helper answer for #390 suppresed complete_v2_state_transition() and stole MD | #390 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994028748 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.06617; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f4994028748 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #375 spent 0.0853 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.098531; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | libevent_free: release ptr-libevent@0x7f497801d998 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #331 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.104912; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f497801d998 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | libevent_free: release ptr-libevent@0x7f4998017c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #270 spent 0.0912 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.11032; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f4998017c78 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | libevent_free: release ptr-libevent@0x7f4998028538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #383 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.112745; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f4998028538 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | libevent_free: release ptr-libevent@0x7f49ac01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #360 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.125126; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #376 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.130475; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00826 exceeds limit? YES "road-eastnet-nonat-139" #139: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-139" #139: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #391 at 0x55564da49da8 | State DB: adding IKEv2 state #391 in UNDEFINED | pstats #391 ikev2.ike started | Message ID: init #391: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #391: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #391; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-139" #391: initiating v2 parent SA to replace #139 | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 391 for state #391 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ce048 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f498803e3d8 size 128 | #391 spent 0.12 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | RESET processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 starting work-order 391 for state #391 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 391 | pstats #139 ikev2.ike failed too-many-retransmits | pstats #139 ikev2.ike deleted too-many-retransmits | #139 spent 2.74 milliseconds in total | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-139" #139: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #139: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #139 "road-eastnet-nonat-139" #139: deleting IKE SA for connection 'road-eastnet-nonat-139' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-139' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-139 | State DB: deleting IKEv2 state #139 in PARENT_I1 | parent state #139: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 391 time elapsed 0.000985 seconds | (#391) spent 0.992 milliseconds in crypto helper computing work-order 391: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 391 for state #391 to event queue | scheduling resume sending helper answer for #391 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 | stop processing: state #139 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 12 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | in statetime_stop() and could not find #139 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-139 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-139' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-139" | stop processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:349) | spent 0.0925 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 391 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #391 | **emit ISAKMP Message: | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | ikev2 g^x d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | ikev2 g^x 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | ikev2 g^x f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | ikev2 g^x aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | ikev2 g^x 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | ikev2 g^x 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | ikev2 g^x 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | ikev2 g^x c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ikev2 g^x ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | ikev2 g^x 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | ikev2 g^x fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | ikev2 g^x 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | ikev2 g^x 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | ikev2 g^x 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ikev2 g^x ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 2e f4 d2 68 | IKEv2 nonce be 67 68 85 e9 b4 48 5a c8 d5 6e c3 d2 0c 51 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f1 94 1c 13 50 26 09 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8b | natd_hash: port=500 | natd_hash: hash= c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 96 53 12 ca | natd_hash: hash= d4 d6 fc 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 96 53 12 ca | Notify data d4 d6 fc 65 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f1 94 1c 13 50 26 09 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | natd_hash: hash= ef de 41 fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | Notify data ef de 41 fa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #391 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #391: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #391 to 4294967295 after switching state | Message ID: IKE #391 skipping update_recv as MD is fake | Message ID: sent #391 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.139:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | state #391 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498803e3d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ce048 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f4978028508 size 128 | #391 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.132385 | resume sending helper answer for #391 suppresed complete_v2_state_transition() and stole MD | #391 spent 0.546 milliseconds in resume sending helper answer | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998028438 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.163002; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #332 spent 0.457 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.16995; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #271 spent 0.444 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.276 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.172932; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | libevent_free: release ptr-libevent@0x7f498c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #384 spent 0.554 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.175054; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003132 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f498c0284d8 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #361 spent 0.397 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.187918; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00297 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | libevent_free: release ptr-libevent@0x7f497c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #377 spent 0.4 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.190816; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006191 exceeds limit? YES "road-eastnet-nonat-140" #140: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-140" #140: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #392 at 0x55564da4b5b8 | State DB: adding IKEv2 state #392 in UNDEFINED | pstats #392 ikev2.ike started | Message ID: init #392: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #392: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #392; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-140" #392: initiating v2 parent SA to replace #140 | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 392 for state #392 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f497c0122d8 size 128 | #392 spent 0.264 milliseconds in ikev2_parent_outI1() | RESET processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #140 ikev2.ike failed too-many-retransmits | pstats #140 ikev2.ike deleted too-many-retransmits | #140 spent 2.49 milliseconds in total | crypto helper 13 resuming | crypto helper 13 starting work-order 392 for state #392 | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 392 "road-eastnet-nonat-140" #140: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #140: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #140 "road-eastnet-nonat-140" #140: deleting IKE SA for connection 'road-eastnet-nonat-140' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-140' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-140 | State DB: deleting IKEv2 state #140 in PARENT_I1 | parent state #140: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 392 time elapsed 0.002852 seconds | stop processing: state #140 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a00332f8 | (#392) spent 2.83 milliseconds in crypto helper computing work-order 392: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | in statetime_stop() and could not find #140 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 sending results from work-order 392 for state #392 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #392 Initiating connection road-eastnet-nonat-140 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f498c0283d8 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-140' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-140" | stop processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:349) | spent 0.18 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 392 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #392 | **emit ISAKMP Message: | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | ikev2 g^x d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | ikev2 g^x 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | ikev2 g^x 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | ikev2 g^x 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | ikev2 g^x b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | ikev2 g^x 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | ikev2 g^x f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | ikev2 g^x a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | ikev2 g^x 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | ikev2 g^x 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | ikev2 g^x 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | ikev2 g^x dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | ikev2 g^x 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | ikev2 g^x a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | ikev2 g^x 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce f5 eb fe bf | IKEv2 nonce 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 1e 2e c9 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 21 54 4a 66 bc 5e e5 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8c | natd_hash: port=500 | natd_hash: hash= a7 3b d0 7d 31 66 f3 86 06 04 28 1f dc 2d ed 45 | natd_hash: hash= a2 a4 ea df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 3b d0 7d 31 66 f3 86 06 04 28 1f dc 2d ed 45 | Notify data a2 a4 ea df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 21 54 4a 66 bc 5e e5 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | natd_hash: hash= 68 bb e3 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | Notify data 68 bb e3 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #392 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #392: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #392 to 4294967295 after switching state | Message ID: IKE #392 skipping update_recv as MD is fake | Message ID: sent #392 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.140:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | state #392 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c0122d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49b00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f496c028638 size 128 | #392 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.196066 | resume sending helper answer for #392 suppresed complete_v2_state_transition() and stole MD | #392 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c0283d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.236631; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004342 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f498c0283d8 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #272 spent 0.448 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.240553; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #385 spent 0.562 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.247695; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #378 spent 0.6 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.248382; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00391 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | libevent_free: release ptr-libevent@0x7f4974022cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #362 spent 0.516 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.249675; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f4974022cd8 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | libevent_free: release ptr-libevent@0x7f498401d2f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #333 spent 0.536 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.285 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.260795; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008507 exceeds limit? YES "road-eastnet-nonat-141" #141: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-141" #141: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #393 at 0x55564da4cc18 | State DB: adding IKEv2 state #393 in UNDEFINED | pstats #393 ikev2.ike started | Message ID: init #393: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #393: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #393; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-141" #393: initiating v2 parent SA to replace #141 | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 393 for state #393 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac5bd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f498401d2f8 size 128 | #393 spent 0.269 milliseconds in ikev2_parent_outI1() | RESET processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #141 ikev2.ike failed too-many-retransmits | pstats #141 ikev2.ike deleted too-many-retransmits | #141 spent 3.24 milliseconds in total | crypto helper 14 resuming | crypto helper 14 starting work-order 393 for state #393 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 393 | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-141" #141: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #141: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #141 "road-eastnet-nonat-141" #141: deleting IKE SA for connection 'road-eastnet-nonat-141' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-141' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-141 | State DB: deleting IKEv2 state #141 in PARENT_I1 | parent state #141: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 393 time elapsed 0.002623 seconds | stop processing: state #141 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da7a6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | in statetime_stop() and could not find #141 | (#393) spent 2.6 milliseconds in crypto helper computing work-order 393: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 393 for state #393 to event queue | scheduling resume sending helper answer for #393 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-141 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-141' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-141" | stop processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:349) | spent 0.182 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 393 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #393 | **emit ISAKMP Message: | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | ikev2 g^x 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | ikev2 g^x f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | ikev2 g^x 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | ikev2 g^x b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | ikev2 g^x 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | ikev2 g^x 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | ikev2 g^x f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | ikev2 g^x 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | ikev2 g^x bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | ikev2 g^x 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | ikev2 g^x 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | ikev2 g^x 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | ikev2 g^x dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | ikev2 g^x 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | ikev2 g^x 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9e b8 09 de f7 cf 9e b6 02 68 18 4c 66 7c 68 13 | IKEv2 nonce a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 b3 ff b4 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 71 69 e4 32 5e 68 bd 47 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8d | natd_hash: port=500 | natd_hash: hash= de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee 58 32 6b da | natd_hash: hash= e3 77 d1 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee 58 32 6b da | Notify data e3 77 d1 8a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 71 69 e4 32 5e 68 bd 47 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | natd_hash: hash= 4e 5f 9d 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | Notify data 4e 5f 9d 71 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #393 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #393: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #393 to 4294967295 after switching state | Message ID: IKE #393 skipping update_recv as MD is fake | Message ID: sent #393 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.141:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | state #393 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498401d2f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac5bd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f49bc02b048 size 128 | #393 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.265878 | resume sending helper answer for #393 suppresed complete_v2_state_transition() and stole MD | #393 spent 1.51 milliseconds in resume sending helper answer | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990028328 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.299461; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | libevent_free: release ptr-libevent@0x7f4984028c98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #386 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.308404; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.0045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f4984028c98 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | libevent_free: release ptr-libevent@0x7f49b801ffe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #334 spent 0.451 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.22 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.309201; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f49b801ffe8 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #379 spent 0.327 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.323995; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | libevent_free: release ptr-libevent@0x7f498801d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #363 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.326912; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007517 exceeds limit? YES "road-eastnet-nonat-142" #142: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-142" #142: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #394 at 0x55564da4e428 | State DB: adding IKEv2 state #394 in UNDEFINED | pstats #394 ikev2.ike started | Message ID: init #394: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #394: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #394; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-142" #394: initiating v2 parent SA to replace #142 | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 394 for state #394 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da136d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f498801d4f8 size 128 | #394 spent 0.266 milliseconds in ikev2_parent_outI1() | RESET processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #142 ikev2.ike failed too-many-retransmits | pstats #142 ikev2.ike deleted too-many-retransmits | #142 spent 3.08 milliseconds in total | crypto helper 15 resuming | crypto helper 15 starting work-order 394 for state #394 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 394 | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-142" #142: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #142: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #142 "road-eastnet-nonat-142" #142: deleting IKE SA for connection 'road-eastnet-nonat-142' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-142' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-142 | State DB: deleting IKEv2 state #142 in PARENT_I1 | parent state #142: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #142 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 394 time elapsed 0.002807 seconds | libevent_free: release ptr-libevent@0x7f49b8030f68 | (#394) spent 2.86 milliseconds in crypto helper computing work-order 394: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 394 for state #394 to event queue | scheduling resume sending helper answer for #394 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | in statetime_stop() and could not find #142 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-142 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 15 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-142' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-142" | stop processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:349) | spent 0.367 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.331054; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f49b402aea8 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | libevent_free: release ptr-libevent@0x7f4984017d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #273 spent 0.608 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.342 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 394 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #394 | **emit ISAKMP Message: | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | ikev2 g^x 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | ikev2 g^x b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | ikev2 g^x f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | ikev2 g^x 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | ikev2 g^x da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | ikev2 g^x cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | ikev2 g^x f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | ikev2 g^x 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | ikev2 g^x 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | ikev2 g^x 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | ikev2 g^x 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | ikev2 g^x 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | ikev2 g^x b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | ikev2 g^x 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | ikev2 g^x bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 d5 cb b6 14 | IKEv2 nonce a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 17 23 6f be | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 28 fb 94 96 2c a4 d0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8e | natd_hash: port=500 | natd_hash: hash= d3 cb 76 df a4 a8 15 02 74 e0 73 32 b6 94 52 02 | natd_hash: hash= fb 61 9c c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 cb 76 df a4 a8 15 02 74 e0 73 32 b6 94 52 02 | Notify data fb 61 9c c7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe 28 fb 94 96 2c a4 d0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | natd_hash: hash= 17 09 2c f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | Notify data 17 09 2c f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #394 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #394: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #394 to 4294967295 after switching state | Message ID: IKE #394 skipping update_recv as MD is fake | Message ID: sent #394 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.142:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | state #394 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498801d4f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da136d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f4984017d48 size 128 | #394 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.334106 | resume sending helper answer for #394 suppresed complete_v2_state_transition() and stole MD | #394 spent 1.93 milliseconds in resume sending helper answer | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984043a18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.255 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.357649; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | libevent_free: release ptr-libevent@0x7f49880284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #387 spent 0.23 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.366166; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f49880284d8 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #380 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.373572; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #335 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.387063; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | libevent_free: release ptr-libevent@0x7f496c022dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #364 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.387218; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007892 exceeds limit? YES "road-eastnet-nonat-143" #143: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-143" #143: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #395 at 0x55564da4fa88 | State DB: adding IKEv2 state #395 in UNDEFINED | pstats #395 ikev2.ike started | Message ID: init #395: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #395: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #395; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-143" #395: initiating v2 parent SA to replace #143 | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 395 for state #395 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f496c022dc8 size 128 | #395 spent 0.0819 milliseconds in ikev2_parent_outI1() | RESET processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #143 ikev2.ike failed too-many-retransmits | pstats #143 ikev2.ike deleted too-many-retransmits | #143 spent 2.26 milliseconds in total | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-143" #143: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #143: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #143 "road-eastnet-nonat-143" #143: deleting IKE SA for connection 'road-eastnet-nonat-143' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-143' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-143 | State DB: deleting IKEv2 state #143 in PARENT_I1 | parent state #143: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 resuming | crypto helper 16 starting work-order 395 for state #395 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 395 | stop processing: state #143 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f496c00ce18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | in statetime_stop() and could not find #143 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-143 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-143' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-143" | stop processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:349) | spent 0.0637 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 395 time elapsed 0.000608 seconds | (#395) spent 0.616 milliseconds in crypto helper computing work-order 395: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 395 for state #395 to event queue | scheduling resume sending helper answer for #395 | libevent_malloc: new ptr-libevent@0x7f49880283d8 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 395 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #395 | **emit ISAKMP Message: | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | ikev2 g^x 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | ikev2 g^x 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | ikev2 g^x 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | ikev2 g^x 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | ikev2 g^x 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | ikev2 g^x 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | ikev2 g^x 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | ikev2 g^x a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ikev2 g^x ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | ikev2 g^x d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | ikev2 g^x 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | ikev2 g^x 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | ikev2 g^x fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | ikev2 g^x 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | ikev2 g^x 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 3d 13 b3 20 | IKEv2 nonce dd 56 da 98 d1 06 e4 ba 58 3e 79 be 34 18 84 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 27 9a 3c 9d 66 ab 1b 91 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8f | natd_hash: port=500 | natd_hash: hash= 8c 71 1d 53 7f c9 61 4b 21 2c f4 df 2f 3e 1f 57 | natd_hash: hash= 4d 53 5e 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 71 1d 53 7f c9 61 4b 21 2c f4 df 2f 3e 1f 57 | Notify data 4d 53 5e 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 27 9a 3c 9d 66 ab 1b 91 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | natd_hash: hash= 1c 16 c4 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | Notify data 1c 16 c4 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #395 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #395: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #395 to 4294967295 after switching state | Message ID: IKE #395 skipping update_recv as MD is fake | Message ID: sent #395 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.143:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | state #395 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c022dc8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f49b802b8f8 size 128 | #395 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.388408 | resume sending helper answer for #395 suppresed complete_v2_state_transition() and stole MD | #395 spent 0.35 milliseconds in resume sending helper answer | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49880283d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.38968; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f49880283d8 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #274 spent 0.0923 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.41792; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | libevent_free: release ptr-libevent@0x7f497c028598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #388 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.427313; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f497c028598 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #381 spent 0.0915 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.444581; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | libevent_free: release ptr-libevent@0x7f49bc0257e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #365 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da51d68 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.447954; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006829 exceeds limit? YES "road-eastnet-nonat-144" #144: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-144" #144: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #396 at 0x55564da51198 | State DB: adding IKEv2 state #396 in UNDEFINED | pstats #396 ikev2.ike started | Message ID: init #396: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #396: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #396; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-144" #396: initiating v2 parent SA to replace #144 | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 396 for state #396 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f49bc0257e8 size 128 | #396 spent 0.076 milliseconds in ikev2_parent_outI1() | RESET processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 396 for state #396 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 396 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #144 ikev2.ike failed too-many-retransmits | pstats #144 ikev2.ike deleted too-many-retransmits | #144 spent 2.68 milliseconds in total | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-144" #144: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #144: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #144 "road-eastnet-nonat-144" #144: deleting IKE SA for connection 'road-eastnet-nonat-144' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-144' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-144 | State DB: deleting IKEv2 state #144 in PARENT_I1 | parent state #144: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #144 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b402acf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da51d68 | in statetime_stop() and could not find #144 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 396 time elapsed 0.000526 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#396) spent 0.536 milliseconds in crypto helper computing work-order 396: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 396 for state #396 to event queue | scheduling resume sending helper answer for #396 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 Initiating connection road-eastnet-nonat-144 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-144' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-144" | stop processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:349) | spent 0.0625 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 396 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #396 | **emit ISAKMP Message: | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | ikev2 g^x 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | ikev2 g^x 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | ikev2 g^x 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | ikev2 g^x 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | ikev2 g^x bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | ikev2 g^x d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | ikev2 g^x 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | ikev2 g^x fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | ikev2 g^x 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | ikev2 g^x 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | ikev2 g^x 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | ikev2 g^x 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ikev2 g^x ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | ikev2 g^x 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | ikev2 g^x 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 7d ef b2 24 | IKEv2 nonce 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 52 fd e5 d1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 70 a3 8e f7 aa c9 55 d0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 90 | natd_hash: port=500 | natd_hash: hash= 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 88 67 0d 41 | natd_hash: hash= 82 0d 24 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 88 67 0d 41 | Notify data 82 0d 24 8a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 70 a3 8e f7 aa c9 55 d0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | natd_hash: hash= 48 fe 25 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | Notify data 48 fe 25 49 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #396 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #396: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #396 to 4294967295 after switching state | Message ID: IKE #396 skipping update_recv as MD is fake | Message ID: sent #396 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.144:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | state #396 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc0257e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f49ac02dc98 size 128 | #396 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.449057 | resume sending helper answer for #396 suppresed complete_v2_state_transition() and stole MD | #396 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c0121d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.451331; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | libevent_free: release ptr-libevent@0x7f497c017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #275 spent 0.0802 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.458661; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #336 spent 0.0876 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.478936; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | libevent_free: release ptr-libevent@0x7f49800284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #389 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.501401; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f49800284c8 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | libevent_free: release ptr-libevent@0x7f49bc014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #366 spent 0.448 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.508173; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006267 exceeds limit? YES "road-eastnet-nonat-145" #145: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-145" #145: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #397 at 0x55564da52918 | State DB: adding IKEv2 state #397 in UNDEFINED | pstats #397 ikev2.ike started | Message ID: init #397: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #397: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #397; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-145" #397: initiating v2 parent SA to replace #145 | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 397 for state #397 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da68ee8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f49bc014e58 size 128 | #397 spent 0.239 milliseconds in ikev2_parent_outI1() | RESET processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #145 ikev2.ike failed too-many-retransmits | pstats #145 ikev2.ike deleted too-many-retransmits | #145 spent 2.32 milliseconds in total | crypto helper 3 resuming | crypto helper 3 starting work-order 397 for state #397 | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 397 "road-eastnet-nonat-145" #145: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #145: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #145 "road-eastnet-nonat-145" #145: deleting IKE SA for connection 'road-eastnet-nonat-145' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-145' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-145 | State DB: deleting IKEv2 state #145 in PARENT_I1 | parent state #145: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 397 time elapsed 0.002091 seconds | (#397) spent 2.07 milliseconds in crypto helper computing work-order 397: ikev2_outI1 KE (pcr) | stop processing: state #145 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da3d978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | in statetime_stop() and could not find #145 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 3 sending results from work-order 397 for state #397 to event queue | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #276 | scheduling resume sending helper answer for #397 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | libevent_malloc: new ptr-libevent@0x7f4980012588 size 128 | IKEv2 retransmit event | crypto helper 3 waiting (nothing to do) | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.510897; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f49b002dc88 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #276 spent 0.353 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.16 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-145 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-145' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-145" | stop processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:349) | spent 0.144 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 397 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #397 | **emit ISAKMP Message: | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | ikev2 g^x 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ikev2 g^x ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | ikev2 g^x 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | ikev2 g^x 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | ikev2 g^x 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | ikev2 g^x f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | ikev2 g^x 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | ikev2 g^x a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | ikev2 g^x e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | ikev2 g^x 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | ikev2 g^x 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | ikev2 g^x 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | ikev2 g^x 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | ikev2 g^x e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | ikev2 g^x a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f e6 2d fc 6d | IKEv2 nonce 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 39 86 54 9e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2f 62 56 80 20 f0 47 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 91 | natd_hash: port=500 | natd_hash: hash= ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 42 31 ee 7f | natd_hash: hash= 2d ca 25 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 42 31 ee 7f | Notify data 2d ca 25 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2f 62 56 80 20 f0 47 b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | natd_hash: hash= 6d 15 e8 78 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | Notify data 6d 15 e8 78 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #397 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #397: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #397 to 4294967295 after switching state | Message ID: IKE #397 skipping update_recv as MD is fake | Message ID: sent #397 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.145:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | state #397 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc014e58 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da68ee8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 | #397 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.512861 | resume sending helper answer for #397 suppresed complete_v2_state_transition() and stole MD | #397 spent 1.22 milliseconds in resume sending helper answer | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980012588 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.153 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.518321; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f4980012588 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #382 spent 0.335 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.169 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.540959; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #337 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.561409; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002912 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | libevent_free: release ptr-libevent@0x7f49b4014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #367 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.564702; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f49b4014f58 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | libevent_free: release ptr-libevent@0x7f4980018dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #277 spent 0.0955 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.564915; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | libevent_free: release ptr-libevent@0x7f4974028648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #390 spent 0.0891 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.570712; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008434 exceeds limit? YES "road-eastnet-nonat-146" #146: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-146" #146: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #398 at 0x55564da54028 | State DB: adding IKEv2 state #398 in UNDEFINED | pstats #398 ikev2.ike started | Message ID: init #398: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #398: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #398; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-146" #398: initiating v2 parent SA to replace #146 | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 398 for state #398 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f4974028648 size 128 | #398 spent 0.119 milliseconds in ikev2_parent_outI1() | RESET processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #146 ikev2.ike failed too-many-retransmits | pstats #146 ikev2.ike deleted too-many-retransmits | #146 spent 2.21 milliseconds in total | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-146" #146: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #146: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #146 "road-eastnet-nonat-146" #146: deleting IKE SA for connection 'road-eastnet-nonat-146' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-146' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-146 | State DB: deleting IKEv2 state #146 in PARENT_I1 | parent state #146: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 resuming | crypto helper 17 starting work-order 398 for state #398 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 398 | stop processing: state #146 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da17d58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | in statetime_stop() and could not find #146 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-146 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-146' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-146" | stop processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:349) | spent 0.0608 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 398 time elapsed 0.000531 seconds | (#398) spent 0.534 milliseconds in crypto helper computing work-order 398: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 398 for state #398 to event queue | scheduling resume sending helper answer for #398 | libevent_malloc: new ptr-libevent@0x7f4974028548 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 398 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #398 | **emit ISAKMP Message: | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | ikev2 g^x 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | ikev2 g^x c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | ikev2 g^x 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | ikev2 g^x 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | ikev2 g^x 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | ikev2 g^x cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | ikev2 g^x 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | ikev2 g^x e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | ikev2 g^x 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ikev2 g^x ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | ikev2 g^x c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | ikev2 g^x 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | ikev2 g^x d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | ikev2 g^x 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | ikev2 g^x f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae 90 66 59 db 15 87 77 e4 f7 88 94 64 07 a3 a1 | IKEv2 nonce 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd a6 a4 c3 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 38 80 d4 92 bb 7c 54 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 92 | natd_hash: port=500 | natd_hash: hash= 8f 6d 22 5d f8 cd ef 94 02 45 ff cb 2f 88 88 a5 | natd_hash: hash= e2 e3 71 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f 6d 22 5d f8 cd ef 94 02 45 ff cb 2f 88 88 a5 | Notify data e2 e3 71 1b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 38 80 d4 92 bb 7c 54 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | natd_hash: hash= e1 87 6b 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | Notify data e1 87 6b 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #398 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #398: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #398 to 4294967295 after switching state | Message ID: IKE #398 skipping update_recv as MD is fake | Message ID: sent #398 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.146:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | state #398 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974028648 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f49a402dd48 size 128 | #398 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.571867 | resume sending helper answer for #398 suppresed complete_v2_state_transition() and stole MD | #398 spent 0.34 milliseconds in resume sending helper answer | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974028548 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.602055; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f4974028548 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #338 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.611351; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | libevent_free: release ptr-libevent@0x7f4998017c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #383 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.623639; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f4998017c78 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | libevent_free: release ptr-libevent@0x7f49b8025758 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #368 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0749 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.627917; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006843 exceeds limit? YES "road-eastnet-nonat-147" #147: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-147" #147: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #399 at 0x55564da55738 | State DB: adding IKEv2 state #399 in UNDEFINED | pstats #399 ikev2.ike started | Message ID: init #399: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #399: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #399; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-147" #399: initiating v2 parent SA to replace #147 | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 399 for state #399 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dad7378 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f49b8025758 size 128 | #399 spent 0.0785 milliseconds in ikev2_parent_outI1() | RESET processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #147 ikev2.ike failed too-many-retransmits | pstats #147 ikev2.ike deleted too-many-retransmits | #147 spent 2.38 milliseconds in total | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-147" #147: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #147: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #147 "road-eastnet-nonat-147" #147: deleting IKE SA for connection 'road-eastnet-nonat-147' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-147' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-147 | State DB: deleting IKEv2 state #147 in PARENT_I1 | parent state #147: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 resuming | crypto helper 18 starting work-order 399 for state #399 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 399 | stop processing: state #147 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497c01d2b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | in statetime_stop() and could not find #147 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-147 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-147' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-147" | stop processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:349) | spent 0.0598 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 399 time elapsed 0.000534 seconds | (#399) spent 0.537 milliseconds in crypto helper computing work-order 399: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 399 for state #399 to event queue | scheduling resume sending helper answer for #399 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 399 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #399 | **emit ISAKMP Message: | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | ikev2 g^x da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | ikev2 g^x 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | ikev2 g^x a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | ikev2 g^x cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | ikev2 g^x 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | ikev2 g^x 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | ikev2 g^x 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | ikev2 g^x a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | ikev2 g^x 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | ikev2 g^x b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | ikev2 g^x 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | ikev2 g^x be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | ikev2 g^x 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | ikev2 g^x 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | ikev2 g^x b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a 4d 23 27 76 af 48 4b 84 00 20 aa ca 71 91 38 | IKEv2 nonce e4 07 4e f7 45 86 55 f8 e0 96 19 41 82 46 c4 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9d b8 e7 8c 67 3f fe 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 93 | natd_hash: port=500 | natd_hash: hash= c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 be 82 61 ec | natd_hash: hash= e5 67 43 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 be 82 61 ec | Notify data e5 67 43 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 9d b8 e7 8c 67 3f fe 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | natd_hash: hash= 11 41 f4 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | Notify data 11 41 f4 f3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #399 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #399: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #399 to 4294967295 after switching state | Message ID: IKE #399 skipping update_recv as MD is fake | Message ID: sent #399 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.147:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | state #399 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8025758 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dad7378 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f49a802de28 size 128 | #399 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.629 | resume sending helper answer for #399 suppresed complete_v2_state_transition() and stole MD | #399 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978028608 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.632176; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | libevent_free: release ptr-libevent@0x7f4978028508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #391 spent 0.0901 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.641448; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f4978028508 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #278 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.664908; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #339 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.673289; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001223 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #384 spent 0.085 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.682534; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | libevent_free: release ptr-libevent@0x7f49ac0285e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #369 spent 0.0894 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.695888; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f49ac0285e8 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | libevent_free: release ptr-libevent@0x7f496c028638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #392 spent 0.098 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.699244; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f496c028638 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | libevent_free: release ptr-libevent@0x7f497800cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #279 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.70051; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005996 exceeds limit? YES "road-eastnet-nonat-148" #148: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-148" #148: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #400 at 0x55564da56d98 | State DB: adding IKEv2 state #400 in UNDEFINED | pstats #400 ikev2.ike started | Message ID: init #400: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #400: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #400; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-148" #400: initiating v2 parent SA to replace #148 | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 400 for state #400 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9e8168 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f497800cab8 size 128 | #400 spent 0.0862 milliseconds in ikev2_parent_outI1() | RESET processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #148 ikev2.ike failed too-many-retransmits | pstats #148 ikev2.ike deleted too-many-retransmits | #148 spent 3.94 milliseconds in total | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-148" #148: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #148: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #148 "road-eastnet-nonat-148" #148: deleting IKE SA for connection 'road-eastnet-nonat-148' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-148' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-148 | State DB: deleting IKEv2 state #148 in PARENT_I1 | crypto helper 19 resuming | crypto helper 19 starting work-order 400 for state #400 | parent state #148: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 400 | stop processing: state #148 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49800333a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | in statetime_stop() and could not find #148 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-148 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-148' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-148" | stop processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:349) | spent 0.0637 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 400 time elapsed 0.000625 seconds | (#400) spent 0.623 milliseconds in crypto helper computing work-order 400: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 400 for state #400 to event queue | scheduling resume sending helper answer for #400 | libevent_malloc: new ptr-libevent@0x7f496c028738 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 400 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #400 | **emit ISAKMP Message: | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | ikev2 g^x 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | ikev2 g^x 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | ikev2 g^x 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | ikev2 g^x 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | ikev2 g^x d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | ikev2 g^x da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | ikev2 g^x 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | ikev2 g^x d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | ikev2 g^x 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | ikev2 g^x 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | ikev2 g^x 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | ikev2 g^x 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | ikev2 g^x d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | ikev2 g^x 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | ikev2 g^x bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 2d 96 8b 39 | IKEv2 nonce bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 5f 67 ab dd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 1c b7 b7 ad 1a c0 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 94 | natd_hash: port=500 | natd_hash: hash= a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 c5 01 b8 29 | natd_hash: hash= 57 e3 ad 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 c5 01 b8 29 | Notify data 57 e3 ad 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b7 1c b7 b7 ad 1a c0 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | natd_hash: hash= a1 dd 12 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | Notify data a1 dd 12 ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #400 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #400: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #400 to 4294967295 after switching state | Message ID: IKE #400 skipping update_recv as MD is fake | Message ID: sent #400 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.148:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | state #400 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497800cab8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9e8168 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 | #400 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.70172 | resume sending helper answer for #400 suppresed complete_v2_state_transition() and stole MD | #400 spent 0.361 milliseconds in resume sending helper answer | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c028738 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.729986; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f496c028738 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #340 spent 0.239 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.741547; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #385 spent 0.388 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.164 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.75936; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | libevent_free: release ptr-libevent@0x7f49bc01a7b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #280 spent 0.351 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.171 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.765097; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #370 spent 0.241 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.765371; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | libevent_free: release ptr-libevent@0x7f49bc02b048 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #393 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.766955; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010472 exceeds limit? YES "road-eastnet-nonat-149" #149: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-149" #149: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #401 at 0x55564da584a8 | State DB: adding IKEv2 state #401 in UNDEFINED | pstats #401 ikev2.ike started | Message ID: init #401: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #401: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #401; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-149" #401: initiating v2 parent SA to replace #149 | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 401 for state #401 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac5bd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f49bc02b048 size 128 | #401 spent 0.177 milliseconds in ikev2_parent_outI1() | RESET processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 401 for state #401 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #149 ikev2.ike failed too-many-retransmits | pstats #149 ikev2.ike deleted too-many-retransmits | #149 spent 2.76 milliseconds in total | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 401 | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-149" #149: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #149: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #149 "road-eastnet-nonat-149" #149: deleting IKE SA for connection 'road-eastnet-nonat-149' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-149' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-149 | State DB: deleting IKEv2 state #149 in PARENT_I1 | parent state #149: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 401 time elapsed 0.001625 seconds | stop processing: state #149 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da8d358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | in statetime_stop() and could not find #149 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | (#401) spent 1.49 milliseconds in crypto helper computing work-order 401: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-149 which received a Delete/Notify but must remain up per local policy | crypto helper 0 sending results from work-order 401 for state #401 to event queue | scheduling resume sending helper answer for #401 | libevent_malloc: new ptr-libevent@0x7f49bc02af48 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-149' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-149" | stop processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:349) | spent 0.184 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 401 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #401 | **emit ISAKMP Message: | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | ikev2 g^x f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | ikev2 g^x b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | ikev2 g^x 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | ikev2 g^x 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | ikev2 g^x 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | ikev2 g^x 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | ikev2 g^x 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | ikev2 g^x c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | ikev2 g^x 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | ikev2 g^x d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | ikev2 g^x 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | ikev2 g^x dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | ikev2 g^x b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | ikev2 g^x d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | ikev2 g^x 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c 45 c4 47 3e | IKEv2 nonce 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 59 ff aa 05 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 2f d6 40 d4 5f 67 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 95 | natd_hash: port=500 | natd_hash: hash= 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 07 1d fa 9c | natd_hash: hash= 82 90 1d e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 07 1d fa 9c | Notify data 82 90 1d e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 2f d6 40 d4 5f 67 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | natd_hash: hash= b0 e2 f8 ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | Notify data b0 e2 f8 ea | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #401 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #401: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #401 to 4294967295 after switching state | Message ID: IKE #401 skipping update_recv as MD is fake | Message ID: sent #401 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.149:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | state #401 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc02b048 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac5bd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 | #401 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.770231 | resume sending helper answer for #401 suppresed complete_v2_state_transition() and stole MD | #401 spent 1.03 milliseconds in resume sending helper answer | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc02af48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.800662; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f49bc02af48 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | libevent_free: release ptr-libevent@0x7f4990028328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #386 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.82006; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | libevent_free: release ptr-libevent@0x7f49780239c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #341 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.82343; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f49780239c8 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | libevent_free: release ptr-libevent@0x7f4990017bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #371 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.823619; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007482 exceeds limit? YES "road-eastnet-nonat-150" #150: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-150" #150: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #402 at 0x55564da59cb8 | State DB: adding IKEv2 state #402 in UNDEFINED | pstats #402 ikev2.ike started | Message ID: init #402: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #402: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #402; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-150" #402: initiating v2 parent SA to replace #150 | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 402 for state #402 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f4990017bf8 size 128 | #402 spent 0.106 milliseconds in ikev2_parent_outI1() | RESET processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #150 ikev2.ike failed too-many-retransmits | pstats #150 ikev2.ike deleted too-many-retransmits | #150 spent 2.12 milliseconds in total | crypto helper 2 resuming | crypto helper 2 starting work-order 402 for state #402 | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 402 "road-eastnet-nonat-150" #150: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #150: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #150 "road-eastnet-nonat-150" #150: deleting IKE SA for connection 'road-eastnet-nonat-150' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-150' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-150 | State DB: deleting IKEv2 state #150 in PARENT_I1 | parent state #150: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #150 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da4d778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 402 time elapsed 0.00088 seconds | in statetime_stop() and could not find #150 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#402) spent 0.887 milliseconds in crypto helper computing work-order 402: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 402 for state #402 to event queue | scheduling resume sending helper answer for #402 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 2 waiting (nothing to do) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-150 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-150' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-150" | stop processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:349) | spent 0.0655 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 402 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #402 | **emit ISAKMP Message: | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | ikev2 g^x 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | ikev2 g^x 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | ikev2 g^x 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | ikev2 g^x 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | ikev2 g^x 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | ikev2 g^x eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | ikev2 g^x 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | ikev2 g^x b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | ikev2 g^x b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | ikev2 g^x 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | ikev2 g^x 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | ikev2 g^x 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | ikev2 g^x 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | ikev2 g^x e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | ikev2 g^x f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 45 11 b0 91 e8 6e b8 fa 51 65 83 8e 94 0c 3f | IKEv2 nonce 17 03 c4 78 09 6c 3a ea f1 00 17 08 a9 9a c4 a0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 14 71 d8 6f 82 de 92 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 96 | natd_hash: port=500 | natd_hash: hash= dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 cf 66 1c 50 | natd_hash: hash= d6 14 4b 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 cf 66 1c 50 | Notify data d6 14 4b 97 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 14 71 d8 6f 82 de 92 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | natd_hash: hash= 7e 8e ea 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | Notify data 7e 8e ea 0b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #402 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #402: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #402 to 4294967295 after switching state | Message ID: IKE #402 skipping update_recv as MD is fake | Message ID: sent #402 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.150:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | state #402 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4990017bf8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b9b98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f499402deb8 size 128 | #402 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.825297 | resume sending helper answer for #402 suppresed complete_v2_state_transition() and stole MD | #402 spent 0.403 milliseconds in resume sending helper answer | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4035d78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.832606; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.4985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | libevent_free: release ptr-libevent@0x7f4984017d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #394 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.836922; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f4984017d48 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #281 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.858345; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #387 spent 0.195 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0929 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.882894; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006928 exceeds limit? YES "road-eastnet-nonat-151" #151: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-151" #151: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #403 at 0x55564da5b318 | State DB: adding IKEv2 state #403 in UNDEFINED | pstats #403 ikev2.ike started | Message ID: init #403: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #403: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #403; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-151" #403: initiating v2 parent SA to replace #151 | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 403 for state #403 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f4984043a18 size 128 | #403 spent 0.274 milliseconds in ikev2_parent_outI1() | RESET processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 4 starting work-order 403 for state #403 | pstats #151 ikev2.ike failed too-many-retransmits | pstats #151 ikev2.ike deleted too-many-retransmits | #151 spent 2.19 milliseconds in total | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-151" #151: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #151: PARENT_I1(half-open IKE SA) => delete | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 403 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #151 "road-eastnet-nonat-151" #151: deleting IKE SA for connection 'road-eastnet-nonat-151' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-151' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-151 | State DB: deleting IKEv2 state #151 in PARENT_I1 | parent state #151: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #151 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 403 time elapsed 0.005076 seconds | libevent_free: release ptr-libevent@0x55564da238e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | in statetime_stop() and could not find #151 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#403) spent 4.96 milliseconds in crypto helper computing work-order 403: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 4 sending results from work-order 403 for state #403 to event queue Initiating connection road-eastnet-nonat-151 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #403 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 | start processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-151' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | crypto helper 4 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-151" | stop processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:349) | spent 0.258 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.888925; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f499802dcf8 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #372 spent 0.358 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 403 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #403 | **emit ISAKMP Message: | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | ikev2 g^x 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | ikev2 g^x 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | ikev2 g^x 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | ikev2 g^x 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ikev2 g^x ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ikev2 g^x ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | ikev2 g^x b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | ikev2 g^x 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ikev2 g^x ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | ikev2 g^x 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | ikev2 g^x c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | ikev2 g^x 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | ikev2 g^x 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | ikev2 g^x be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | ikev2 g^x 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 18 81 30 8d | IKEv2 nonce 73 d7 cc 4d db dc c7 5c ef e5 b6 da 38 15 c9 ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d4 4b c3 7e 75 ee bb 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 97 | natd_hash: port=500 | natd_hash: hash= 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 51 34 34 50 | natd_hash: hash= 3f 7d b1 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 51 34 34 50 | Notify data 3f 7d b1 56 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d4 4b c3 7e 75 ee bb 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | natd_hash: hash= 7a b9 94 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | Notify data 7a b9 94 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #403 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #403: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #403 to 4294967295 after switching state | Message ID: IKE #403 skipping update_recv as MD is fake | Message ID: sent #403 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.151:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | state #403 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984043a18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | #403 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.891215 | resume sending helper answer for #403 suppresed complete_v2_state_transition() and stole MD | #403 spent 1.59 milliseconds in resume sending helper answer | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8030f68 | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.891371; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | libevent_free: release ptr-libevent@0x7f49b802b8f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #395 spent 0.323 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.898381; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f49b802b8f8 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | libevent_free: release ptr-libevent@0x7f498c022c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #342 spent 0.408 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.914342; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f498c022c78 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | libevent_free: release ptr-libevent@0x7f49b401a508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #282 spent 0.455 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.919557; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #388 spent 0.468 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10649.941555; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #373 spent 0.463 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10649.94954; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | libevent_free: release ptr-libevent@0x7f49ac02dc98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #396 spent 0.43 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10649.950151; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008422 exceeds limit? YES "road-eastnet-nonat-152" #152: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-152" #152: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #404 at 0x55564da5ca98 | State DB: adding IKEv2 state #404 in UNDEFINED | pstats #404 ikev2.ike started | Message ID: init #404: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #404: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #404; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-152" #404: initiating v2 parent SA to replace #152 | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 404 for state #404 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f49ac02dc98 size 128 | #404 spent 0.279 milliseconds in ikev2_parent_outI1() | RESET processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #152 ikev2.ike failed too-many-retransmits | pstats #152 ikev2.ike deleted too-many-retransmits | #152 spent 3.76 milliseconds in total | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 5 resuming | crypto helper 5 starting work-order 404 for state #404 "road-eastnet-nonat-152" #152: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #152: PARENT_I1(half-open IKE SA) => delete | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 404 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #152 "road-eastnet-nonat-152" #152: deleting IKE SA for connection 'road-eastnet-nonat-152' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-152' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-152 | State DB: deleting IKEv2 state #152 in PARENT_I1 | parent state #152: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 404 time elapsed 0.002622 seconds | (#404) spent 2.6 milliseconds in crypto helper computing work-order 404: ikev2_outI1 KE (pcr) | stop processing: state #152 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4994022bd8 | crypto helper 5 sending results from work-order 404 for state #404 to event queue | scheduling resume sending helper answer for #404 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | in statetime_stop() and could not find #152 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-152 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-152' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-152" | stop processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:349) | spent 0.183 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 404 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #404 | **emit ISAKMP Message: | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | ikev2 g^x 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | ikev2 g^x 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | ikev2 g^x 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | ikev2 g^x c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | ikev2 g^x 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | ikev2 g^x 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | ikev2 g^x fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | ikev2 g^x 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | ikev2 g^x 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | ikev2 g^x b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | ikev2 g^x 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | ikev2 g^x 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | ikev2 g^x 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | ikev2 g^x 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | ikev2 g^x 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef c9 1c c3 25 | IKEv2 nonce 67 af 61 86 70 40 7c 61 fb de 63 ec 58 e9 ae 33 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 04 a7 2e b2 3a 36 06 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 98 | natd_hash: port=500 | natd_hash: hash= 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 9b 50 e3 bc | natd_hash: hash= 16 5a 7b 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 9b 50 e3 bc | Notify data 16 5a 7b 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 04 a7 2e b2 3a 36 06 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | natd_hash: hash= 78 2b 5a 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | Notify data 78 2b 5a 00 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #404 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #404: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #404 to 4294967295 after switching state | Message ID: IKE #404 skipping update_recv as MD is fake | Message ID: sent #404 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.152:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | state #404 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac02dc98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8eab8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f498c02dc98 size 128 | #404 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10649.955443 | resume sending helper answer for #404 suppresed complete_v2_state_transition() and stole MD | #404 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac02dd98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10649.981055; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #389 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10649.985003; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | libevent_free: release ptr-libevent@0x7f4990022bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #343 spent 0.413 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10649.985465; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f4990022bb8 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | libevent_free: release ptr-libevent@0x7f49b801a678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #283 spent 0.346 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.181 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.004553; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f49b801a678 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #374 spent 0.531 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.008573; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00665 exceeds limit? YES "road-eastnet-nonat-153" #153: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-153" #153: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #405 at 0x55564da5e1a8 | State DB: adding IKEv2 state #405 in UNDEFINED | pstats #405 ikev2.ike started | Message ID: init #405: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #405: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #405; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-153" #405: initiating v2 parent SA to replace #153 | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 405 for state #405 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 | #405 spent 0.502 milliseconds in ikev2_parent_outI1() | RESET processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | crypto helper 6 starting work-order 405 for state #405 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #153 ikev2.ike failed too-many-retransmits | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 405 | pstats #153 ikev2.ike deleted too-many-retransmits | #153 spent 2.9 milliseconds in total | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-153" #153: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #153: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #153 "road-eastnet-nonat-153" #153: deleting IKE SA for connection 'road-eastnet-nonat-153' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-153' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-153 | State DB: deleting IKEv2 state #153 in PARENT_I1 | parent state #153: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #153 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da69038 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | in statetime_stop() and could not find #153 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 405 time elapsed 0.002658 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#405) spent 2.74 milliseconds in crypto helper computing work-order 405: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-153 which received a Delete/Notify but must remain up per local policy | crypto helper 6 sending results from work-order 405 for state #405 to event queue | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #405 | libevent_malloc: new ptr-libevent@0x7f49b002db88 size 128 | crypto helper 6 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-153' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-153" | stop processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:349) | spent 0.271 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.012618; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #397 spent 0.691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 405 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #405 | **emit ISAKMP Message: | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | ikev2 g^x b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | ikev2 g^x 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | ikev2 g^x 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | ikev2 g^x 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | ikev2 g^x b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | ikev2 g^x a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | ikev2 g^x 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | ikev2 g^x e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ikev2 g^x ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | ikev2 g^x 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | ikev2 g^x 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | ikev2 g^x 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | ikev2 g^x df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | ikev2 g^x 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | ikev2 g^x 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e 29 4c 52 9f | IKEv2 nonce ee 9a 54 1c b4 18 23 df 63 6a bd 54 05 89 e9 b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 91 f0 62 53 bb 6e 47 c0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 99 | natd_hash: port=500 | natd_hash: hash= 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad 74 c8 5a 36 | natd_hash: hash= 61 d7 20 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad 74 c8 5a 36 | Notify data 61 d7 20 fe | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 91 f0 62 53 bb 6e 47 c0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | natd_hash: hash= be 3d 4b 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | Notify data be 3d 4b 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #405 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #405: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #405 to 4294967295 after switching state | Message ID: IKE #405 skipping update_recv as MD is fake | Message ID: sent #405 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.153:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | state #405 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 | #405 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.016645 | resume sending helper answer for #405 suppresed complete_v2_state_transition() and stole MD | #405 spent 2.8 milliseconds in resume sending helper answer | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b002db88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.34 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.055328; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f49b002db88 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | libevent_free: release ptr-libevent@0x7f49b001d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #284 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0972 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.063769; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f49b001d568 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | libevent_free: release ptr-libevent@0x7f4988022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #344 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.066016; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001017 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | libevent_free: release ptr-libevent@0x7f4980018dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #390 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.067366; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | libevent_free: release ptr-libevent@0x7f4994028748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #375 spent 0.0806 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.067461; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005277 exceeds limit? YES "road-eastnet-nonat-154" #154: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-154" #154: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #406 at 0x55564da5f8b8 | State DB: adding IKEv2 state #406 in UNDEFINED | pstats #406 ikev2.ike started | Message ID: init #406: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #406: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #406; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-154" #406: initiating v2 parent SA to replace #154 | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 406 for state #406 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3c238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f4994028748 size 128 | #406 spent 0.073 milliseconds in ikev2_parent_outI1() | RESET processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #154 ikev2.ike failed too-many-retransmits | pstats #154 ikev2.ike deleted too-many-retransmits | #154 spent 2.19 milliseconds in total | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-154" #154: deleting state (STATE_PARENT_I1) aged 64.006s and NOT sending notification | parent state #154: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #154 "road-eastnet-nonat-154" #154: deleting IKE SA for connection 'road-eastnet-nonat-154' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-154' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-154 | State DB: deleting IKEv2 state #154 in PARENT_I1 | parent state #154: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 resuming | crypto helper 7 starting work-order 406 for state #406 | stop processing: state #154 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 406 | libevent_free: release ptr-libevent@0x7f497c028398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | in statetime_stop() and could not find #154 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-154 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-154' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-154" | stop processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:349) | spent 0.0555 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 406 time elapsed 0.000561 seconds | (#406) spent 0.564 milliseconds in crypto helper computing work-order 406: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 406 for state #406 to event queue | scheduling resume sending helper answer for #406 | libevent_malloc: new ptr-libevent@0x7f49a402de48 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 406 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #406 | **emit ISAKMP Message: | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | ikev2 g^x fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | ikev2 g^x fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | ikev2 g^x 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | ikev2 g^x 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | ikev2 g^x 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | ikev2 g^x c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | ikev2 g^x 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | ikev2 g^x 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | ikev2 g^x a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | ikev2 g^x 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | ikev2 g^x 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | ikev2 g^x 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | ikev2 g^x 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | ikev2 g^x cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | ikev2 g^x 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 49 34 1f 95 48 ec 95 68 08 94 52 6f a9 10 bc 09 | IKEv2 nonce e4 ce be 8e 86 2f 16 fa 05 d3 81 4c 13 40 7c db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3a 6f 54 81 a5 ae 8d 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9a | natd_hash: port=500 | natd_hash: hash= 2c ea e9 d3 9c bd b4 37 da e9 14 58 e6 4e 11 93 | natd_hash: hash= 61 6e dc 0e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c ea e9 d3 9c bd b4 37 da e9 14 58 e6 4e 11 93 | Notify data 61 6e dc 0e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3a 6f 54 81 a5 ae 8d 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | natd_hash: hash= 80 5f 25 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | Notify data 80 5f 25 59 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #406 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #406: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #406 to 4294967295 after switching state | Message ID: IKE #406 skipping update_recv as MD is fake | Message ID: sent #406 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.154:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | state #406 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994028748 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3c238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f498402dbc8 size 128 | #406 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.068516 | resume sending helper answer for #406 suppresed complete_v2_state_transition() and stole MD | #406 spent 0.306 milliseconds in resume sending helper answer | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a402de48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.072812; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f49a402de48 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | libevent_free: release ptr-libevent@0x7f49a402dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #398 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.126053; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f49a402dd48 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | libevent_free: release ptr-libevent@0x7f49ac01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #376 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.129338; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500338 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | libevent_free: release ptr-libevent@0x7f49a802de28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #399 spent 0.0959 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.131556; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f49a802de28 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | libevent_free: release ptr-libevent@0x7f49a401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #285 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.13381; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #391 spent 0.0852 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.13391; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009417 exceeds limit? YES "road-eastnet-nonat-155" #155: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-155" #155: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #407 at 0x55564da61038 | State DB: adding IKEv2 state #407 in UNDEFINED | pstats #407 ikev2.ike started | Message ID: init #407: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #407: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #407; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-155" #407: initiating v2 parent SA to replace #155 | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 407 for state #407 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da818d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 | #407 spent 0.0746 milliseconds in ikev2_parent_outI1() | RESET processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 407 for state #407 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #155 ikev2.ike failed too-many-retransmits | pstats #155 ikev2.ike deleted too-many-retransmits | #155 spent 2.61 milliseconds in total | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 407 | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-155" #155: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #155: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #155 "road-eastnet-nonat-155" #155: deleting IKE SA for connection 'road-eastnet-nonat-155' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-155' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-155 | State DB: deleting IKEv2 state #155 in PARENT_I1 | parent state #155: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #155 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 407 time elapsed 0.000574 seconds | libevent_free: release ptr-libevent@0x55564da6a668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | (#407) spent 0.573 milliseconds in crypto helper computing work-order 407: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 407 for state #407 to event queue | in statetime_stop() and could not find #155 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #407 | libevent_malloc: new ptr-libevent@0x7f49a802df28 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | crypto helper 8 waiting (nothing to do) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-155 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-155' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-155" | stop processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:349) | spent 0.0652 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 407 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #407 | **emit ISAKMP Message: | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | ikev2 g^x db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | ikev2 g^x 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | ikev2 g^x 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | ikev2 g^x 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | ikev2 g^x 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | ikev2 g^x a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | ikev2 g^x cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | ikev2 g^x 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | ikev2 g^x 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | ikev2 g^x 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | ikev2 g^x 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | ikev2 g^x 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | ikev2 g^x 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | ikev2 g^x f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | ikev2 g^x a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 3b 91 fc 9b | IKEv2 nonce 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d 0e 73 8c 19 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 56 03 ad 98 d9 fb f1 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9b | natd_hash: port=500 | natd_hash: hash= 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f fb b4 6a b1 | natd_hash: hash= e4 fa 21 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f fb b4 6a b1 | Notify data e4 fa 21 05 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 56 03 ad 98 d9 fb f1 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | natd_hash: hash= 0c 75 a6 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | Notify data 0c 75 a6 89 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #407 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #407: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #407 to 4294967295 after switching state | Message ID: IKE #407 skipping update_recv as MD is fake | Message ID: sent #407 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.155:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | state #407 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da818d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f498802dd48 size 128 | #407 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.135127 | resume sending helper answer for #407 suppresed complete_v2_state_transition() and stole MD | #407 spent 0.353 milliseconds in resume sending helper answer | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a802df28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.155426; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003784 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f49a802df28 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | libevent_free: release ptr-libevent@0x7f497c022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #345 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.189779; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #377 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.196455; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | libevent_free: release ptr-libevent@0x7f49ac0285e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #392 spent 0.275 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.164 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.200101; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006868 exceeds limit? YES "road-eastnet-nonat-156" #156: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-156" #156: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #408 at 0x55564da62748 | State DB: adding IKEv2 state #408 in UNDEFINED | pstats #408 ikev2.ike started | Message ID: init #408: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #408: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #408; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-156" #408: initiating v2 parent SA to replace #156 | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 408 for state #408 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b8418 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f49ac0285e8 size 128 | #408 spent 0.245 milliseconds in ikev2_parent_outI1() | RESET processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #156 ikev2.ike failed too-many-retransmits | pstats #156 ikev2.ike deleted too-many-retransmits | #156 spent 3.32 milliseconds in total | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 9 resuming | crypto helper 9 starting work-order 408 for state #408 "road-eastnet-nonat-156" #156: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 408 | parent state #156: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #156 "road-eastnet-nonat-156" #156: deleting IKE SA for connection 'road-eastnet-nonat-156' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-156' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-156 | State DB: deleting IKEv2 state #156 in PARENT_I1 | parent state #156: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 408 time elapsed 0.002299 seconds | (#408) spent 2.29 milliseconds in crypto helper computing work-order 408: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 408 for state #408 to event queue | stop processing: state #156 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49800282c8 | scheduling resume sending helper answer for #408 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | in statetime_stop() and could not find #156 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #286 | crypto helper 9 waiting (nothing to do) | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.203056; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f497c02de08 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #286 spent 0.392 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-156 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-156' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-156" | stop processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:349) | spent 0.175 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 408 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #408 | **emit ISAKMP Message: | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | ikev2 g^x bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | ikev2 g^x 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | ikev2 g^x bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | ikev2 g^x 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | ikev2 g^x 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | ikev2 g^x dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | ikev2 g^x c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | ikev2 g^x cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | ikev2 g^x 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | ikev2 g^x 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | ikev2 g^x 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | ikev2 g^x f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | ikev2 g^x 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | ikev2 g^x 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | ikev2 g^x f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d b6 de e3 82 | IKEv2 nonce e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d 55 76 11 bb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f9 15 8f e1 6a e9 5a 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9c | natd_hash: port=500 | natd_hash: hash= 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 f8 20 87 f9 | natd_hash: hash= 04 a6 c4 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 f8 20 87 f9 | Notify data 04 a6 c4 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f9 15 8f e1 6a e9 5a 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | natd_hash: hash= 2d 8e 3e ce | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | Notify data 2d 8e 3e ce | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #408 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #408: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #408 to 4294967295 after switching state | Message ID: IKE #408 skipping update_recv as MD is fake | Message ID: sent #408 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.156:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | state #408 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac0285e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b8418 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 | #408 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.205369 | resume sending helper answer for #408 suppresed complete_v2_state_transition() and stole MD | #408 spent 1.45 milliseconds in resume sending helper answer | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c02de48 | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.205525; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.503805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #400 spent 0.327 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.188 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.176 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.248515; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #378 spent 0.514 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.249163; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #346 spent 0.406 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.227 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.177 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.261284; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007975 exceeds limit? YES "road-eastnet-nonat-157" #157: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-157" #157: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #409 at 0x55564da63e58 | State DB: adding IKEv2 state #409 in UNDEFINED | pstats #409 ikev2.ike started | Message ID: init #409: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #409: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #409; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-157" #409: initiating v2 parent SA to replace #157 | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 409 for state #409 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f498400ca08 size 128 | #409 spent 0.388 milliseconds in ikev2_parent_outI1() | RESET processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 10 resuming | crypto helper 10 starting work-order 409 for state #409 | pstats #157 ikev2.ike failed too-many-retransmits | pstats #157 ikev2.ike deleted too-many-retransmits | #157 spent 3.08 milliseconds in total | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 409 "road-eastnet-nonat-157" #157: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #157: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #157 "road-eastnet-nonat-157" #157: deleting IKE SA for connection 'road-eastnet-nonat-157' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-157' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-157 | State DB: deleting IKEv2 state #157 in PARENT_I1 | parent state #157: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 409 time elapsed 0.002671 seconds | stop processing: state #157 from 192.1.2.23 (in delete_state() at state.c:1143) | (#409) spent 2.66 milliseconds in crypto helper computing work-order 409: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x55564da85ee8 | crypto helper 10 sending results from work-order 409 for state #409 to event queue | scheduling resume sending helper answer for #409 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 | crypto helper 10 waiting (nothing to do) | in statetime_stop() and could not find #157 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.264887; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f498002dd38 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #287 spent 0.549 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.29 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-157 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-157' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-157" | stop processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:349) | spent 0.234 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 409 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #409 | **emit ISAKMP Message: | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | ikev2 g^x d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | ikev2 g^x 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | ikev2 g^x 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | ikev2 g^x 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | ikev2 g^x 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | ikev2 g^x 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | ikev2 g^x fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | ikev2 g^x 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | ikev2 g^x 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | ikev2 g^x 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | ikev2 g^x 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | ikev2 g^x 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | ikev2 g^x a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | ikev2 g^x da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | ikev2 g^x 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af 94 da bd a1 d9 00 ea a2 d4 ab 1b af 29 b7 5c | IKEv2 nonce 1f be 1c 86 41 6a 54 60 7f 53 16 07 42 64 a3 53 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e9 c3 2c 09 e3 85 a6 ec | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9d | natd_hash: port=500 | natd_hash: hash= be e1 77 c8 24 e1 ae 41 ea 33 d2 12 cd 46 e4 15 | natd_hash: hash= 64 84 84 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be e1 77 c8 24 e1 ae 41 ea 33 d2 12 cd 46 e4 15 | Notify data 64 84 84 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e9 c3 2c 09 e3 85 a6 ec | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | natd_hash: hash= e3 47 4b 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | Notify data e3 47 4b 27 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #409 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #409: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #409 to 4294967295 after switching state | Message ID: IKE #409 skipping update_recv as MD is fake | Message ID: sent #409 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.157:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | state #409 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498400ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 | #409 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.268394 | resume sending helper answer for #409 suppresed complete_v2_state_transition() and stole MD | #409 spent 2.26 milliseconds in resume sending helper answer | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00332f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.312 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.268989; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #393 spent 0.5 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.293 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.271053; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #401 spent 0.535 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.297 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.311149; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | libevent_free: release ptr-libevent@0x7f49b801ffe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #379 spent 0.424 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.229 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.320048; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008106 exceeds limit? YES "road-eastnet-nonat-158" #158: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-158" #158: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #410 at 0x55564da655d8 | State DB: adding IKEv2 state #410 in UNDEFINED | pstats #410 ikev2.ike started | Message ID: init #410: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #410: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #410; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-158" #410: initiating v2 parent SA to replace #158 | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 410 for state #410 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da78ed8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f49b801ffe8 size 128 | #410 spent 0.262 milliseconds in ikev2_parent_outI1() | RESET processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #158 ikev2.ike failed too-many-retransmits | pstats #158 ikev2.ike deleted too-many-retransmits | crypto helper 11 resuming | crypto helper 11 starting work-order 410 for state #410 | #158 spent 2.14 milliseconds in total | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 410 | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-158" #158: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #158: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #158 "road-eastnet-nonat-158" #158: deleting IKE SA for connection 'road-eastnet-nonat-158' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-158' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-158 | State DB: deleting IKEv2 state #158 in PARENT_I1 | parent state #158: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 410 time elapsed 0.002637 seconds | stop processing: state #158 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a802dc78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | (#410) spent 2.64 milliseconds in crypto helper computing work-order 410: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 410 for state #410 to event queue | in statetime_stop() and could not find #158 | scheduling resume sending helper answer for #410 | libevent_malloc: new ptr-libevent@0x7f499402ddb8 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 11 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-158 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-158' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-158" | stop processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:349) | spent 0.205 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 410 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #410 | **emit ISAKMP Message: | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | ikev2 g^x cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | ikev2 g^x 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | ikev2 g^x 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | ikev2 g^x 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ikev2 g^x ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | ikev2 g^x 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | ikev2 g^x 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | ikev2 g^x b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | ikev2 g^x 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | ikev2 g^x c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | ikev2 g^x 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | ikev2 g^x 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | ikev2 g^x 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | ikev2 g^x 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | ikev2 g^x 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 bc e1 a4 d1 | IKEv2 nonce d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a cb e6 7d d9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 d9 7c 0b 08 2d 0d 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9e | natd_hash: port=500 | natd_hash: hash= 81 7e b3 19 89 26 d7 a7 ce 05 60 89 15 f3 9b 6e | natd_hash: hash= e2 7d 3c 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 7e b3 19 89 26 d7 a7 ce 05 60 89 15 f3 9b 6e | Notify data e2 7d 3c 21 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 d9 7c 0b 08 2d 0d 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | natd_hash: hash= 75 be 05 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | Notify data 75 be 05 51 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #410 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #410: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #410 to 4294967295 after switching state | Message ID: IKE #410 skipping update_recv as MD is fake | Message ID: sent #410 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.158:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | state #410 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b801ffe8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da78ed8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 | #410 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.325598 | resume sending helper answer for #410 suppresed complete_v2_state_transition() and stole MD | #410 spent 1.9 milliseconds in resume sending helper answer | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499402ddb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.233 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.327144; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f499402ddb8 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | libevent_free: release ptr-libevent@0x7f499402deb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #402 spent 0.392 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.3276; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f499402deb8 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | libevent_free: release ptr-libevent@0x7f49a801d688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #288 spent 0.362 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.328032; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004469 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f49a801d688 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #347 spent 0.325 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.272 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.29 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.262 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.334516; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #394 spent 0.42 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.367655; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | libevent_free: release ptr-libevent@0x7f49880284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #380 spent 0.46 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.377638; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006863 exceeds limit? YES "road-eastnet-nonat-159" #159: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-159" #159: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #411 at 0x55564da66ce8 | State DB: adding IKEv2 state #411 in UNDEFINED | pstats #411 ikev2.ike started | Message ID: init #411: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #411: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #411; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-159" #411: initiating v2 parent SA to replace #159 | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 411 for state #411 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f49880284d8 size 128 | #411 spent 0.301 milliseconds in ikev2_parent_outI1() | RESET processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #159 ikev2.ike failed too-many-retransmits | pstats #159 ikev2.ike deleted too-many-retransmits | #159 spent 2 milliseconds in total | crypto helper 12 resuming | crypto helper 12 starting work-order 411 for state #411 | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-159" #159: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #159: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #159 "road-eastnet-nonat-159" #159: deleting IKE SA for connection 'road-eastnet-nonat-159' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-159' added to the list and scheduled for 0 seconds | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 411 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-159 | State DB: deleting IKEv2 state #159 in PARENT_I1 | parent state #159: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #159 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 411 time elapsed 0.002809 seconds | libevent_free: release ptr-libevent@0x55564da44d38 | (#411) spent 2.81 milliseconds in crypto helper computing work-order 411: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 411 for state #411 to event queue | scheduling resume sending helper answer for #411 | libevent_malloc: new ptr-libevent@0x7f499802df48 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | crypto helper 12 waiting (nothing to do) | in statetime_stop() and could not find #159 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-159 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-159' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-159" | stop processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:349) | spent 0.22 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 411 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #411 | **emit ISAKMP Message: | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | ikev2 g^x db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | ikev2 g^x a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | ikev2 g^x 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | ikev2 g^x 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | ikev2 g^x c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | ikev2 g^x 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | ikev2 g^x 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | ikev2 g^x b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | ikev2 g^x 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | ikev2 g^x 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | ikev2 g^x 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | ikev2 g^x 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | ikev2 g^x d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | ikev2 g^x 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | ikev2 g^x 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 b2 1f 1d 15 | IKEv2 nonce a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 06 2c 3d 1c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 7f 15 f4 dd 58 dd e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9f | natd_hash: port=500 | natd_hash: hash= c0 c2 4c 08 71 5d e7 3c dc 81 28 54 0e 33 3c f2 | natd_hash: hash= c4 43 7a 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 c2 4c 08 71 5d e7 3c dc 81 28 54 0e 33 3c f2 | Notify data c4 43 7a 9e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 02 7f 15 f4 dd 58 dd e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | natd_hash: hash= d3 f1 d9 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | Notify data d3 f1 d9 e2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #411 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #411: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #411 to 4294967295 after switching state | Message ID: IKE #411 skipping update_recv as MD is fake | Message ID: sent #411 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.159:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | state #411 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49880284d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da3f018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f497802dd68 size 128 | #411 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.383574 | resume sending helper answer for #411 suppresed complete_v2_state_transition() and stole MD | #411 spent 2.02 milliseconds in resume sending helper answer | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499802df48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.387117; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f499802df48 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | libevent_free: release ptr-libevent@0x7f498c022b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #348 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.387586; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f498c022b78 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | libevent_free: release ptr-libevent@0x7f499c01d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #289 spent 0.336 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.173 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.390586; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f499c01d4f8 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #403 spent 0.415 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.391066; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #395 spent 0.316 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.192 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.42904; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | libevent_free: release ptr-libevent@0x7f497c028598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #381 spent 0.439 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.442005; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007084 exceeds limit? YES "road-eastnet-nonat-160" #160: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-160" #160: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #412 at 0x55564da683f8 | State DB: adding IKEv2 state #412 in UNDEFINED | pstats #412 ikev2.ike started | Message ID: init #412: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #412: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #412; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-160" #412: initiating v2 parent SA to replace #160 | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 412 for state #412 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f497c028598 size 128 | #412 spent 0.323 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | RESET processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 412 for state #412 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #160 ikev2.ike failed too-many-retransmits | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 412 | pstats #160 ikev2.ike deleted too-many-retransmits | #160 spent 3.27 milliseconds in total | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-160" #160: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #160: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #160 "road-eastnet-nonat-160" #160: deleting IKE SA for connection 'road-eastnet-nonat-160' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-160' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-160 | State DB: deleting IKEv2 state #160 in PARENT_I1 | parent state #160: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #160 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 412 time elapsed 0.002728 seconds | libevent_free: release ptr-libevent@0x55564da88de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | in statetime_stop() and could not find #160 | (#412) spent 2.71 milliseconds in crypto helper computing work-order 412: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 412 for state #412 to event queue | scheduling resume sending helper answer for #412 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f498c02db98 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-160 which received a Delete/Notify but must remain up per local policy | crypto helper 13 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-160' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-160" | stop processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:349) | spent 0.197 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.445712; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f496c02dea8 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | libevent_free: release ptr-libevent@0x7f498001d3e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #290 spent 0.393 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 412 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #412 | **emit ISAKMP Message: | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | ikev2 g^x 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | ikev2 g^x e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | ikev2 g^x cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | ikev2 g^x b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | ikev2 g^x f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | ikev2 g^x b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | ikev2 g^x 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | ikev2 g^x 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | ikev2 g^x 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | ikev2 g^x 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ikev2 g^x ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | ikev2 g^x 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | ikev2 g^x c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | ikev2 g^x 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ikev2 g^x ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 e5 2a c6 ea | IKEv2 nonce ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c ce 5f 26 46 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 68 c1 df 20 71 f0 88 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a0 | natd_hash: port=500 | natd_hash: hash= 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 99 31 40 12 | natd_hash: hash= 1b 6b 0a 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 99 31 40 12 | Notify data 1b 6b 0a 6a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 68 c1 df 20 71 f0 88 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | natd_hash: hash= fb 4d a0 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | Notify data fb 4d a0 1f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #412 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #412: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #412 to 4294967295 after switching state | Message ID: IKE #412 skipping update_recv as MD is fake | Message ID: sent #412 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.160:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | state #412 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c028598 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f498001d3e8 size 128 | #412 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.447947 | resume sending helper answer for #412 suppresed complete_v2_state_transition() and stole MD | #412 spent 1.49 milliseconds in resume sending helper answer | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c02db98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.448313; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f498c02db98 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | libevent_free: release ptr-libevent@0x7f4990022cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #349 spent 0.325 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.451054; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #396 spent 0.449 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.454997; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | libevent_free: release ptr-libevent@0x7f498c02dc98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #404 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.509921; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f498c02dc98 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | libevent_free: release ptr-libevent@0x7f499401d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #291 spent 0.631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.233 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.510892; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f499401d668 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | libevent_free: release ptr-libevent@0x7f49b40256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #350 spent 0.393 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.513926; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f49b40256e8 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #397 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.514414; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497769 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #405 spent 0.344 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.184 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.519339; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002278 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | libevent_free: release ptr-libevent@0x7f4980012588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #382 spent 0.205 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0987 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.520811; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007651 exceeds limit? YES "road-eastnet-nonat-161" #161: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-161" #161: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #413 at 0x55564da69b78 | State DB: adding IKEv2 state #413 in UNDEFINED | pstats #413 ikev2.ike started | Message ID: init #413: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #413: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #413; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-161" #413: initiating v2 parent SA to replace #161 | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 413 for state #413 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f4980012588 size 128 | #413 spent 0.126 milliseconds in ikev2_parent_outI1() | RESET processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #161 ikev2.ike failed too-many-retransmits | pstats #161 ikev2.ike deleted too-many-retransmits | #161 spent 5.38 milliseconds in total | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-161" #161: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #161: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #161 | crypto helper 14 resuming | crypto helper 14 starting work-order 413 for state #413 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 413 "road-eastnet-nonat-161" #161: deleting IKE SA for connection 'road-eastnet-nonat-161' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-161' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-161 | State DB: deleting IKEv2 state #161 in PARENT_I1 | parent state #161: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 413 time elapsed 0.00105 seconds | (#413) spent 1.06 milliseconds in crypto helper computing work-order 413: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 413 for state #413 to event queue | scheduling resume sending helper answer for #413 | stop processing: state #161 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 | crypto helper 14 waiting (nothing to do) | libevent_free: release ptr-libevent@0x55564dadfe48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | in statetime_stop() and could not find #161 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-161 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-161' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-161" | stop processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:349) | spent 0.0869 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 413 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #413 | **emit ISAKMP Message: | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | ikev2 g^x a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | ikev2 g^x 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | ikev2 g^x a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | ikev2 g^x 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | ikev2 g^x 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | ikev2 g^x 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | ikev2 g^x c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | ikev2 g^x 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ikev2 g^x ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | ikev2 g^x fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | ikev2 g^x a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | ikev2 g^x 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | ikev2 g^x d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | ikev2 g^x 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | ikev2 g^x b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 4b c6 20 a3 | IKEv2 nonce 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 d1 39 26 f5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a 00 31 51 51 51 eb 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a1 | natd_hash: port=500 | natd_hash: hash= 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 f5 a3 dd 7c | natd_hash: hash= 7a 5b 9e ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 f5 a3 dd 7c | Notify data 7a 5b 9e ec | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1a 00 31 51 51 51 eb 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | natd_hash: hash= a8 56 a6 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | Notify data a8 56 a6 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #413 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #413: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #413 to 4294967295 after switching state | Message ID: IKE #413 skipping update_recv as MD is fake | Message ID: sent #413 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.161:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | state #413 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980012588 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f49bc030808 size 128 | #413 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.522906 | resume sending helper answer for #413 suppresed complete_v2_state_transition() and stole MD | #413 spent 0.616 milliseconds in resume sending helper answer | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499002dd88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.568146; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #351 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.569413; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | libevent_free: release ptr-libevent@0x7f498402dbc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #406 spent 0.0976 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.571681; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f498402dbc8 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #292 spent 0.0951 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.573966; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | libevent_free: release ptr-libevent@0x7f49a402de48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #398 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.582285; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00834 exceeds limit? YES "road-eastnet-nonat-162" #162: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-162" #162: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #414 at 0x55564da6b288 | State DB: adding IKEv2 state #414 in UNDEFINED | pstats #414 ikev2.ike started | Message ID: init #414: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #414: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #414; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-162" #414: initiating v2 parent SA to replace #162 | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 414 for state #414 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da47a78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f49a402de48 size 128 | #414 spent 0.113 milliseconds in ikev2_parent_outI1() | RESET processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 414 for state #414 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #162 ikev2.ike failed too-many-retransmits | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 414 | pstats #162 ikev2.ike deleted too-many-retransmits | #162 spent 3.43 milliseconds in total | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-162" #162: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #162: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #162 "road-eastnet-nonat-162" #162: deleting IKE SA for connection 'road-eastnet-nonat-162' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-162' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-162 | State DB: deleting IKEv2 state #162 in PARENT_I1 | parent state #162: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 414 time elapsed 0.000589 seconds | (#414) spent 0.592 milliseconds in crypto helper computing work-order 414: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 414 for state #414 to event queue | scheduling resume sending helper answer for #414 | libevent_malloc: new ptr-libevent@0x7f498402dcc8 size 128 | crypto helper 15 waiting (nothing to do) | stop processing: state #162 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f496c02dca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | in statetime_stop() and could not find #162 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-162 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-162' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-162" | stop processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 414 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #414 | **emit ISAKMP Message: | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | ikev2 g^x 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | ikev2 g^x de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | ikev2 g^x 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | ikev2 g^x a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | ikev2 g^x 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | ikev2 g^x 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | ikev2 g^x 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | ikev2 g^x 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | ikev2 g^x 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | ikev2 g^x a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | ikev2 g^x e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ikev2 g^x ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | ikev2 g^x 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | ikev2 g^x c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | ikev2 g^x 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d a3 3c ad 3f 12 46 b7 be de f4 62 df 14 50 e1 | IKEv2 nonce 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de 3b ac e3 1f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ff ed 27 6d 5d 11 37 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a2 | natd_hash: port=500 | natd_hash: hash= d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 f7 e1 9b 87 | natd_hash: hash= cb ae fe 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 f7 e1 9b 87 | Notify data cb ae fe 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ff ed 27 6d 5d 11 37 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | natd_hash: hash= 95 df df 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | Notify data 95 df df 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #414 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #414: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #414 to 4294967295 after switching state | Message ID: IKE #414 skipping update_recv as MD is fake | Message ID: sent #414 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.162:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | state #414 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a402de48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da47a78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f49b4030708 size 128 | #414 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.583501 | resume sending helper answer for #414 suppresed complete_v2_state_transition() and stole MD | #414 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498402dcc8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.612661; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f498402dcc8 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #383 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.626969; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #352 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.630238; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | libevent_free: release ptr-libevent@0x7f49ac01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #399 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.634536; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | libevent_free: release ptr-libevent@0x7f498c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #293 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.635814; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | libevent_free: release ptr-libevent@0x7f498802dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #407 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.644098; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007135 exceeds limit? YES "road-eastnet-nonat-163" #163: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-163" #163: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #415 at 0x55564da6ca98 | State DB: adding IKEv2 state #415 in UNDEFINED | pstats #415 ikev2.ike started | Message ID: init #415: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #415: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #415; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-163" #415: initiating v2 parent SA to replace #163 | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 415 for state #415 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da818d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f498802dd48 size 128 | #415 spent 0.0742 milliseconds in ikev2_parent_outI1() | RESET processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 16 resuming | crypto helper 16 starting work-order 415 for state #415 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 415 | pstats #163 ikev2.ike failed too-many-retransmits | pstats #163 ikev2.ike deleted too-many-retransmits | #163 spent 3.32 milliseconds in total | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-163" #163: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #163: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #163 "road-eastnet-nonat-163" #163: deleting IKE SA for connection 'road-eastnet-nonat-163' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-163' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-163 | State DB: deleting IKEv2 state #163 in PARENT_I1 | parent state #163: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 415 time elapsed 0.000726 seconds | (#415) spent 0.727 milliseconds in crypto helper computing work-order 415: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 415 for state #415 to event queue | scheduling resume sending helper answer for #415 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 | crypto helper 16 waiting (nothing to do) | stop processing: state #163 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | in statetime_stop() and could not find #163 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-163 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-163' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-163" | stop processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:349) | spent 0.0599 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 415 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #415 | **emit ISAKMP Message: | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | ikev2 g^x b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | ikev2 g^x f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | ikev2 g^x 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | ikev2 g^x 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ikev2 g^x ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | ikev2 g^x 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | ikev2 g^x aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | ikev2 g^x e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | ikev2 g^x 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | ikev2 g^x 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | ikev2 g^x 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | ikev2 g^x 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ikev2 g^x ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | ikev2 g^x 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | ikev2 g^x 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb ab ab 41 d7 | IKEv2 nonce 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 f1 9f 37 af | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe b0 b4 ea cd f1 db f9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a3 | natd_hash: port=500 | natd_hash: hash= 47 f4 32 69 64 d8 1f d8 15 da 4a 28 ea 06 77 c6 | natd_hash: hash= b2 e9 9f 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 f4 32 69 64 d8 1f d8 15 da 4a 28 ea 06 77 c6 | Notify data b2 e9 9f 59 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fe b0 b4 ea cd f1 db f9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | natd_hash: hash= d2 b4 e7 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | Notify data d2 b4 e7 6a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #415 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #415: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #415 to 4294967295 after switching state | Message ID: IKE #415 skipping update_recv as MD is fake | Message ID: sent #415 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.163:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | state #415 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498802dd48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da818d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f49b8031168 size 128 | #415 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.645358 | resume sending helper answer for #415 suppresed complete_v2_state_transition() and stole MD | #415 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498802dc48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.67454; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #384 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.688877; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #353 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.704161; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #408 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.704295; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | libevent_free: release ptr-libevent@0x7f499c02de48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #400 spent 0.0695 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.704379; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008637 exceeds limit? YES "road-eastnet-nonat-164" #164: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-164" #164: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #416 at 0x55564da6e0f8 | State DB: adding IKEv2 state #416 in UNDEFINED | pstats #416 ikev2.ike started | Message ID: init #416: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #416: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #416; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-164" #416: initiating v2 parent SA to replace #164 | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 416 for state #416 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 | #416 spent 0.0737 milliseconds in ikev2_parent_outI1() | RESET processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 416 for state #416 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #164 ikev2.ike failed too-many-retransmits | pstats #164 ikev2.ike deleted too-many-retransmits | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 416 | #164 spent 2.74 milliseconds in total | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-164" #164: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #164: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #164 "road-eastnet-nonat-164" #164: deleting IKE SA for connection 'road-eastnet-nonat-164' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-164' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-164 | State DB: deleting IKEv2 state #164 in PARENT_I1 | parent state #164: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 416 time elapsed 0.000997 seconds | (#416) spent 0.999 milliseconds in crypto helper computing work-order 416: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 416 for state #416 to event queue | scheduling resume sending helper answer for #416 | libevent_malloc: new ptr-libevent@0x7f497c02df08 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #164 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c03e498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | in statetime_stop() and could not find #164 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0381 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-164 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-164' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-164" | stop processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:349) | spent 0.0571 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 416 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #416 | **emit ISAKMP Message: | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | ikev2 g^x dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ikev2 g^x ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | ikev2 g^x d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | ikev2 g^x 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | ikev2 g^x 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | ikev2 g^x 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | ikev2 g^x fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ikev2 g^x ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | ikev2 g^x 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | ikev2 g^x 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | ikev2 g^x 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | ikev2 g^x d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | ikev2 g^x 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | ikev2 g^x a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | ikev2 g^x fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4c c5 61 75 aa 11 7e 68 38 e1 af e2 c8 fe 76 22 | IKEv2 nonce 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a 5e 6f 8c e6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3a 1e a7 af 79 81 d7 dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a4 | natd_hash: port=500 | natd_hash: hash= 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de a2 76 6d 15 | natd_hash: hash= ba 41 16 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de a2 76 6d 15 | Notify data ba 41 16 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3a 1e a7 af 79 81 d7 dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | natd_hash: hash= 31 38 63 c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | Notify data 31 38 63 c7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #416 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #416: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #416 to 4294967295 after switching state | Message ID: IKE #416 skipping update_recv as MD is fake | Message ID: sent #416 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.164:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | state #416 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c02de48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f49ac033508 size 128 | #416 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.706022 | resume sending helper answer for #416 suppresed complete_v2_state_transition() and stole MD | #416 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c02df08 | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.706053; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f497c02df08 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | libevent_free: release ptr-libevent@0x7f4994012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #294 spent 0.0669 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0342 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.742417; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f4994012488 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #385 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.746836; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | libevent_free: release ptr-libevent@0x7f49b00283c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #354 spent 0.0948 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.758052; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003913 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f49b00283c8 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | libevent_free: release ptr-libevent@0x7f498401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #295 spent 0.0899 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.76541; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005873 exceeds limit? YES "road-eastnet-nonat-165" #165: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-165" #165: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #417 at 0x55564da6f758 | State DB: adding IKEv2 state #417 in UNDEFINED | pstats #417 ikev2.ike started | Message ID: init #417: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #417: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #417; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-165" #417: initiating v2 parent SA to replace #165 | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 417 for state #417 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8a488 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f498401d3f8 size 128 | #417 spent 0.0738 milliseconds in ikev2_parent_outI1() | RESET processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #165 ikev2.ike failed too-many-retransmits | pstats #165 ikev2.ike deleted too-many-retransmits | #165 spent 3.37 milliseconds in total | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-165" #165: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #165: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #165 "road-eastnet-nonat-165" #165: deleting IKE SA for connection 'road-eastnet-nonat-165' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-165' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-165 | State DB: deleting IKEv2 state #165 in PARENT_I1 | parent state #165: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 resuming | crypto helper 3 starting work-order 417 for state #417 | stop processing: state #165 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 417 | libevent_free: release ptr-libevent@0x55564da00ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | in statetime_stop() and could not find #165 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-165 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-165' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-165" | stop processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:349) | spent 0.0591 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 417 time elapsed 0.000564 seconds | (#417) spent 0.566 milliseconds in crypto helper computing work-order 417: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 417 for state #417 to event queue | scheduling resume sending helper answer for #417 | libevent_malloc: new ptr-libevent@0x7f498002de38 size 128 | crypto helper 3 waiting (nothing to do) | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.766172; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f49b0033438 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #409 spent 0.0814 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 417 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #417 | **emit ISAKMP Message: | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | ikev2 g^x 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | ikev2 g^x 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | ikev2 g^x 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | ikev2 g^x 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | ikev2 g^x 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ikev2 g^x ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | ikev2 g^x c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | ikev2 g^x 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | ikev2 g^x 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | ikev2 g^x 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | ikev2 g^x 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | ikev2 g^x 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | ikev2 g^x 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | ikev2 g^x 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | ikev2 g^x 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e d3 37 ce 9f | IKEv2 nonce 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 c3 e4 56 e8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5a 0d 86 72 48 be 53 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a5 | natd_hash: port=500 | natd_hash: hash= e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce 94 b1 b3 70 | natd_hash: hash= 0b 59 71 a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce 94 b1 b3 70 | Notify data 0b 59 71 a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5a 0d 86 72 48 be 53 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | natd_hash: hash= 62 bc b8 b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | Notify data 62 bc b8 b8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #417 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #417: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #417 to 4294967295 after switching state | Message ID: IKE #417 skipping update_recv as MD is fake | Message ID: sent #417 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.165:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | state #417 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498401d3f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8a488 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 | #417 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.766563 | resume sending helper answer for #417 suppresed complete_v2_state_transition() and stole MD | #417 spent 0.301 milliseconds in resume sending helper answer | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498002de38 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.772911; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f498002de38 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #401 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.801252; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | libevent_free: release ptr-libevent@0x7f49bc02af48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #386 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.809524; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f49bc02af48 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | libevent_free: release ptr-libevent@0x7f49a8028668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #355 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.820849; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f49a8028668 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #296 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.824102; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | libevent_free: release ptr-libevent@0x7f497402de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #410 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.828358; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | libevent_free: release ptr-libevent@0x7f499402ddb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #402 spent 0.0974 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.834607; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008621 exceeds limit? YES "road-eastnet-nonat-166" #166: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-166" #166: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #418 at 0x55564da70ed8 | State DB: adding IKEv2 state #418 in UNDEFINED | pstats #418 ikev2.ike started | Message ID: init #418: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #418: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #418; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-166" #418: initiating v2 parent SA to replace #166 | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 418 for state #418 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da64948 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f499402ddb8 size 128 | #418 spent 0.104 milliseconds in ikev2_parent_outI1() | RESET processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #166 ikev2.ike failed too-many-retransmits | pstats #166 ikev2.ike deleted too-many-retransmits | #166 spent 2.81 milliseconds in total | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-166" #166: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #166: PARENT_I1(half-open IKE SA) => delete | crypto helper 17 resuming | crypto helper 17 starting work-order 418 for state #418 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #166 "road-eastnet-nonat-166" #166: deleting IKE SA for connection 'road-eastnet-nonat-166' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-166' added to the list and scheduled for 0 seconds | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 418 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-166 | State DB: deleting IKEv2 state #166 in PARENT_I1 | parent state #166: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #166 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 418 time elapsed 0.000585 seconds | libevent_free: release ptr-libevent@0x55564da37cb8 | (#418) spent 0.587 milliseconds in crypto helper computing work-order 418: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 418 for state #418 to event queue | scheduling resume sending helper answer for #418 | libevent_malloc: new ptr-libevent@0x7f497402df08 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | in statetime_stop() and could not find #166 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-166 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-166' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-166" | stop processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:349) | spent 0.0799 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 418 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #418 | **emit ISAKMP Message: | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | ikev2 g^x 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | ikev2 g^x 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | ikev2 g^x 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | ikev2 g^x 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | ikev2 g^x 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | ikev2 g^x 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ikev2 g^x ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | ikev2 g^x da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ikev2 g^x ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | ikev2 g^x 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ikev2 g^x ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | ikev2 g^x b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | ikev2 g^x 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | ikev2 g^x 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | ikev2 g^x 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 3d c9 bb a7 | IKEv2 nonce 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b 93 0f 39 80 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1c e3 55 93 ca 83 3b 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a6 | natd_hash: port=500 | natd_hash: hash= 50 30 1e 63 f0 e7 69 42 25 75 98 28 93 df b5 90 | natd_hash: hash= e3 07 33 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 30 1e 63 f0 e7 69 42 25 75 98 28 93 df b5 90 | Notify data e3 07 33 13 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1c e3 55 93 ca 83 3b 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | natd_hash: hash= bf 65 d4 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | Notify data bf 65 d4 bd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #418 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #418: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #418 to 4294967295 after switching state | Message ID: IKE #418 skipping update_recv as MD is fake | Message ID: sent #418 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.166:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | state #418 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499402ddb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da64948 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f49a40335b8 size 128 | #418 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.835976 | resume sending helper answer for #418 suppresed complete_v2_state_transition() and stole MD | #418 spent 0.46 milliseconds in resume sending helper answer | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497402df08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.859178; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f497402df08 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #387 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.875637; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | libevent_free: release ptr-libevent@0x7f499c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #356 spent 0.0913 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.881936; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f499c0284d8 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | libevent_free: release ptr-libevent@0x7f497c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #297 spent 0.0951 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.882053; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498479 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | libevent_free: release ptr-libevent@0x7f497802dd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #411 spent 0.077 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.891542; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f497802dd68 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | libevent_free: release ptr-libevent@0x7f499c01d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #403 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.893897; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008268 exceeds limit? YES "road-eastnet-nonat-167" #167: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-167" #167: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #419 at 0x55564da725e8 | State DB: adding IKEv2 state #419 in UNDEFINED | pstats #419 ikev2.ike started | Message ID: init #419: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #419: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #419; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-167" #419: initiating v2 parent SA to replace #167 | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 419 for state #419 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe7b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f499c01d4f8 size 128 | #419 spent 0.118 milliseconds in ikev2_parent_outI1() | RESET processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #167 ikev2.ike failed too-many-retransmits | pstats #167 ikev2.ike deleted too-many-retransmits | #167 spent 2.03 milliseconds in total | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-167" #167: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #167: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #167 "road-eastnet-nonat-167" #167: deleting IKE SA for connection 'road-eastnet-nonat-167' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 18 resuming | add revival: connection 'road-eastnet-nonat-167' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 18 starting work-order 419 for state #419 | in connection_discard for connection road-eastnet-nonat-167 | State DB: deleting IKEv2 state #167 in PARENT_I1 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 419 | parent state #167: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #167 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da39438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | in statetime_stop() and could not find #167 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-167 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-167' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-167" | stop processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:349) | spent 0.0775 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 419 time elapsed 0.000771 seconds | (#419) spent 0.781 milliseconds in crypto helper computing work-order 419: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 419 for state #419 to event queue | scheduling resume sending helper answer for #419 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 419 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #419 | **emit ISAKMP Message: | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | ikev2 g^x 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | ikev2 g^x aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | ikev2 g^x 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | ikev2 g^x 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | ikev2 g^x 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | ikev2 g^x 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | ikev2 g^x 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | ikev2 g^x 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ikev2 g^x ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | ikev2 g^x a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | ikev2 g^x 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | ikev2 g^x 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ikev2 g^x ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | ikev2 g^x 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | ikev2 g^x 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 48 13 75 4c 1a d8 68 62 b0 7d 02 25 2f 53 4f cc | IKEv2 nonce 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 fd f4 a6 4f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c eb b2 99 55 80 e1 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a7 | natd_hash: port=500 | natd_hash: hash= ba 04 60 56 4f 6c 8b 42 81 19 9f b2 56 a2 3a aa | natd_hash: hash= 3d cd 8f cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 04 60 56 4f 6c 8b 42 81 19 9f b2 56 a2 3a aa | Notify data 3d cd 8f cd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c eb b2 99 55 80 e1 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | natd_hash: hash= 5c a3 e2 a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | Notify data 5c a3 e2 a6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #419 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #419: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #419 to 4294967295 after switching state | Message ID: IKE #419 skipping update_recv as MD is fake | Message ID: sent #419 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.167:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | state #419 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c01d4f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe7b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f49a80335d8 size 128 | #419 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.895445 | resume sending helper answer for #419 suppresed complete_v2_state_transition() and stole MD | #419 spent 0.451 milliseconds in resume sending helper answer | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978028608 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.920735; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | libevent_free: release ptr-libevent@0x7f49b401a508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #388 spent 0.289 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.936382; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | libevent_free: release ptr-libevent@0x7f49a0028418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #357 spent 0.272 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.131 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10650.942957; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f49a0028418 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | libevent_free: release ptr-libevent@0x7f498001d4e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #298 spent 0.257 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10650.947499; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499552 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | libevent_free: release ptr-libevent@0x7f498001d3e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #412 spent 0.195 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0986 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10650.95392; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007586 exceeds limit? YES "road-eastnet-nonat-168" #168: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-168" #168: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #420 at 0x55564da73d68 | State DB: adding IKEv2 state #420 in UNDEFINED | pstats #420 ikev2.ike started | Message ID: init #420: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #420: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #420; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-168" #420: initiating v2 parent SA to replace #168 | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 420 for state #420 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f498001d3e8 size 128 | #420 spent 0.128 milliseconds in ikev2_parent_outI1() | RESET processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 resuming | crypto helper 19 starting work-order 420 for state #420 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 420 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #168 ikev2.ike failed too-many-retransmits | pstats #168 ikev2.ike deleted too-many-retransmits | #168 spent 2.57 milliseconds in total | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-168" #168: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #168: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #168 "road-eastnet-nonat-168" #168: deleting IKE SA for connection 'road-eastnet-nonat-168' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-168' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-168 | State DB: deleting IKEv2 state #168 in PARENT_I1 | parent state #168: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #168 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 420 time elapsed 0.001535 seconds | libevent_free: release ptr-libevent@0x55564da7bd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | (#420) spent 1.54 milliseconds in crypto helper computing work-order 420: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #168 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 19 sending results from work-order 420 for state #420 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #420 Initiating connection road-eastnet-nonat-168 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f496c02dda8 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 19 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-168' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-168" | stop processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:349) | spent 0.0945 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 420 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #420 | **emit ISAKMP Message: | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | ikev2 g^x 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | ikev2 g^x c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | ikev2 g^x a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | ikev2 g^x b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | ikev2 g^x c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | ikev2 g^x 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | ikev2 g^x fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | ikev2 g^x db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | ikev2 g^x 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ikev2 g^x ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | ikev2 g^x c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | ikev2 g^x 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | ikev2 g^x 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | ikev2 g^x 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | ikev2 g^x f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 d2 f9 67 af | IKEv2 nonce 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 f0 5e 63 9e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 6a 2b be a9 7d e6 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a8 | natd_hash: port=500 | natd_hash: hash= 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b b5 43 db 7b | natd_hash: hash= 59 35 ef ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b b5 43 db 7b | Notify data 59 35 ef ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 6a 2b be a9 7d e6 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | natd_hash: hash= 44 4f a0 dd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | Notify data 44 4f a0 dd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #420 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #420: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #420 to 4294967295 after switching state | Message ID: IKE #420 skipping update_recv as MD is fake | Message ID: sent #420 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.168:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | state #420 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498001d3e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f499c0335b8 size 128 | #420 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10650.956348 | resume sending helper answer for #420 suppresed complete_v2_state_transition() and stole MD | #420 spent 0.524 milliseconds in resume sending helper answer | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c02dda8 | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10650.956426; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f496c02dda8 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #404 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0946 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0888 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10650.982906; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | libevent_free: release ptr-libevent@0x7f49ac02dd98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #389 spent 0.358 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10650.993452; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #358 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.001733; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #299 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.015004; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.998359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #405 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.02329; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | libevent_free: release ptr-libevent@0x7f49bc030808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #413 spent 0.0896 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.030549; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006517 exceeds limit? YES "road-eastnet-nonat-169" #169: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-169" #169: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #421 at 0x55564da75478 | State DB: adding IKEv2 state #421 in UNDEFINED | pstats #421 ikev2.ike started | Message ID: init #421: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #421: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #421; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-169" #421: initiating v2 parent SA to replace #169 | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 421 for state #421 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f49bc030808 size 128 | #421 spent 0.0823 milliseconds in ikev2_parent_outI1() | RESET processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #169 ikev2.ike failed too-many-retransmits | pstats #169 ikev2.ike deleted too-many-retransmits | #169 spent 4.19 milliseconds in total | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-169" #169: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #169: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #169 "road-eastnet-nonat-169" #169: deleting IKE SA for connection 'road-eastnet-nonat-169' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-169' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-169 | State DB: deleting IKEv2 state #169 in PARENT_I1 | parent state #169: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 resuming | crypto helper 0 starting work-order 421 for state #421 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 421 | stop processing: state #169 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564daecfc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | in statetime_stop() and could not find #169 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-169 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-169' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-169" | stop processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:349) | spent 0.0621 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 421 time elapsed 0.000559 seconds | (#421) spent 0.558 milliseconds in crypto helper computing work-order 421: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 421 for state #421 to event queue | scheduling resume sending helper answer for #421 | libevent_malloc: new ptr-libevent@0x7f49bc030908 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 421 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #421 | **emit ISAKMP Message: | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | ikev2 g^x 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | ikev2 g^x a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | ikev2 g^x c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | ikev2 g^x c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | ikev2 g^x 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | ikev2 g^x cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | ikev2 g^x 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | ikev2 g^x b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | ikev2 g^x 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | ikev2 g^x b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | ikev2 g^x 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | ikev2 g^x a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | ikev2 g^x 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | ikev2 g^x 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | ikev2 g^x 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb a9 0b 58 7a | IKEv2 nonce 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b 04 24 92 95 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 28 6d 6b b2 23 ef f9 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a9 | natd_hash: port=500 | natd_hash: hash= cb a5 57 11 94 3a 39 7c 8d a3 55 ac b8 39 cb 0e | natd_hash: hash= 91 27 f7 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb a5 57 11 94 3a 39 7c 8d a3 55 ac b8 39 cb 0e | Notify data 91 27 f7 89 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 28 6d 6b b2 23 ef f9 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | natd_hash: hash= c4 49 90 ca | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | Notify data c4 49 90 ca | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #421 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #421: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #421 to 4294967295 after switching state | Message ID: IKE #421 skipping update_recv as MD is fake | Message ID: sent #421 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.169:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | state #421 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc030808 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f49a00334f8 size 128 | #421 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.031652 | resume sending helper answer for #421 suppresed complete_v2_state_transition() and stole MD | #421 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc030908 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.054854; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f49bc030908 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | libevent_free: release ptr-libevent@0x7f497401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #359 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.062136; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f497401d568 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #300 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.06742; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | libevent_free: release ptr-libevent@0x7f4988022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #390 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.070691; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #406 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.083971; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | libevent_free: release ptr-libevent@0x7f49b4030708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #414 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.107269; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007844 exceeds limit? YES "road-eastnet-nonat-170" #170: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-170" #170: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #422 at 0x55564da76bf8 | State DB: adding IKEv2 state #422 in UNDEFINED | pstats #422 ikev2.ike started | Message ID: init #422: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #422: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #422; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-170" #422: initiating v2 parent SA to replace #170 | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 422 for state #422 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da47a78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f49b4030708 size 128 | crypto helper 2 resuming | #422 spent 0.0805 milliseconds in ikev2_parent_outI1() | crypto helper 2 starting work-order 422 for state #422 | RESET processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 422 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #170 ikev2.ike failed too-many-retransmits | pstats #170 ikev2.ike deleted too-many-retransmits | #170 spent 4.32 milliseconds in total | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-170" #170: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #170: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #170 "road-eastnet-nonat-170" #170: deleting IKE SA for connection 'road-eastnet-nonat-170' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-170' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-170 | State DB: deleting IKEv2 state #170 in PARENT_I1 | parent state #170: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 422 time elapsed 0.000643 seconds | (#422) spent 0.643 milliseconds in crypto helper computing work-order 422: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 422 for state #422 to event queue | scheduling resume sending helper answer for #422 | libevent_malloc: new ptr-libevent@0x7f49b4030608 size 128 | crypto helper 2 waiting (nothing to do) | stop processing: state #170 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da3f0f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | in statetime_stop() and could not find #170 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-170 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-170' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-170" | stop processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:349) | spent 0.0632 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 422 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #422 | **emit ISAKMP Message: | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | ikev2 g^x b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | ikev2 g^x a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | ikev2 g^x c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | ikev2 g^x 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | ikev2 g^x 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | ikev2 g^x 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | ikev2 g^x 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | ikev2 g^x b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | ikev2 g^x 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | ikev2 g^x 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | ikev2 g^x 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | ikev2 g^x cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ikev2 g^x ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | ikev2 g^x 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | ikev2 g^x 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 31 90 a6 bf | IKEv2 nonce 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 bd 27 1f 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 51 a2 a3 94 d9 05 0c 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 aa | natd_hash: port=500 | natd_hash: hash= 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 07 a9 c2 bb | natd_hash: hash= b5 3a 62 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 07 a9 c2 bb | Notify data b5 3a 62 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 51 a2 a3 94 d9 05 0c 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | natd_hash: hash= 32 38 17 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | Notify data 32 38 17 68 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #422 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #422: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #422 to 4294967295 after switching state | Message ID: IKE #422 skipping update_recv as MD is fake | Message ID: sent #422 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.170:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | state #422 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4030708 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da47a78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f4994033678 size 128 | #422 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.108752 | resume sending helper answer for #422 suppresed complete_v2_state_transition() and stole MD | #422 spent 0.577 milliseconds in resume sending helper answer | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4030608 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.112977; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f49b4030608 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | libevent_free: release ptr-libevent@0x7f4998028538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #360 spent 0.0861 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.122214; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f4998028538 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | libevent_free: release ptr-libevent@0x7f496c01d468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #301 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.13558; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | libevent_free: release ptr-libevent@0x7f49a401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #391 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.136873; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | libevent_free: release ptr-libevent@0x7f498c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #407 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.146164; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | libevent_free: release ptr-libevent@0x7f49b8031168 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #415 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.174472; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007373 exceeds limit? YES "road-eastnet-nonat-171" #171: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-171" #171: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #423 at 0x55564da78378 | State DB: adding IKEv2 state #423 in UNDEFINED | pstats #423 ikev2.ike started | Message ID: init #423: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #423: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #423; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-171" #423: initiating v2 parent SA to replace #171 | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 423 for state #423 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da818d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f49b8031168 size 128 | #423 spent 0.0801 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 423 for state #423 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 423 | RESET processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #171 ikev2.ike failed too-many-retransmits | pstats #171 ikev2.ike deleted too-many-retransmits | #171 spent 3.77 milliseconds in total | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-171" #171: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #171: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #171 "road-eastnet-nonat-171" #171: deleting IKE SA for connection 'road-eastnet-nonat-171' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-171' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-171 | State DB: deleting IKEv2 state #171 in PARENT_I1 | parent state #171: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 423 time elapsed 0.000674 seconds | (#423) spent 0.676 milliseconds in crypto helper computing work-order 423: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 423 for state #423 to event queue | scheduling resume sending helper answer for #423 | libevent_malloc: new ptr-libevent@0x7f49b8031268 size 128 | crypto helper 4 waiting (nothing to do) | stop processing: state #171 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da40808 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | in statetime_stop() and could not find #171 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-171 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-171' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-171" | stop processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:349) | spent 0.0622 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 423 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #423 | **emit ISAKMP Message: | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | ikev2 g^x 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | ikev2 g^x a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | ikev2 g^x fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | ikev2 g^x a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | ikev2 g^x 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | ikev2 g^x 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ikev2 g^x ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | ikev2 g^x 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ikev2 g^x ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | ikev2 g^x 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | ikev2 g^x 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | ikev2 g^x 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | ikev2 g^x e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | ikev2 g^x b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | ikev2 g^x cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 37 29 3b 24 17 73 c2 19 33 a0 67 76 13 de f7 5a | IKEv2 nonce ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 13 ae fc 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f6 76 fd 28 c0 8f 44 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ab | natd_hash: port=500 | natd_hash: hash= b4 95 f0 ad 78 b2 eb fa fd 16 19 31 70 e3 50 14 | natd_hash: hash= 7e 84 55 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b4 95 f0 ad 78 b2 eb fa fd 16 19 31 70 e3 50 14 | Notify data 7e 84 55 d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f6 76 fd 28 c0 8f 44 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | natd_hash: hash= 7e 31 ae b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | Notify data 7e 31 ae b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #423 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #423: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #423 to 4294967295 after switching state | Message ID: IKE #423 skipping update_recv as MD is fake | Message ID: sent #423 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.171:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | state #423 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8031168 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da818d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f4998033558 size 128 | #423 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.175715 | resume sending helper answer for #423 suppresed complete_v2_state_transition() and stole MD | #423 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8031268 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.176882; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f49b8031268 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | libevent_free: release ptr-libevent@0x7f498c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #361 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.184168; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.001893 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f498c0284d8 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | libevent_free: release ptr-libevent@0x7f49bc01ff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #302 spent 0.0929 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.197451; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001385 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #392 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.205708; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #408 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.205909; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | libevent_free: release ptr-libevent@0x7f49ac033508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #416 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.237171; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008894 exceeds limit? YES "road-eastnet-nonat-172" #172: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-172" #172: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #424 at 0x55564da79af8 | State DB: adding IKEv2 state #424 in UNDEFINED | pstats #424 ikev2.ike started | Message ID: init #424: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #424: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #424; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-172" #424: initiating v2 parent SA to replace #172 | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 424 for state #424 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f49ac033508 size 128 | #424 spent 0.0792 milliseconds in ikev2_parent_outI1() | RESET processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #172 ikev2.ike failed too-many-retransmits | pstats #172 ikev2.ike deleted too-many-retransmits | crypto helper 5 resuming | crypto helper 5 starting work-order 424 for state #424 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 424 | #172 spent 3.46 milliseconds in total | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-172" #172: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #172: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #172 "road-eastnet-nonat-172" #172: deleting IKE SA for connection 'road-eastnet-nonat-172' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-172' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-172 | State DB: deleting IKEv2 state #172 in PARENT_I1 | parent state #172: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 424 time elapsed 0.000573 seconds | stop processing: state #172 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564daf15d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | in statetime_stop() and could not find #172 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-172 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | (#424) spent 0.579 milliseconds in crypto helper computing work-order 424: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 424 for state #424 to event queue | scheduling resume sending helper answer for #424 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 | start processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:186) | crypto helper 5 waiting (nothing to do) | connection 'road-eastnet-nonat-172' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-172" | stop processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:349) | spent 0.0868 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 424 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #424 | **emit ISAKMP Message: | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | ikev2 g^x a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | ikev2 g^x 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | ikev2 g^x 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | ikev2 g^x 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | ikev2 g^x 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | ikev2 g^x 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ikev2 g^x ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | ikev2 g^x c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ikev2 g^x ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | ikev2 g^x e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | ikev2 g^x 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | ikev2 g^x 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | ikev2 g^x 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ikev2 g^x ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | ikev2 g^x f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 00 80 4a 36 9e 20 dd 58 59 57 3e 23 ee 19 b1 12 | IKEv2 nonce 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 0f a0 d6 5b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 83 6e 87 96 61 2a c9 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ac | natd_hash: port=500 | natd_hash: hash= 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 a7 b2 49 c8 | natd_hash: hash= 5b 5d e1 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 a7 b2 49 c8 | Notify data 5b 5d e1 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 83 6e 87 96 61 2a c9 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | natd_hash: hash= 4e 66 b7 e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | Notify data 4e 66 b7 e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #424 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #424: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #424 to 4294967295 after switching state | Message ID: IKE #424 skipping update_recv as MD is fake | Message ID: sent #424 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.172:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | state #424 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac033508 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9fc528 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 | #424 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.238355 | resume sending helper answer for #424 suppresed complete_v2_state_transition() and stole MD | #424 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac01d4b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.242506; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | libevent_free: release ptr-libevent@0x7f49bc020028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #303 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.248838; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f49bc020028 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #362 spent 0.0947 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.267084; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #417 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.267211; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.998817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | libevent_free: release ptr-libevent@0x7f49b0033438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #409 spent 0.0677 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.269449; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003571 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f49b0033438 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | libevent_free: release ptr-libevent@0x7f49a00332f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #393 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa7488 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.297694; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008721 exceeds limit? YES "road-eastnet-nonat-173" #173: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-173" #173: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #425 at 0x55564da7b208 | State DB: adding IKEv2 state #425 in UNDEFINED | pstats #425 ikev2.ike started | Message ID: init #425: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #425: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #425; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-173" #425: initiating v2 parent SA to replace #173 | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 425 for state #425 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da6be98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f49a00332f8 size 128 | crypto helper 6 resuming | #425 spent 0.119 milliseconds in ikev2_parent_outI1() | crypto helper 6 starting work-order 425 for state #425 | RESET processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 425 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #173 ikev2.ike failed too-many-retransmits | pstats #173 ikev2.ike deleted too-many-retransmits | #173 spent 2.79 milliseconds in total | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-173" #173: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #173: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #173 "road-eastnet-nonat-173" #173: deleting IKE SA for connection 'road-eastnet-nonat-173' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-173' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-173 | State DB: deleting IKEv2 state #173 in PARENT_I1 | parent state #173: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #173 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 425 time elapsed 0.00099 seconds | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | (#425) spent 0.999 milliseconds in crypto helper computing work-order 425: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa7488 | in statetime_stop() and could not find #173 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 sending results from work-order 425 for state #425 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #425 Initiating connection road-eastnet-nonat-173 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f49b0033338 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 6 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-173' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-173" | stop processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:349) | spent 0.0854 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 425 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #425 | **emit ISAKMP Message: | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | ikev2 g^x b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | ikev2 g^x 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | ikev2 g^x 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | ikev2 g^x d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | ikev2 g^x 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | ikev2 g^x b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | ikev2 g^x da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | ikev2 g^x 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | ikev2 g^x 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ikev2 g^x ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | ikev2 g^x 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | ikev2 g^x 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | ikev2 g^x 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | ikev2 g^x 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | ikev2 g^x b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 04 67 fe 85 | IKEv2 nonce 74 19 4c cc b0 03 53 8b 00 75 6d 1b 1d 92 9b 14 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f8 16 a4 bf 49 82 21 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ad | natd_hash: port=500 | natd_hash: hash= eb 4c f6 91 42 50 3b 6e c9 ec 58 43 41 96 f8 50 | natd_hash: hash= f9 a4 aa 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 4c f6 91 42 50 3b 6e c9 ec 58 43 41 96 f8 50 | Notify data f9 a4 aa 14 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f8 16 a4 bf 49 82 21 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | natd_hash: hash= 02 c7 26 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | Notify data 02 c7 26 47 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #425 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #425: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #425 to 4294967295 after switching state | Message ID: IKE #425 skipping update_recv as MD is fake | Message ID: sent #425 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.173:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | state #425 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00332f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da6be98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f49900334f8 size 128 | #425 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.299395 | resume sending helper answer for #425 suppresed complete_v2_state_transition() and stole MD | #425 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0033338 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.304566; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f49b0033338 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #304 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.325883; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #410 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.326014; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005987 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #363 spent 0.07 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.038 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.335291; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #394 spent 0.0842 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.336528; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500552 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | libevent_free: release ptr-libevent@0x7f49a40335b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #418 spent 0.0814 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7bcf8 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.359764; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009782 exceeds limit? YES "road-eastnet-nonat-174" #174: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-174" #174: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #426 at 0x55564da7ca18 | State DB: adding IKEv2 state #426 in UNDEFINED | pstats #426 ikev2.ike started | Message ID: init #426: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #426: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #426; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-174" #426: initiating v2 parent SA to replace #174 | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 426 for state #426 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da64948 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f49a40335b8 size 128 | #426 spent 0.102 milliseconds in ikev2_parent_outI1() | RESET processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #174 ikev2.ike failed too-many-retransmits | pstats #174 ikev2.ike deleted too-many-retransmits | #174 spent 2.32 milliseconds in total | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-174" #174: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #174: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #174 "road-eastnet-nonat-174" #174: deleting IKE SA for connection 'road-eastnet-nonat-174' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-174' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 7 resuming | crypto helper 7 starting work-order 426 for state #426 | in connection_discard for connection road-eastnet-nonat-174 | State DB: deleting IKEv2 state #174 in PARENT_I1 | parent state #174: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 426 | stop processing: state #174 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498c033248 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7bcf8 | in statetime_stop() and could not find #174 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-174 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-174' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-174" | stop processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:349) | spent 0.0663 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 426 time elapsed 0.000537 seconds | (#426) spent 0.536 milliseconds in crypto helper computing work-order 426: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 426 for state #426 to event queue | scheduling resume sending helper answer for #426 | libevent_malloc: new ptr-libevent@0x7f49a40336b8 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 426 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #426 | **emit ISAKMP Message: | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | ikev2 g^x d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | ikev2 g^x e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | ikev2 g^x 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | ikev2 g^x 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | ikev2 g^x 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | ikev2 g^x 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | ikev2 g^x 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | ikev2 g^x 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | ikev2 g^x 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | ikev2 g^x 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | ikev2 g^x 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | ikev2 g^x 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | ikev2 g^x c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | ikev2 g^x e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | ikev2 g^x c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 21 14 88 c7 4c 7a e7 44 9c 88 36 3f b4 8b 0e ec | IKEv2 nonce 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 fd 35 09 af | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= be e3 3f 86 4b 60 d2 dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ae | natd_hash: port=500 | natd_hash: hash= 21 0b d5 63 13 ed 1b c0 df 05 40 2a 7c 5e 2b a6 | natd_hash: hash= 61 27 24 67 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 0b d5 63 13 ed 1b c0 df 05 40 2a 7c 5e 2b a6 | Notify data 61 27 24 67 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= be e3 3f 86 4b 60 d2 dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | natd_hash: hash= 34 de 29 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | Notify data 34 de 29 14 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #426 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #426: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #426 to 4294967295 after switching state | Message ID: IKE #426 skipping update_recv as MD is fake | Message ID: sent #426 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.174:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | state #426 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a40335b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da64948 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f4984033388 size 128 | #426 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.361015 | resume sending helper answer for #426 suppresed complete_v2_state_transition() and stole MD | #426 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a40336b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.364192; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f49a40336b8 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #305 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.383484; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | libevent_free: release ptr-libevent@0x7f497c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #411 spent 0.0953 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.388753; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #364 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.391001; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #395 spent 0.0848 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.396255; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | libevent_free: release ptr-libevent@0x7f49a80335d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #419 spent 0.0976 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.415537; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00667 exceeds limit? YES "road-eastnet-nonat-175" #175: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-175" #175: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #427 at 0x55564da7e078 | State DB: adding IKEv2 state #427 in UNDEFINED | pstats #427 ikev2.ike started | Message ID: init #427: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #427: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #427; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-175" #427: initiating v2 parent SA to replace #175 | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 427 for state #427 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe7b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f49a80335d8 size 128 | crypto helper 8 resuming | #427 spent 0.0791 milliseconds in ikev2_parent_outI1() | crypto helper 8 starting work-order 427 for state #427 | RESET processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 427 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #175 ikev2.ike failed too-many-retransmits | pstats #175 ikev2.ike deleted too-many-retransmits | #175 spent 2.13 milliseconds in total | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-175" #175: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #175: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #175 "road-eastnet-nonat-175" #175: deleting IKE SA for connection 'road-eastnet-nonat-175' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-175' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-175 | State DB: deleting IKEv2 state #175 in PARENT_I1 | parent state #175: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #175 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d9c0ef8 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 427 time elapsed 0.000583 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | (#427) spent 0.57 milliseconds in crypto helper computing work-order 427: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #175 | crypto helper 8 sending results from work-order 427 for state #427 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #427 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 8 waiting (nothing to do) Initiating connection road-eastnet-nonat-175 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-175' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-175" | stop processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:349) | spent 0.064 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 427 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #427 | **emit ISAKMP Message: | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | ikev2 g^x 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | ikev2 g^x 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | ikev2 g^x f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | ikev2 g^x e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | ikev2 g^x 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | ikev2 g^x 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | ikev2 g^x 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | ikev2 g^x 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | ikev2 g^x 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | ikev2 g^x b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | ikev2 g^x cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | ikev2 g^x 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | ikev2 g^x e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | ikev2 g^x e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | ikev2 g^x 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 5a 6d 1a 58 87 02 09 62 80 20 5e d8 9b d8 56 | IKEv2 nonce 8d fe fe 02 00 a1 29 c5 8d 31 91 9a ab af fc 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 0e af 24 ec b9 a2 b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 af | natd_hash: port=500 | natd_hash: hash= 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 dc 95 7d 1e | natd_hash: hash= e4 94 8a f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 dc 95 7d 1e | Notify data e4 94 8a f4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 44 0e af 24 ec b9 a2 b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | natd_hash: hash= fe a8 29 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | Notify data fe a8 29 4d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #427 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #427: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #427 to 4294967295 after switching state | Message ID: IKE #427 skipping update_recv as MD is fake | Message ID: sent #427 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.175:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | state #427 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a80335d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe7b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f4988033508 size 128 | #427 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.416672 | resume sending helper answer for #427 suppresed complete_v2_state_transition() and stole MD | #427 spent 0.311 milliseconds in resume sending helper answer | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a803e4b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.445844; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003819 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #365 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.448178; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | libevent_free: release ptr-libevent@0x7f498001d4e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #412 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.452479; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | libevent_free: release ptr-libevent@0x7f4990022cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #396 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.454824; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #306 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.457114; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | libevent_free: release ptr-libevent@0x7f499c0335b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #420 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.475429; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006898 exceeds limit? YES "road-eastnet-nonat-176" #176: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-176" #176: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #428 at 0x55564da7f6d8 | State DB: adding IKEv2 state #428 in UNDEFINED | pstats #428 ikev2.ike started | Message ID: init #428: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #428: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #428; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-176" #428: initiating v2 parent SA to replace #176 | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 428 for state #428 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f499c0335b8 size 128 | #428 spent 0.0811 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | crypto helper 9 starting work-order 428 for state #428 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 428 | RESET processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #176 ikev2.ike failed too-many-retransmits | pstats #176 ikev2.ike deleted too-many-retransmits | #176 spent 2.09 milliseconds in total | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-176" #176: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #176: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #176 "road-eastnet-nonat-176" #176: deleting IKE SA for connection 'road-eastnet-nonat-176' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-176' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-176 | State DB: deleting IKEv2 state #176 in PARENT_I1 | parent state #176: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 428 time elapsed 0.000788 seconds | (#428) spent 0.81 milliseconds in crypto helper computing work-order 428: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 428 for state #428 to event queue | scheduling resume sending helper answer for #428 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 | crypto helper 9 waiting (nothing to do) | stop processing: state #176 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49840331d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | in statetime_stop() and could not find #176 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-176 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-176' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-176" | stop processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:349) | spent 0.072 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 428 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #428 | **emit ISAKMP Message: | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | ikev2 g^x d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | ikev2 g^x 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | ikev2 g^x fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | ikev2 g^x 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ikev2 g^x ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | ikev2 g^x df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | ikev2 g^x 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | ikev2 g^x 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | ikev2 g^x e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | ikev2 g^x 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | ikev2 g^x df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | ikev2 g^x a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | ikev2 g^x 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | ikev2 g^x 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | ikev2 g^x 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 1f b9 58 b6 | IKEv2 nonce cd c7 51 58 c5 90 65 a7 7b 66 67 3c e5 fb 4c 09 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8a 72 d7 75 6c 59 c5 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b0 | natd_hash: port=500 | natd_hash: hash= 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 2e 16 53 66 | natd_hash: hash= 83 d9 cc 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 2e 16 53 66 | Notify data 83 d9 cc 17 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8a 72 d7 75 6c 59 c5 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | natd_hash: hash= 7f a6 4c 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | Notify data 7f a6 4c 09 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #428 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #428: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #428 to 4294967295 after switching state | Message ID: IKE #428 skipping update_recv as MD is fake | Message ID: sent #428 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.176:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | state #428 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c0335b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f497c033e38 size 128 | #428 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.476865 | resume sending helper answer for #428 suppresed complete_v2_state_transition() and stole MD | #428 spent 0.358 milliseconds in resume sending helper answer | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c02de48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.50203; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | libevent_free: release ptr-libevent@0x7f49800284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #366 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.51539; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f49800284c8 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | libevent_free: release ptr-libevent@0x7f49b40256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #397 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.515528; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002954 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f49b40256e8 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #307 spent 0.0715 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0373 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.524839; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #413 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.532096; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | libevent_free: release ptr-libevent@0x7f49a00334f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #421 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.537418; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006826 exceeds limit? YES "road-eastnet-nonat-177" #177: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-177" #177: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #429 at 0x55564da80de8 | State DB: adding IKEv2 state #429 in UNDEFINED | pstats #429 ikev2.ike started | Message ID: init #429: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #429: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #429; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-177" #429: initiating v2 parent SA to replace #177 | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 429 for state #429 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f49a00334f8 size 128 | #429 spent 0.0796 milliseconds in ikev2_parent_outI1() | RESET processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #177 ikev2.ike failed too-many-retransmits | crypto helper 10 resuming | crypto helper 10 starting work-order 429 for state #429 | pstats #177 ikev2.ike deleted too-many-retransmits | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 429 | #177 spent 2.45 milliseconds in total | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-177" #177: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #177: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #177 "road-eastnet-nonat-177" #177: deleting IKE SA for connection 'road-eastnet-nonat-177' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-177' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-177 | State DB: deleting IKEv2 state #177 in PARENT_I1 | parent state #177: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #177 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d9b6de8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | in statetime_stop() and could not find #177 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-177 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 429 time elapsed 0.000593 seconds | (#429) spent 0.654 milliseconds in crypto helper computing work-order 429: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 429 for state #429 to event queue | scheduling resume sending helper answer for #429 | libevent_malloc: new ptr-libevent@0x7f49a00333f8 size 128 | crypto helper 10 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-177' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-177" | stop processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:349) | spent 0.103 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 429 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #429 | **emit ISAKMP Message: | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | ikev2 g^x d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | ikev2 g^x 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | ikev2 g^x 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | ikev2 g^x 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | ikev2 g^x 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | ikev2 g^x bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | ikev2 g^x 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | ikev2 g^x 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | ikev2 g^x 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | ikev2 g^x 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | ikev2 g^x be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | ikev2 g^x 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | ikev2 g^x cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | ikev2 g^x d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | ikev2 g^x cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 99 99 81 e2 43 a4 ae 1e bc 25 13 66 c3 4f 83 | IKEv2 nonce 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 26 3c b4 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4f 0e 15 f2 87 ea 0f 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b1 | natd_hash: port=500 | natd_hash: hash= fd 95 54 b1 69 3b 7e f4 29 7c 0f ac 98 50 71 70 | natd_hash: hash= b6 8b 96 c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd 95 54 b1 69 3b 7e f4 29 7c 0f ac 98 50 71 70 | Notify data b6 8b 96 c6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4f 0e 15 f2 87 ea 0f 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | natd_hash: hash= 1f 48 3f de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | Notify data 1f 48 3f de | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #429 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #429: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #429 to 4294967295 after switching state | Message ID: IKE #429 skipping update_recv as MD is fake | Message ID: sent #429 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.177:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | state #429 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a00334f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f49800335a8 size 128 | #429 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.53874 | resume sending helper answer for #429 suppresed complete_v2_state_transition() and stole MD | #429 spent 0.422 milliseconds in resume sending helper answer | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a00333f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.561979; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f49a00333f8 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #367 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.571285; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #308 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.575565; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003698 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #398 spent 0.0875 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.585854; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #414 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.60915; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | libevent_free: release ptr-libevent@0x7f4994033678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #422 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.62443; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f4994033678 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | libevent_free: release ptr-libevent@0x7f4998017c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #368 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.627714; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007409 exceeds limit? YES "road-eastnet-nonat-178" #178: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-178" #178: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #430 at 0x55564da824f8 | State DB: adding IKEv2 state #430 in UNDEFINED | pstats #430 ikev2.ike started | Message ID: init #430: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #430: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #430; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-178" #430: initiating v2 parent SA to replace #178 | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 430 for state #430 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da60488 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f4998017c78 size 128 | #430 spent 0.113 milliseconds in ikev2_parent_outI1() | RESET processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #178 ikev2.ike failed too-many-retransmits | pstats #178 ikev2.ike deleted too-many-retransmits | #178 spent 5.89 milliseconds in total | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-178" #178: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #178: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #178 "road-eastnet-nonat-178" #178: deleting IKE SA for connection 'road-eastnet-nonat-178' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-178' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-178 | State DB: deleting IKEv2 state #178 in PARENT_I1 | parent state #178: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 resuming | stop processing: state #178 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 11 starting work-order 430 for state #430 | libevent_free: release ptr-libevent@0x7f49b000cd68 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | in statetime_stop() and could not find #178 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-178 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-178' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-178" | stop processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 430 time elapsed 0.000516 seconds | (#430) spent 0.52 milliseconds in crypto helper computing work-order 430: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 430 for state #430 to event queue | scheduling resume sending helper answer for #430 | libevent_malloc: new ptr-libevent@0x7f4994033778 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 430 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #430 | **emit ISAKMP Message: | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | ikev2 g^x 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | ikev2 g^x 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | ikev2 g^x 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | ikev2 g^x d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | ikev2 g^x da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | ikev2 g^x 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | ikev2 g^x 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | ikev2 g^x b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ikev2 g^x ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | ikev2 g^x 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | ikev2 g^x a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | ikev2 g^x c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ikev2 g^x ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | ikev2 g^x 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | ikev2 g^x 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c 22 a3 fa a2 | IKEv2 nonce 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae 01 33 fe ea | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 7b 88 df 2a f4 91 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b2 | natd_hash: port=500 | natd_hash: hash= a3 e5 24 41 b4 9f 18 3b bd f4 38 10 fc 39 a4 3c | natd_hash: hash= 7c f1 9b fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 e5 24 41 b4 9f 18 3b bd f4 38 10 fc 39 a4 3c | Notify data 7c f1 9b fd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 77 7b 88 df 2a f4 91 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | natd_hash: hash= 70 cf bc 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | Notify data 70 cf bc 06 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #430 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #430: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #430 to 4294967295 after switching state | Message ID: IKE #430 skipping update_recv as MD is fake | Message ID: sent #430 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.178:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | state #430 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998017c78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da60488 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f4974033668 size 128 | #430 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.628832 | resume sending helper answer for #430 suppresed complete_v2_state_transition() and stole MD | #430 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994033778 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.629977; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f4994033778 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #309 spent 0.0858 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.631213; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #399 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.647493; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | libevent_free: release ptr-libevent@0x7f498c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #415 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.676932; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | libevent_free: release ptr-libevent@0x7f4998033558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #423 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.683187; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f4998033558 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #369 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.705568; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003848 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #400 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.707918; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #416 spent 0.0984 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.71829; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006875 exceeds limit? YES "road-eastnet-nonat-179" #179: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-179" #179: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #431 at 0x55564da83c08 | State DB: adding IKEv2 state #431 in UNDEFINED | pstats #431 ikev2.ike started | Message ID: init #431: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #431: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #431; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-179" #431: initiating v2 parent SA to replace #179 | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 431 for state #431 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 | #431 spent 0.0986 milliseconds in ikev2_parent_outI1() | RESET processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #179 ikev2.ike failed too-many-retransmits | pstats #179 ikev2.ike deleted too-many-retransmits | #179 spent 6.45 milliseconds in total | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-179" #179: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #179: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #179 "road-eastnet-nonat-179" #179: deleting IKE SA for connection 'road-eastnet-nonat-179' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-179' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 12 resuming | crypto helper 12 starting work-order 431 for state #431 | in connection_discard for connection road-eastnet-nonat-179 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 431 | State DB: deleting IKEv2 state #179 in PARENT_I1 | parent state #179: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 431 time elapsed 0.000749 seconds | (#431) spent 0.753 milliseconds in crypto helper computing work-order 431: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 431 for state #431 to event queue | scheduling resume sending helper answer for #431 | libevent_malloc: new ptr-libevent@0x7f4998033458 size 128 | crypto helper 12 waiting (nothing to do) | stop processing: state #179 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da61c08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | in statetime_stop() and could not find #179 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.719282; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f49780335d8 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #310 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-179 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-179' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-179" | stop processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:349) | spent 0.0697 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 431 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #431 | **emit ISAKMP Message: | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | ikev2 g^x 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | ikev2 g^x 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | ikev2 g^x 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | ikev2 g^x e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | ikev2 g^x d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | ikev2 g^x 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | ikev2 g^x a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ikev2 g^x ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | ikev2 g^x 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | ikev2 g^x c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | ikev2 g^x 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | ikev2 g^x 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | ikev2 g^x f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | ikev2 g^x 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | ikev2 g^x be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d ec b4 74 d8 | IKEv2 nonce dc ab a4 ec 7e 2d a0 33 0f 36 34 9e 47 2e 27 dd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fc 65 a2 c4 e2 1c a4 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b3 | natd_hash: port=500 | natd_hash: hash= d4 1c 57 e7 38 8d bf df a2 76 c7 16 53 ed 22 1f | natd_hash: hash= 0c 2b 6b a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 1c 57 e7 38 8d bf df a2 76 c7 16 53 ed 22 1f | Notify data 0c 2b 6b a5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fc 65 a2 c4 e2 1c a4 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | natd_hash: hash= 8c a0 47 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | Notify data 8c a0 47 af | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #431 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #431: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #431 to 4294967295 after switching state | Message ID: IKE #431 skipping update_recv as MD is fake | Message ID: sent #431 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.179:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | state #431 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9b6d08 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 | #431 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.720008 | resume sending helper answer for #431 suppresed complete_v2_state_transition() and stole MD | #431 spent 0.427 milliseconds in resume sending helper answer | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998033458 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.739327; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f4998033458 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | libevent_free: release ptr-libevent@0x7f498c033448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #424 spent 0.235 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.767125; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.0041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | libevent_free: release ptr-libevent@0x7f49bc01a7b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #370 spent 0.459 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.24 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.769088; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #417 spent 0.413 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.775134; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | libevent_free: release ptr-libevent@0x7f498002de38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #401 spent 0.46 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.801145; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f498002de38 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | libevent_free: release ptr-libevent@0x7f49900334f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #425 spent 0.431 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.801643; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008673 exceeds limit? YES "road-eastnet-nonat-180" #180: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-180" #180: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #432 at 0x55564da85318 | State DB: adding IKEv2 state #432 in UNDEFINED | pstats #432 ikev2.ike started | Message ID: init #432: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #432: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #432; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-180" #432: initiating v2 parent SA to replace #180 | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 432 for state #432 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da6be98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f49900334f8 size 128 | #432 spent 0.285 milliseconds in ikev2_parent_outI1() | RESET processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #180 ikev2.ike failed too-many-retransmits | pstats #180 ikev2.ike deleted too-many-retransmits | #180 spent 3.7 milliseconds in total | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-180" #180: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #180: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #180 | crypto helper 13 resuming | crypto helper 13 starting work-order 432 for state #432 "road-eastnet-nonat-180" #180: deleting IKE SA for connection 'road-eastnet-nonat-180' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 432 | add revival: connection 'road-eastnet-nonat-180' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-180 | State DB: deleting IKEv2 state #180 in PARENT_I1 | parent state #180: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 432 time elapsed 0.002612 seconds | (#432) spent 2.6 milliseconds in crypto helper computing work-order 432: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 432 for state #432 to event queue | stop processing: state #180 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f496c038d28 | scheduling resume sending helper answer for #432 | libevent_malloc: new ptr-libevent@0x7f498c033348 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | crypto helper 13 waiting (nothing to do) | in statetime_stop() and could not find #180 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-180 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-180' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-180" | stop processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:349) | spent 0.163 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 432 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #432 | **emit ISAKMP Message: | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | ikev2 g^x 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | ikev2 g^x 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | ikev2 g^x 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | ikev2 g^x 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | ikev2 g^x e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ikev2 g^x ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | ikev2 g^x e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ikev2 g^x ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | ikev2 g^x 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | ikev2 g^x df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | ikev2 g^x 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | ikev2 g^x 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | ikev2 g^x 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | ikev2 g^x 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | ikev2 g^x b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 53 b8 0e 82 69 74 09 02 7c 3b be 29 24 6d 4c | IKEv2 nonce 79 c3 82 da bd 3f 78 99 90 0a 47 7f c8 50 92 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e5 bb 12 ef 62 43 9f 53 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b4 | natd_hash: port=500 | natd_hash: hash= 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 32 e1 fe 4e | natd_hash: hash= 8b 84 fe 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 32 e1 fe 4e | Notify data 8b 84 fe 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e5 bb 12 ef 62 43 9f 53 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | natd_hash: hash= 4f 8d ed 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | Notify data 4f 8d ed 8c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #432 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #432: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #432 to 4294967295 after switching state | Message ID: IKE #432 skipping update_recv as MD is fake | Message ID: sent #432 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.180:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | state #432 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49900334f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da6be98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f496c033718 size 128 | #432 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.807027 | resume sending helper answer for #432 suppresed complete_v2_state_transition() and stole MD | #432 spent 1.53 milliseconds in resume sending helper answer | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c033348 | timer_event_cb: processing event@0x55564dada198 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.807201; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f498c033348 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | libevent_free: release ptr-libevent@0x7f4994022ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada198 | #311 spent 0.349 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.183 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.825152; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f4994022ed8 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | libevent_free: release ptr-libevent@0x7f49780239c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #371 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.221 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.83014; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f49780239c8 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | libevent_free: release ptr-libevent@0x7f497402de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #402 spent 0.477 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.245 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.838176; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #418 spent 0.413 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.862048; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | libevent_free: release ptr-libevent@0x7f4984033388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #426 spent 0.421 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da875f8 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.862541; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009052 exceeds limit? YES "road-eastnet-nonat-181" #181: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-181" #181: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #433 at 0x55564da86a28 | State DB: adding IKEv2 state #433 in UNDEFINED | pstats #433 ikev2.ike started | Message ID: init #433: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #433: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #433; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-181" #433: initiating v2 parent SA to replace #181 | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 433 for state #433 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da64948 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f4984033388 size 128 | #433 spent 0.285 milliseconds in ikev2_parent_outI1() | RESET processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #181 ikev2.ike failed too-many-retransmits | pstats #181 ikev2.ike deleted too-many-retransmits | #181 spent 2.76 milliseconds in total | crypto helper 14 resuming | crypto helper 14 starting work-order 433 for state #433 | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-181" #181: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #181: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #181 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 433 "road-eastnet-nonat-181" #181: deleting IKE SA for connection 'road-eastnet-nonat-181' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-181' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-181 | State DB: deleting IKEv2 state #181 in PARENT_I1 | parent state #181: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 433 time elapsed 0.003443 seconds | stop processing: state #181 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da43628 | (#433) spent 3.42 milliseconds in crypto helper computing work-order 433: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 433 for state #433 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da875f8 | in statetime_stop() and could not find #181 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #433 | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #312 | libevent_malloc: new ptr-libevent@0x7f49900333f8 size 128 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | crypto helper 14 waiting (nothing to do) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.866747; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.009034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f49bc035f08 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | libevent_free: release ptr-libevent@0x7f4998023608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #312 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.219 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.183 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-181 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-181' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-181" | stop processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:349) | spent 0.178 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 433 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #433 | **emit ISAKMP Message: | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | ikev2 g^x c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | ikev2 g^x 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | ikev2 g^x 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | ikev2 g^x 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ikev2 g^x ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | ikev2 g^x 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | ikev2 g^x 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | ikev2 g^x 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | ikev2 g^x 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | ikev2 g^x 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | ikev2 g^x e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | ikev2 g^x d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | ikev2 g^x f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | ikev2 g^x 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ikev2 g^x ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d 84 fd 1c b8 | IKEv2 nonce 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b ef 18 57 ad | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 aa 33 3a 7c f4 c4 a7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b5 | natd_hash: port=500 | natd_hash: hash= b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 74 e5 1e b8 | natd_hash: hash= 1b 6b 28 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 74 e5 1e b8 | Notify data 1b 6b 28 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 61 aa 33 3a 7c f4 c4 a7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | natd_hash: hash= 55 ee 65 bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | Notify data 55 ee 65 bc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #433 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #433: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #433 to 4294967295 after switching state | Message ID: IKE #433 skipping update_recv as MD is fake | Message ID: sent #433 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.181:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | state #433 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4984033388 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da64948 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 | #433 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.869415 | resume sending helper answer for #433 suppresed complete_v2_state_transition() and stole MD | #433 spent 1.54 milliseconds in resume sending helper answer | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49900333f8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.88999; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006321 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f49900333f8 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | libevent_free: release ptr-libevent@0x7f499802dcf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #372 spent 0.597 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.321 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.89317; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f499802dcf8 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | libevent_free: release ptr-libevent@0x7f497802dd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #403 spent 0.476 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.226 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.898078; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f497802dd68 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #419 spent 0.395 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.917941; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | libevent_free: release ptr-libevent@0x7f4988033508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #427 spent 0.411 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10651.920851; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f4988033508 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #313 spent 0.407 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.925704; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010343 exceeds limit? YES "road-eastnet-nonat-182" #182: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-182" #182: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #434 at 0x55564da881a8 | State DB: adding IKEv2 state #434 in UNDEFINED | pstats #434 ikev2.ike started | Message ID: init #434: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #434: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #434; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-182" #434: initiating v2 parent SA to replace #182 | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 434 for state #434 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da1dae8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 | #434 spent 0.28 milliseconds in ikev2_parent_outI1() | RESET processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #182 ikev2.ike failed too-many-retransmits | pstats #182 ikev2.ike deleted too-many-retransmits | crypto helper 15 resuming | crypto helper 15 starting work-order 434 for state #434 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 434 | #182 spent 2.96 milliseconds in total | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-182" #182: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #182: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #182 "road-eastnet-nonat-182" #182: deleting IKE SA for connection 'road-eastnet-nonat-182' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-182' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-182 | State DB: deleting IKEv2 state #182 in PARENT_I1 | parent state #182: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 434 time elapsed 0.003309 seconds | stop processing: state #182 from 192.1.2.23 (in delete_state() at state.c:1143) | (#434) spent 3.29 milliseconds in crypto helper computing work-order 434: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 434 for state #434 to event queue | libevent_free: release ptr-libevent@0x55564d9bf7e8 | scheduling resume sending helper answer for #434 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | libevent_malloc: new ptr-libevent@0x7f4984033488 size 128 | in statetime_stop() and could not find #182 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 15 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-182 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-182' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-182" | stop processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:349) | spent 0.19 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 434 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #434 | **emit ISAKMP Message: | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | ikev2 g^x 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | ikev2 g^x 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | ikev2 g^x 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | ikev2 g^x 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | ikev2 g^x 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | ikev2 g^x 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | ikev2 g^x 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | ikev2 g^x df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | ikev2 g^x da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ikev2 g^x ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | ikev2 g^x 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | ikev2 g^x 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | ikev2 g^x f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | ikev2 g^x 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | ikev2 g^x 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc 6c 99 ee 2e | IKEv2 nonce 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 27 64 84 9e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b5 6c f7 06 90 54 6e 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b6 | natd_hash: port=500 | natd_hash: hash= 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 89 23 ec e3 | natd_hash: hash= d8 4f 48 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 89 23 ec e3 | Notify data d8 4f 48 05 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b5 6c f7 06 90 54 6e 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | natd_hash: hash= e7 0f 15 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | Notify data e7 0f 15 23 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #434 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #434: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #434 to 4294967295 after switching state | Message ID: IKE #434 skipping update_recv as MD is fake | Message ID: sent #434 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.182:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | state #434 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da1dae8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f49b4035f78 size 128 | #434 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.931482 | resume sending helper answer for #434 suppresed complete_v2_state_transition() and stole MD | #434 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984033488 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.222 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10651.942957; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f4984033488 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #373 spent 0.218 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10651.957439; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | libevent_free: release ptr-libevent@0x7f496c02dda8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #404 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10651.958745; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002397 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f496c02dda8 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #420 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10651.97706; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | libevent_free: release ptr-libevent@0x7f497c033e38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #428 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10651.982358; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00847 exceeds limit? YES "road-eastnet-nonat-183" #183: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-183" #183: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #435 at 0x55564da89928 | State DB: adding IKEv2 state #435 in UNDEFINED | pstats #435 ikev2.ike started | Message ID: init #435: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #435: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #435; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-183" #435: initiating v2 parent SA to replace #183 | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 435 for state #435 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f497c033e38 size 128 | #435 spent 0.0795 milliseconds in ikev2_parent_outI1() | RESET processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #183 ikev2.ike failed too-many-retransmits | pstats #183 ikev2.ike deleted too-many-retransmits | #183 spent 2.82 milliseconds in total | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-183" #183: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #183: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #183 "road-eastnet-nonat-183" #183: deleting IKE SA for connection 'road-eastnet-nonat-183' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-183' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-183 | crypto helper 16 resuming | crypto helper 16 starting work-order 435 for state #435 | State DB: deleting IKEv2 state #183 in PARENT_I1 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 435 | parent state #183: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 435 time elapsed 0.000566 seconds | (#435) spent 0.567 milliseconds in crypto helper computing work-order 435: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 435 for state #435 to event queue | scheduling resume sending helper answer for #435 | libevent_malloc: new ptr-libevent@0x7f4988033608 size 128 | crypto helper 16 waiting (nothing to do) | stop processing: state #183 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da802a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | in statetime_stop() and could not find #183 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-183 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-183' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-183" | stop processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:349) | spent 0.061 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 435 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #435 | **emit ISAKMP Message: | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | ikev2 g^x 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | ikev2 g^x 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | ikev2 g^x f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | ikev2 g^x 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | ikev2 g^x 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | ikev2 g^x b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | ikev2 g^x 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | ikev2 g^x 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | ikev2 g^x 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | ikev2 g^x d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | ikev2 g^x 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | ikev2 g^x 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | ikev2 g^x e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | ikev2 g^x 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ikev2 g^x ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e 5c 0e 98 ac | IKEv2 nonce 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d 71 1f a9 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f5 02 ca 9a 7a 53 74 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b7 | natd_hash: port=500 | natd_hash: hash= 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a b0 8f aa 8e | natd_hash: hash= 05 df 4a 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a b0 8f aa 8e | Notify data 05 df 4a 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f5 02 ca 9a 7a 53 74 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | natd_hash: hash= da b0 04 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | Notify data da b0 04 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #435 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #435: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #435 to 4294967295 after switching state | Message ID: IKE #435 skipping update_recv as MD is fake | Message ID: sent #435 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.183:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | state #435 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c033e38 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f49b80369d8 size 128 | #435 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10651.983506 | resume sending helper answer for #435 suppresed complete_v2_state_transition() and stole MD | #435 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988033608 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.005695; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f4988033608 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | libevent_free: release ptr-libevent@0x7f49b801a678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #374 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.013048; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f49b801a678 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | libevent_free: release ptr-libevent@0x7f4984022d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #314 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.016289; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #405 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.033551; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #421 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.039808; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | libevent_free: release ptr-libevent@0x7f49800335a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #429 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.039941; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00684 exceeds limit? YES "road-eastnet-nonat-184" #184: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-184" #184: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #436 at 0x55564da8b038 | State DB: adding IKEv2 state #436 in UNDEFINED | pstats #436 ikev2.ike started | Message ID: init #436: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #436: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #436; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-184" #436: initiating v2 parent SA to replace #184 | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 436 for state #436 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f49800335a8 size 128 | #436 spent 0.0807 milliseconds in ikev2_parent_outI1() | RESET processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #184 ikev2.ike failed too-many-retransmits | pstats #184 ikev2.ike deleted too-many-retransmits | #184 spent 2.19 milliseconds in total | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-184" #184: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #184: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #184 "road-eastnet-nonat-184" #184: deleting IKE SA for connection 'road-eastnet-nonat-184' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-184' added to the list and scheduled for 0 seconds | crypto helper 1 resuming | crypto helper 1 starting work-order 436 for state #436 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-184 | State DB: deleting IKEv2 state #184 in PARENT_I1 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 436 | parent state #184: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #184 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 436 time elapsed 0.000595 seconds | libevent_free: release ptr-libevent@0x55564da819b8 | (#436) spent 0.601 milliseconds in crypto helper computing work-order 436: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 436 for state #436 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | in statetime_stop() and could not find #184 | scheduling resume sending helper answer for #436 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 | crypto helper 1 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0953 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-184 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-184' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-184" | stop processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:349) | spent 0.0748 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 436 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #436 | **emit ISAKMP Message: | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | ikev2 g^x e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | ikev2 g^x 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | ikev2 g^x 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ikev2 g^x ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | ikev2 g^x f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | ikev2 g^x 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | ikev2 g^x b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | ikev2 g^x 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | ikev2 g^x fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | ikev2 g^x dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | ikev2 g^x 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | ikev2 g^x 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | ikev2 g^x a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | ikev2 g^x fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | ikev2 g^x 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 f4 b6 fa dc | IKEv2 nonce 05 c6 b2 36 36 a1 0d c6 81 54 96 fa ea 87 65 34 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3d 41 e2 8e 98 1e 22 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b8 | natd_hash: port=500 | natd_hash: hash= 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 84 98 d9 6c | natd_hash: hash= 10 3f 8a a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 84 98 d9 6c | Notify data 10 3f 8a a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 3d 41 e2 8e 98 1e 22 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | natd_hash: hash= 70 10 c3 ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | Notify data 70 10 c3 ac | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #436 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #436: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #436 to 4294967295 after switching state | Message ID: IKE #436 skipping update_recv as MD is fake | Message ID: sent #436 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.184:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | state #436 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800335a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f49ac038d78 size 128 | #436 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.041319 | resume sending helper answer for #436 suppresed complete_v2_state_transition() and stole MD | #436 spent 0.373 milliseconds in resume sending helper answer | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c01d4b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.068482; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | libevent_free: release ptr-libevent@0x7f4980018dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #375 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0836 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.07183; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | libevent_free: release ptr-libevent@0x7f4988022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #406 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.096143; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | libevent_free: release ptr-libevent@0x7f4988022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #315 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.098427; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006356 exceeds limit? YES "road-eastnet-nonat-185" #185: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-185" #185: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #437 at 0x55564da8c748 | State DB: adding IKEv2 state #437 in UNDEFINED | pstats #437 ikev2.ike started | Message ID: init #437: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #437: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #437; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-185" #437: initiating v2 parent SA to replace #185 | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 437 for state #437 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da108b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f4988022b68 size 128 | #437 spent 0.0782 milliseconds in ikev2_parent_outI1() | RESET processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | crypto helper 3 starting work-order 437 for state #437 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 437 | pstats #185 ikev2.ike failed too-many-retransmits | pstats #185 ikev2.ike deleted too-many-retransmits | #185 spent 1.96 milliseconds in total | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-185" #185: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #185: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #185 "road-eastnet-nonat-185" #185: deleting IKE SA for connection 'road-eastnet-nonat-185' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-185' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-185 | State DB: deleting IKEv2 state #185 in PARENT_I1 | parent state #185: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 437 time elapsed 0.000718 seconds | (#437) spent 0.726 milliseconds in crypto helper computing work-order 437: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 437 for state #437 to event queue | scheduling resume sending helper answer for #437 | libevent_malloc: new ptr-libevent@0x7f49800336a8 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #185 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dad73e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | in statetime_stop() and could not find #185 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-185 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-185' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-185" | stop processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:349) | spent 0.0609 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 437 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #437 | **emit ISAKMP Message: | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ikev2 g^x ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | ikev2 g^x 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | ikev2 g^x 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | ikev2 g^x b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | ikev2 g^x fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | ikev2 g^x 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ikev2 g^x ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | ikev2 g^x c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | ikev2 g^x 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ikev2 g^x ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | ikev2 g^x cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | ikev2 g^x eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | ikev2 g^x 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | ikev2 g^x 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | ikev2 g^x c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 9c 36 3a f8 79 33 20 46 93 98 e2 a2 a1 a0 9d | IKEv2 nonce c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 a6 bd 1f 9a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 f5 41 05 b0 05 7b d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b9 | natd_hash: port=500 | natd_hash: hash= 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c 2f 32 59 7b | natd_hash: hash= e6 f3 78 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c 2f 32 59 7b | Notify data e6 f3 78 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 07 f5 41 05 b0 05 7b d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | natd_hash: hash= 3e 17 09 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | Notify data 3e 17 09 16 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #437 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #437: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #437 to 4294967295 after switching state | Message ID: IKE #437 skipping update_recv as MD is fake | Message ID: sent #437 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.185:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | state #437 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988022b68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da108b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f49b0038ca8 size 128 | #437 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.099709 | resume sending helper answer for #437 suppresed complete_v2_state_transition() and stole MD | #437 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49800336a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.110885; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f49800336a8 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #422 spent 0.0935 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.127164; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | libevent_free: release ptr-libevent@0x7f49a402dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #376 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.129478; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f49a402dd48 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | libevent_free: release ptr-libevent@0x7f4974033668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #430 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.138851; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f4974033668 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | libevent_free: release ptr-libevent@0x7f49a401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #407 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.051 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.164209; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | libevent_free: release ptr-libevent@0x7f496c01d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #316 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.17356; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006493 exceeds limit? YES "road-eastnet-nonat-186" #186: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-186" #186: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #438 at 0x55564da8df58 | State DB: adding IKEv2 state #438 in UNDEFINED | pstats #438 ikev2.ike started | Message ID: init #438: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #438: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #438; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-186" #438: initiating v2 parent SA to replace #186 | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 438 for state #438 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da71a48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f496c01d568 size 128 | #438 spent 0.0774 milliseconds in ikev2_parent_outI1() | RESET processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 17 resuming | pstats #186 ikev2.ike failed too-many-retransmits | pstats #186 ikev2.ike deleted too-many-retransmits | #186 spent 3.76 milliseconds in total | crypto helper 17 starting work-order 438 for state #438 | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 438 "road-eastnet-nonat-186" #186: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #186: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #186 "road-eastnet-nonat-186" #186: deleting IKE SA for connection 'road-eastnet-nonat-186' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-186' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-186 | State DB: deleting IKEv2 state #186 in PARENT_I1 | parent state #186: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 438 time elapsed 0.00065 seconds | stop processing: state #186 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | in statetime_stop() and could not find #186 | (#438) spent 0.656 milliseconds in crypto helper computing work-order 438: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 438 for state #438 to event queue | scheduling resume sending helper answer for #438 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f4974033568 size 128 | crypto helper 17 waiting (nothing to do) Initiating connection road-eastnet-nonat-186 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-186' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-186" | stop processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:349) | spent 0.0953 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 438 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #438 | **emit ISAKMP Message: | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | ikev2 g^x 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | ikev2 g^x e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | ikev2 g^x 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | ikev2 g^x 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | ikev2 g^x 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | ikev2 g^x 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | ikev2 g^x 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | ikev2 g^x e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | ikev2 g^x 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | ikev2 g^x b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | ikev2 g^x 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ikev2 g^x ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | ikev2 g^x cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | ikev2 g^x 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | ikev2 g^x 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 c8 85 7e cf | IKEv2 nonce 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 df 31 ca bb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b5 7f bc 9a 4f d3 17 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ba | natd_hash: port=500 | natd_hash: hash= 57 e4 ab 6f b2 31 66 da cf 29 37 f4 92 2f cc 5d | natd_hash: hash= de 95 b4 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 e4 ab 6f b2 31 66 da cf 29 37 f4 92 2f cc 5d | Notify data de 95 b4 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b5 7f bc 9a 4f d3 17 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | natd_hash: hash= 62 71 e6 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | Notify data 62 71 e6 61 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #438 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #438: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #438 to 4294967295 after switching state | Message ID: IKE #438 skipping update_recv as MD is fake | Message ID: sent #438 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.186:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | state #438 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c01d568 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da71a48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f49a4038e28 size 128 | #438 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.174929 | resume sending helper answer for #438 suppresed complete_v2_state_transition() and stole MD | #438 spent 0.376 milliseconds in resume sending helper answer | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974033568 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0878 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.178146; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f4974033568 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | libevent_free: release ptr-libevent@0x7f498c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #423 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.190536; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | libevent_free: release ptr-libevent@0x7f497c022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #377 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.206861; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #408 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.22018; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #431 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.229526; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | libevent_free: release ptr-libevent@0x7f4980022b58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | #317 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0766 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.240933; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f4980022b58 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | libevent_free: release ptr-libevent@0x7f4998033458 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #424 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.249207; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f4998033458 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #378 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.267526; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008357 exceeds limit? YES "road-eastnet-nonat-187" #187: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-187" #187: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #439 at 0x55564da8f5b8 | State DB: adding IKEv2 state #439 in UNDEFINED | pstats #439 ikev2.ike started | Message ID: init #439: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #439: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #439; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-187" #439: initiating v2 parent SA to replace #187 | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 439 for state #439 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9e8168 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 | crypto helper 18 resuming | #439 spent 0.11 milliseconds in ikev2_parent_outI1() | crypto helper 18 starting work-order 439 for state #439 | RESET processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 439 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #187 ikev2.ike failed too-many-retransmits | pstats #187 ikev2.ike deleted too-many-retransmits | #187 spent 4.16 milliseconds in total | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-187" #187: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #187: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #187 "road-eastnet-nonat-187" #187: deleting IKE SA for connection 'road-eastnet-nonat-187' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-187' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-187 | State DB: deleting IKEv2 state #187 in PARENT_I1 | parent state #187: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #187 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b8025658 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | in statetime_stop() and could not find #187 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-187 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 439 time elapsed 0.000569 seconds | (#439) spent 0.614 milliseconds in crypto helper computing work-order 439: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 439 for state #439 to event queue | scheduling resume sending helper answer for #439 | libevent_malloc: new ptr-libevent@0x7f49780334d8 size 128 | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-187' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-187" | stop processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:349) | spent 0.0841 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.268378; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f49a8038e48 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #409 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 439 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #439 | **emit ISAKMP Message: | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | ikev2 g^x 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | ikev2 g^x e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | ikev2 g^x 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | ikev2 g^x b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | ikev2 g^x 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | ikev2 g^x 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | ikev2 g^x 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | ikev2 g^x 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | ikev2 g^x 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | ikev2 g^x 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | ikev2 g^x 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | ikev2 g^x 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | ikev2 g^x a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | ikev2 g^x 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | ikev2 g^x 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d0 76 e2 b5 de 54 c7 32 af c0 6f 31 8a 71 5c 66 | IKEv2 nonce da a8 62 de 0e 5e 86 e9 53 4d f3 e7 7f dc 14 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b8 11 ad 01 05 35 6c 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bb | natd_hash: port=500 | natd_hash: hash= d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad 43 1c 4c 98 | natd_hash: hash= 83 ee 24 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad 43 1c 4c 98 | Notify data 83 ee 24 7e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= b8 11 ad 01 05 35 6c 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | natd_hash: hash= 5f 99 af 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | Notify data 5f 99 af 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #439 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #439: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #439 to 4294967295 after switching state | Message ID: IKE #439 skipping update_recv as MD is fake | Message ID: sent #439 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.187:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | state #439 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9e8168 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 | #439 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.268987 | resume sending helper answer for #439 suppresed complete_v2_state_transition() and stole MD | #439 spent 0.376 milliseconds in resume sending helper answer | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49780334d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.2872; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0044 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f49780334d8 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | libevent_free: release ptr-libevent@0x7f4974022dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #318 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.302488; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f4974022dd8 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | libevent_free: release ptr-libevent@0x7f498002de38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #425 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.306844; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f498002de38 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | libevent_free: release ptr-libevent@0x7f496c033718 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #432 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0559 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.31212; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f496c033718 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #379 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.326419; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007985 exceeds limit? YES "road-eastnet-nonat-188" #188: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-188" #188: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #440 at 0x55564da90c18 | State DB: adding IKEv2 state #440 in UNDEFINED | pstats #440 ikev2.ike started | Message ID: init #440: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #440: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #440; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-188" #440: initiating v2 parent SA to replace #188 | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 440 for state #440 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dac5bd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 | #440 spent 0.0779 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 440 for state #440 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 440 | RESET processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #188 ikev2.ike failed too-many-retransmits | pstats #188 ikev2.ike deleted too-many-retransmits | #188 spent 2.19 milliseconds in total | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-188" #188: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #188: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #188 "road-eastnet-nonat-188" #188: deleting IKE SA for connection 'road-eastnet-nonat-188' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-188' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-188 | State DB: deleting IKEv2 state #188 in PARENT_I1 | parent state #188: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #188 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 440 time elapsed 0.000992 seconds | libevent_free: release ptr-libevent@0x55564da54bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | in statetime_stop() and could not find #188 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#440) spent 1 milliseconds in crypto helper computing work-order 440: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 440 for state #440 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #440 | libevent_malloc: new ptr-libevent@0x7f496c033618 size 128 Initiating connection road-eastnet-nonat-188 which received a Delete/Notify but must remain up per local policy | crypto helper 19 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-188' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-188" | stop processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:349) | spent 0.108 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.327691; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f499c038e28 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #410 spent 0.0938 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 440 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #440 | **emit ISAKMP Message: | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ikev2 g^x ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | ikev2 g^x 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | ikev2 g^x d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ikev2 g^x ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | ikev2 g^x 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | ikev2 g^x 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | ikev2 g^x 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | ikev2 g^x 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | ikev2 g^x fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | ikev2 g^x e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ikev2 g^x ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | ikev2 g^x c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | ikev2 g^x 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | ikev2 g^x cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | ikev2 g^x 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 06 81 84 30 b2 da 7c f0 90 67 bf 36 23 0f 43 | IKEv2 nonce 13 e8 78 57 cc c8 2f ed b9 99 6d 49 96 a1 6a 78 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 dc f4 ee a9 93 db 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bc | natd_hash: port=500 | natd_hash: hash= b7 99 76 59 b8 c8 cf d8 0e 69 27 da 53 db db b3 | natd_hash: hash= 6a b2 75 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 99 76 59 b8 c8 cf d8 0e 69 27 da 53 db db b3 | Notify data 6a b2 75 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 66 dc f4 ee a9 93 db 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | natd_hash: hash= 53 0e 09 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | Notify data 53 0e 09 8e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #440 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #440: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #440 to 4294967295 after switching state | Message ID: IKE #440 skipping update_recv as MD is fake | Message ID: sent #440 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.188:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | state #440 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dac5bd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 | #440 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.328188 | resume sending helper answer for #440 suppresed complete_v2_state_transition() and stole MD | #440 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c033618 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.342354; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f496c033618 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #319 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.363718; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #426 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.367985; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | libevent_free: release ptr-libevent@0x7f4998023608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #433 spent 0.0927 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.368099; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #380 spent 0.0678 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.384359; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #411 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.385698; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007155 exceeds limit? YES "road-eastnet-nonat-189" #189: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-189" #189: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #441 at 0x55564da92328 | State DB: adding IKEv2 state #441 in UNDEFINED | pstats #441 ikev2.ike started | Message ID: init #441: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #441: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #441; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-189" #441: initiating v2 parent SA to replace #189 | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 441 for state #441 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6cb8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f4978012488 size 128 | #441 spent 0.135 milliseconds in ikev2_parent_outI1() | RESET processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 0 resuming | crypto helper 0 starting work-order 441 for state #441 | pstats #189 ikev2.ike failed too-many-retransmits | pstats #189 ikev2.ike deleted too-many-retransmits | #189 spent 2.07 milliseconds in total | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 441 "road-eastnet-nonat-189" #189: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #189: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #189 "road-eastnet-nonat-189" #189: deleting IKE SA for connection 'road-eastnet-nonat-189' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-189' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-189 | State DB: deleting IKEv2 state #189 in PARENT_I1 | parent state #189: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #189 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d9f8018 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | in statetime_stop() and could not find #189 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-189 which received a Delete/Notify but must remain up per local policy | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 441 time elapsed 0.000564 seconds | FOR_EACH_CONNECTION_... in conn_by_name | (#441) spent 0.616 milliseconds in crypto helper computing work-order 441: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 441 for state #441 to event queue | scheduling resume sending helper answer for #441 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-189' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-189" | stop processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:349) | spent 0.0989 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 441 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #441 | **emit ISAKMP Message: | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | ikev2 g^x a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | ikev2 g^x f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | ikev2 g^x c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | ikev2 g^x fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | ikev2 g^x 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | ikev2 g^x 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | ikev2 g^x 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | ikev2 g^x 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | ikev2 g^x 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | ikev2 g^x 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | ikev2 g^x 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | ikev2 g^x 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | ikev2 g^x a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | ikev2 g^x 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | ikev2 g^x 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc 13 1e 64 a0 | IKEv2 nonce c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d 15 ea 25 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 26 95 91 9e f3 ee 98 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bd | natd_hash: port=500 | natd_hash: hash= b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e 8e 4a 99 7a | natd_hash: hash= f1 5a d5 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e 8e 4a 99 7a | Notify data f1 5a d5 e2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 26 95 91 9e f3 ee 98 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | natd_hash: hash= f4 89 c7 ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | Notify data f4 89 c7 ec | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #441 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #441: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #441 to 4294967295 after switching state | Message ID: IKE #441 skipping update_recv as MD is fake | Message ID: sent #441 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.189:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | state #441 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4978012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9a6cb8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f49a0038d68 size 128 | #441 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.387124 | resume sending helper answer for #441 suppresed complete_v2_state_transition() and stole MD | #441 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc03b5c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.40733; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #320 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.419702; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #427 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.430034; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498552 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | libevent_free: release ptr-libevent@0x7f49b4035f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #434 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.430172; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f49b4035f78 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #381 spent 0.0692 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.445448; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007509 exceeds limit? YES "road-eastnet-nonat-190" #190: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-190" #190: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #442 at 0x55564da93b38 | State DB: adding IKEv2 state #442 in UNDEFINED | pstats #442 ikev2.ike started | Message ID: init #442: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #442: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #442; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-190" #442: initiating v2 parent SA to replace #190 | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 442 for state #442 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da56298 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f49b8030f68 size 128 | #442 spent 0.0824 milliseconds in ikev2_parent_outI1() | RESET processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 442 for state #442 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 442 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #190 ikev2.ike failed too-many-retransmits | pstats #190 ikev2.ike deleted too-many-retransmits | #190 spent 2.66 milliseconds in total | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-190" #190: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #190: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #190 "road-eastnet-nonat-190" #190: deleting IKE SA for connection 'road-eastnet-nonat-190' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-190' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-190 | State DB: deleting IKEv2 state #190 in PARENT_I1 | parent state #190: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #190 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 442 time elapsed 0.001171 seconds | libevent_free: release ptr-libevent@0x7f497402dc58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | in statetime_stop() and could not find #190 | (#442) spent 1.17 milliseconds in crypto helper computing work-order 442: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 442 for state #442 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #442 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49b4036078 size 128 Initiating connection road-eastnet-nonat-190 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 2 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-190' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-190" | stop processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:349) | spent 0.087 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 442 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #442 | **emit ISAKMP Message: | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | ikev2 g^x 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | ikev2 g^x e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | ikev2 g^x a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | ikev2 g^x 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | ikev2 g^x 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | ikev2 g^x 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | ikev2 g^x 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | ikev2 g^x bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | ikev2 g^x 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | ikev2 g^x 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | ikev2 g^x be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | ikev2 g^x 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | ikev2 g^x 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | ikev2 g^x dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | ikev2 g^x 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 33 df f8 78 8f 44 77 90 e2 9c 0d 1c b4 e7 8b | IKEv2 nonce 05 41 1f f0 f6 1d ee 81 f4 97 54 5e 1b cc cb 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7d 42 fe 3b 06 7d 03 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 be | natd_hash: port=500 | natd_hash: hash= 74 5b 66 b1 da b1 5a c0 a6 85 45 cc fc 9d 59 ff | natd_hash: hash= 4f 1e 91 c9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 5b 66 b1 da b1 5a c0 a6 85 45 cc fc 9d 59 ff | Notify data 4f 1e 91 c9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7d 42 fe 3b 06 7d 03 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | natd_hash: hash= 66 47 5a 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | Notify data 66 47 5a 2e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #442 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #442: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #442 to 4294967295 after switching state | Message ID: IKE #442 skipping update_recv as MD is fake | Message ID: sent #442 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.190:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | state #442 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b8030f68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da56298 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f4994038ed8 size 128 | #442 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.447403 | resume sending helper answer for #442 suppresed complete_v2_state_transition() and stole MD | #442 spent 0.482 milliseconds in resume sending helper answer | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4036078 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.449581; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f49b4036078 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #412 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.462841; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #321 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.478216; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #428 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.484516; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | libevent_free: release ptr-libevent@0x7f49b80369d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #435 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da92e98 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.504823; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006767 exceeds limit? YES "road-eastnet-nonat-191" #191: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-191" #191: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #443 at 0x55564da95198 | State DB: adding IKEv2 state #443 in UNDEFINED | pstats #443 ikev2.ike started | Message ID: init #443: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #443: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #443; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-191" #443: initiating v2 parent SA to replace #191 | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 443 for state #443 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f49b80369d8 size 128 | #443 spent 0.0957 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | RESET processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 443 for state #443 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 443 | pstats #191 ikev2.ike failed too-many-retransmits | pstats #191 ikev2.ike deleted too-many-retransmits | #191 spent 2.72 milliseconds in total | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-191" #191: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #191: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #191 "road-eastnet-nonat-191" #191: deleting IKE SA for connection 'road-eastnet-nonat-191' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-191' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-191 | State DB: deleting IKEv2 state #191 in PARENT_I1 | parent state #191: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #191 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c038c28 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 443 time elapsed 0.00059 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da92e98 | (#443) spent 0.597 milliseconds in crypto helper computing work-order 443: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 443 for state #443 to event queue | in statetime_stop() and could not find #191 | scheduling resume sending helper answer for #443 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b8036ad8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-191 which received a Delete/Notify but must remain up per local policy | crypto helper 4 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-191' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-191" | stop processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:349) | spent 0.068 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 443 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #443 | **emit ISAKMP Message: | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | ikev2 g^x a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | ikev2 g^x 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | ikev2 g^x 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | ikev2 g^x 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | ikev2 g^x 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | ikev2 g^x 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | ikev2 g^x 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | ikev2 g^x bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | ikev2 g^x 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | ikev2 g^x 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | ikev2 g^x db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | ikev2 g^x 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | ikev2 g^x c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | ikev2 g^x 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | ikev2 g^x 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a 38 24 66 64 | IKEv2 nonce 84 ab 82 1a 99 ab bc 26 80 23 55 18 e8 31 8a c7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cf 31 39 36 0c d1 c2 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bf | natd_hash: port=500 | natd_hash: hash= 12 da e8 98 56 7f b9 b1 fc a7 af 0f 4f b9 b7 9d | natd_hash: hash= 69 f3 99 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 da e8 98 56 7f b9 b1 fc a7 af 0f 4f b9 b7 9d | Notify data 69 f3 99 aa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cf 31 39 36 0c d1 c2 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | natd_hash: hash= 85 c3 76 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | Notify data 85 c3 76 af | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #443 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #443: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #443 to 4294967295 after switching state | Message ID: IKE #443 skipping update_recv as MD is fake | Message ID: sent #443 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.191:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | state #443 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b80369d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dae7238 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f4998039588 size 128 | #443 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.506034 | resume sending helper answer for #443 suppresed complete_v2_state_transition() and stole MD | #443 spent 0.337 milliseconds in resume sending helper answer | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b8036ad8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.520238; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f49b8036ad8 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #382 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.526519; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #413 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.527759; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | libevent_free: release ptr-libevent@0x7f49b40257e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #322 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.541042; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f49b40257e8 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #429 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.542326; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | libevent_free: release ptr-libevent@0x7f49ac038d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #436 spent 0.0825 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da95d68 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.577587; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007891 exceeds limit? YES "road-eastnet-nonat-192" #192: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-192" #192: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #444 at 0x55564da96918 | State DB: adding IKEv2 state #444 in UNDEFINED | pstats #444 ikev2.ike started | Message ID: init #444: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #444: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #444; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-192" #444: initiating v2 parent SA to replace #192 | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 444 for state #444 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f49ac038d78 size 128 | #444 spent 0.0789 milliseconds in ikev2_parent_outI1() | RESET processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #192 ikev2.ike failed too-many-retransmits | pstats #192 ikev2.ike deleted too-many-retransmits | #192 spent 4.05 milliseconds in total | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-192" #192: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #192: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #192 "road-eastnet-nonat-192" #192: deleting IKE SA for connection 'road-eastnet-nonat-192' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-192' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 5 resuming | crypto helper 5 starting work-order 444 for state #444 | in connection_discard for connection road-eastnet-nonat-192 | State DB: deleting IKEv2 state #192 in PARENT_I1 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 444 | parent state #192: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 444 time elapsed 0.000568 seconds | (#444) spent 0.571 milliseconds in crypto helper computing work-order 444: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 444 for state #444 to event queue | scheduling resume sending helper answer for #444 | libevent_malloc: new ptr-libevent@0x7f49ac038e78 size 128 | stop processing: state #192 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a0038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da95d68 | in statetime_stop() and could not find #192 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-192 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 5 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-192' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-192" | stop processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:349) | spent 0.0621 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 444 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #444 | **emit ISAKMP Message: | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | ikev2 g^x d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | ikev2 g^x 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | ikev2 g^x d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | ikev2 g^x 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | ikev2 g^x aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | ikev2 g^x 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | ikev2 g^x b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | ikev2 g^x 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | ikev2 g^x 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | ikev2 g^x 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ikev2 g^x ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | ikev2 g^x 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | ikev2 g^x 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | ikev2 g^x 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | ikev2 g^x a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 07 08 91 41 64 ba 86 a7 09 76 72 47 3b ba bf 8c | IKEv2 nonce 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 5f 49 77 0b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7d fa 0c 55 40 f1 70 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c0 | natd_hash: port=500 | natd_hash: hash= 53 4e 19 20 1d 02 42 b3 ce 03 36 9f 82 44 92 34 | natd_hash: hash= 54 56 0f 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 4e 19 20 1d 02 42 b3 ce 03 36 9f 82 44 92 34 | Notify data 54 56 0f 0b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 7d fa 0c 55 40 f1 70 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | natd_hash: hash= 23 2e 79 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | Notify data 23 2e 79 f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #444 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #444: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #444 to 4294967295 after switching state | Message ID: IKE #444 skipping update_recv as MD is fake | Message ID: sent #444 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.192:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | state #444 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac038d78 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da209e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f498c038cb8 size 128 | #444 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.578775 | resume sending helper answer for #444 suppresed complete_v2_state_transition() and stole MD | #444 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac038e78 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.584985; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005545 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da95d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f49ac038e78 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | libevent_free: release ptr-libevent@0x7f49a8022cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #323 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.587368; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003867 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f49a8022cf8 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #414 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.600614; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | libevent_free: release ptr-libevent@0x7f49b0038ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #437 spent 0.0925 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.613979; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f49b0038ca8 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | libevent_free: release ptr-libevent@0x7f498402dcc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #383 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.630322; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f498402dcc8 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | libevent_free: release ptr-libevent@0x7f49a402dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #430 spent 0.0954 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.638566; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008952 exceeds limit? YES "road-eastnet-nonat-193" #193: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-193" #193: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #445 at 0x55564da98098 | State DB: adding IKEv2 state #445 in UNDEFINED | pstats #445 ikev2.ike started | Message ID: init #445: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #445: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #445; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-193" #445: initiating v2 parent SA to replace #193 | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 445 for state #445 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f49a402dd48 size 128 | #445 spent 0.0994 milliseconds in ikev2_parent_outI1() | RESET processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #193 ikev2.ike failed too-many-retransmits | pstats #193 ikev2.ike deleted too-many-retransmits | #193 spent 2.21 milliseconds in total | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-193" #193: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #193: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #193 "road-eastnet-nonat-193" #193: deleting IKE SA for connection 'road-eastnet-nonat-193' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-193' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 6 resuming | crypto helper 6 starting work-order 445 for state #445 | in connection_discard for connection road-eastnet-nonat-193 | State DB: deleting IKEv2 state #193 in PARENT_I1 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 445 | parent state #193: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 445 time elapsed 0.000754 seconds | (#445) spent 0.754 milliseconds in crypto helper computing work-order 445: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 445 for state #445 to event queue | scheduling resume sending helper answer for #445 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 | crypto helper 6 waiting (nothing to do) | stop processing: state #193 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4994038cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | in statetime_stop() and could not find #193 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-193 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-193' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-193" | stop processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:349) | spent 0.0704 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 445 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #445 | **emit ISAKMP Message: | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | ikev2 g^x 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | ikev2 g^x b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | ikev2 g^x db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | ikev2 g^x 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | ikev2 g^x 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ikev2 g^x ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | ikev2 g^x 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | ikev2 g^x 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | ikev2 g^x 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | ikev2 g^x b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | ikev2 g^x 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | ikev2 g^x e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | ikev2 g^x d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | ikev2 g^x 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | ikev2 g^x a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 55 be f8 46 | IKEv2 nonce 1c 2f b9 e5 e1 3f de e4 65 17 85 2e bc 5a e8 b1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 04 0b 7c 6d d0 c7 31 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c1 | natd_hash: port=500 | natd_hash: hash= 87 52 71 e1 e3 bd f0 17 1a 82 95 ec 6c 61 86 98 | natd_hash: hash= 81 81 12 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 87 52 71 e1 e3 bd f0 17 1a 82 95 ec 6c 61 86 98 | Notify data 81 81 12 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 04 0b 7c 6d d0 c7 31 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | natd_hash: hash= 09 86 2d 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | Notify data 09 86 2d 61 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #445 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #445: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #445 to 4294967295 after switching state | Message ID: IKE #445 skipping update_recv as MD is fake | Message ID: sent #445 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.193:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | state #445 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a402dd48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab73f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f4990038cb8 size 128 | #445 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.640093 | resume sending helper answer for #445 suppresed complete_v2_state_transition() and stole MD | #445 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b00284c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.642369; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | libevent_free: release ptr-libevent@0x7f499c022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #324 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.648753; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #415 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0757 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.675222; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | libevent_free: release ptr-libevent@0x7f49a4038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #438 spent 0.34 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.675587; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f49a4038e28 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | libevent_free: release ptr-libevent@0x7f498802dc48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #384 spent 0.218 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.126 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.697239; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008471 exceeds limit? YES "road-eastnet-nonat-194" #194: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-194" #194: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #446 at 0x55564da99818 | State DB: adding IKEv2 state #446 in UNDEFINED | pstats #446 ikev2.ike started | Message ID: init #446: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #446: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #446; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-194" #446: initiating v2 parent SA to replace #194 | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 446 for state #446 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daa45f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 | #446 spent 0.125 milliseconds in ikev2_parent_outI1() | RESET processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #194 ikev2.ike failed too-many-retransmits | pstats #194 ikev2.ike deleted too-many-retransmits | #194 spent 2.76 milliseconds in total | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-194" #194: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #194: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #194 "road-eastnet-nonat-194" #194: deleting IKE SA for connection 'road-eastnet-nonat-194' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-194' added to the list and scheduled for 0 seconds | crypto helper 7 resuming | crypto helper 7 starting work-order 446 for state #446 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-194 | State DB: deleting IKEv2 state #194 in PARENT_I1 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 446 | parent state #194: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #194 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da36688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | in statetime_stop() and could not find #194 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-194 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-194' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-194" | stop processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:349) | spent 0.0838 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 446 time elapsed 0.001209 seconds | (#446) spent 1.22 milliseconds in crypto helper computing work-order 446: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 446 for state #446 to event queue | scheduling resume sending helper answer for #446 | libevent_malloc: new ptr-libevent@0x7f49a4038f28 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 446 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #446 | **emit ISAKMP Message: | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | ikev2 g^x 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | ikev2 g^x 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ikev2 g^x ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | ikev2 g^x aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | ikev2 g^x b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ikev2 g^x ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | ikev2 g^x 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | ikev2 g^x f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | ikev2 g^x 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | ikev2 g^x bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | ikev2 g^x 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ikev2 g^x ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | ikev2 g^x c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | ikev2 g^x 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | ikev2 g^x 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c7 66 e5 e3 db 53 e3 63 96 1d 46 13 16 6d eb 7f | IKEv2 nonce fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d ac 13 b1 c4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c 95 58 12 49 41 60 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c2 | natd_hash: port=500 | natd_hash: hash= d8 df 17 2f 44 f1 48 c5 48 57 28 bd 44 6f 54 d5 | natd_hash: hash= 27 71 c5 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 df 17 2f 44 f1 48 c5 48 57 28 bd 44 6f 54 d5 | Notify data 27 71 c5 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5c 95 58 12 49 41 60 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | natd_hash: hash= 7d fe ba 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | Notify data 7d fe ba 8e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #446 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #446: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #446 to 4294967295 after switching state | Message ID: IKE #446 skipping update_recv as MD is fake | Message ID: sent #446 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.194:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | state #446 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498802dc48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daa45f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f4984038b38 size 128 | #446 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.699538 | resume sending helper answer for #446 suppresed complete_v2_state_transition() and stole MD | #446 spent 0.758 milliseconds in resume sending helper answer | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4038f28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.082 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.70381; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f49a4038f28 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | libevent_free: release ptr-libevent@0x7f49a0022ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #325 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.709138; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003116 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #416 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.721452; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #431 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.74377; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | libevent_free: release ptr-libevent@0x7f4994012488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #385 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.757058; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008632 exceeds limit? YES "road-eastnet-nonat-195" #195: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-195" #195: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #447 at 0x55564da9af28 | State DB: adding IKEv2 state #447 in UNDEFINED | pstats #447 ikev2.ike started | Message ID: init #447: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #447: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #447; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-195" #447: initiating v2 parent SA to replace #195 | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 447 for state #447 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f4994012488 size 128 | #447 spent 0.0828 milliseconds in ikev2_parent_outI1() | RESET processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 447 for state #447 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #195 ikev2.ike failed too-many-retransmits | pstats #195 ikev2.ike deleted too-many-retransmits | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 447 | #195 spent 3.14 milliseconds in total | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-195" #195: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #195: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #195 "road-eastnet-nonat-195" #195: deleting IKE SA for connection 'road-eastnet-nonat-195' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-195' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-195 | State DB: deleting IKEv2 state #195 in PARENT_I1 | parent state #195: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 447 time elapsed 0.000901 seconds | (#447) spent 0.905 milliseconds in crypto helper computing work-order 447: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 447 for state #447 to event queue | scheduling resume sending helper answer for #447 | stop processing: state #195 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7f49a8038f48 size 128 | libevent_free: release ptr-libevent@0x7f4990038b08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | in statetime_stop() and could not find #195 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 8 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-195 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-195' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-195" | stop processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:349) | spent 0.0622 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 447 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #447 | **emit ISAKMP Message: | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | ikev2 g^x 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | ikev2 g^x a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | ikev2 g^x a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | ikev2 g^x 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | ikev2 g^x 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | ikev2 g^x 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | ikev2 g^x 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | ikev2 g^x 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | ikev2 g^x b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | ikev2 g^x 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | ikev2 g^x 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | ikev2 g^x dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | ikev2 g^x 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | ikev2 g^x 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | ikev2 g^x 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 65 9c db 9e | IKEv2 nonce e8 7f 00 f9 98 25 96 b4 0c 4d 1f df 61 95 61 fc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fb 59 14 14 b8 b3 1c 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c3 | natd_hash: port=500 | natd_hash: hash= 65 69 92 df 10 17 d1 6d a4 a2 1a cd 61 1a 9a 77 | natd_hash: hash= 11 f9 4c 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 69 92 df 10 17 d1 6d a4 a2 1a cd 61 1a 9a 77 | Notify data 11 f9 4c 76 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= fb 59 14 14 b8 b3 1c 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | natd_hash: hash= 1e cc be e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | Notify data 1e cc be e7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #447 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #447: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #447 to 4294967295 after switching state | Message ID: IKE #447 skipping update_recv as MD is fake | Message ID: sent #447 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.195:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | state #447 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994012488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f4988038d68 size 128 | #447 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.75858 | resume sending helper answer for #447 suppresed complete_v2_state_transition() and stole MD | #447 spent 0.339 milliseconds in resume sending helper answer | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8038f48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.769782; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f49a8038f48 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #439 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.770052; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | libevent_free: release ptr-libevent@0x7f49bc01a7b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #417 spent 0.0986 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.780335; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005581 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | libevent_free: release ptr-libevent@0x7f49b401fd78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #326 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.80264; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #386 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.80699; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | libevent_free: release ptr-libevent@0x7f498002de38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #432 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.819323; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008295 exceeds limit? YES "road-eastnet-nonat-196" #196: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-196" #196: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #448 at 0x55564da9c588 | State DB: adding IKEv2 state #448 in UNDEFINED | pstats #448 ikev2.ike started | Message ID: init #448: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #448: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #448; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-196" #448: initiating v2 parent SA to replace #196 | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 448 for state #448 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f498002de38 size 128 | #448 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #196 ikev2.ike failed too-many-retransmits | pstats #196 ikev2.ike deleted too-many-retransmits | #196 spent 2.59 milliseconds in total | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-196" #196: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #196: PARENT_I1(half-open IKE SA) => delete | crypto helper 9 resuming | crypto helper 9 starting work-order 448 for state #448 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #196 "road-eastnet-nonat-196" #196: deleting IKE SA for connection 'road-eastnet-nonat-196' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-196' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 448 | in connection_discard for connection road-eastnet-nonat-196 | State DB: deleting IKEv2 state #196 in PARENT_I1 | parent state #196: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #196 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dae72a8 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 448 time elapsed 0.000582 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | in statetime_stop() and could not find #196 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#448) spent 0.588 milliseconds in crypto helper computing work-order 448: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 448 for state #448 to event queue | scheduling resume sending helper answer for #448 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 9 waiting (nothing to do) Initiating connection road-eastnet-nonat-196 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-196' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-196" | stop processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:349) | spent 0.0667 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 448 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #448 | **emit ISAKMP Message: | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | ikev2 g^x b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | ikev2 g^x f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | ikev2 g^x 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | ikev2 g^x 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | ikev2 g^x 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | ikev2 g^x 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | ikev2 g^x 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | ikev2 g^x 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | ikev2 g^x 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | ikev2 g^x 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | ikev2 g^x df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | ikev2 g^x 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | ikev2 g^x c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | ikev2 g^x 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | ikev2 g^x 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e 22 5c a6 36 | IKEv2 nonce e4 2a 4a 10 c2 5e ed ef 63 af 80 89 2e 3a 2b ea | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 fe 28 a0 c6 93 5c b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c4 | natd_hash: port=500 | natd_hash: hash= 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b 58 6e ef b8 | natd_hash: hash= df 44 8b 9a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b 58 6e ef b8 | Notify data df 44 8b 9a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= c2 fe 28 a0 c6 93 5c b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | natd_hash: hash= 66 3f 06 fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | Notify data 66 3f 06 fc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #448 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #448: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #448 to 4294967295 after switching state | Message ID: IKE #448 skipping update_recv as MD is fake | Message ID: sent #448 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.196:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | state #448 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498002de38 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f497c038d68 size 128 | #448 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.820658 | resume sending helper answer for #448 suppresed complete_v2_state_transition() and stole MD | #448 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c02dd48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.829852; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #440 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.836119; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00671 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | libevent_free: release ptr-libevent@0x7f49780242d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #327 spent 0.0867 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.83937; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | libevent_free: release ptr-libevent@0x7f497402de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #418 spent 0.0858 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.860724; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | libevent_free: release ptr-libevent@0x7f497402df08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #387 spent 0.31 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.869318; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f497402df08 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #433 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.880592; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008394 exceeds limit? YES "road-eastnet-nonat-197" #197: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-197" #197: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #449 at 0x55564da9dd08 | State DB: adding IKEv2 state #449 in UNDEFINED | pstats #449 ikev2.ike started | Message ID: init #449: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #449: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #449; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-197" #449: initiating v2 parent SA to replace #197 | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 449 for state #449 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab2de8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f4998033358 size 128 | #449 spent 0.0769 milliseconds in ikev2_parent_outI1() | RESET processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #197 ikev2.ike failed too-many-retransmits | pstats #197 ikev2.ike deleted too-many-retransmits | #197 spent 2.51 milliseconds in total | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-197" #197: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #197: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #197 "road-eastnet-nonat-197" #197: deleting IKE SA for connection 'road-eastnet-nonat-197' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-197' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-197 | State DB: deleting IKEv2 state #197 in PARENT_I1 | parent state #197: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 resuming | crypto helper 10 starting work-order 449 for state #449 | stop processing: state #197 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 449 | libevent_free: release ptr-libevent@0x7f4984038938 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | in statetime_stop() and could not find #197 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-197 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-197' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-197" | stop processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:349) | spent 0.09 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 449 time elapsed 0.000621 seconds | (#449) spent 0.596 milliseconds in crypto helper computing work-order 449: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 449 for state #449 to event queue | scheduling resume sending helper answer for #449 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 449 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #449 | **emit ISAKMP Message: | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | ikev2 g^x f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | ikev2 g^x 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | ikev2 g^x b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | ikev2 g^x 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | ikev2 g^x a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | ikev2 g^x 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | ikev2 g^x f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | ikev2 g^x 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | ikev2 g^x 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | ikev2 g^x 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | ikev2 g^x d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | ikev2 g^x 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | ikev2 g^x fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | ikev2 g^x 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | ikev2 g^x 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 5a aa f6 d0 | IKEv2 nonce 0d 18 df 46 03 83 97 35 df 56 0f 73 a6 3f 50 0f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a0 6f a7 47 8d 37 51 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c5 | natd_hash: port=500 | natd_hash: hash= 0e 21 89 04 33 04 96 ff 8c 0e e9 ab 22 aa ac f0 | natd_hash: hash= fb 91 45 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 21 89 04 33 04 96 ff 8c 0e e9 ab 22 aa ac f0 | Notify data fb 91 45 f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a0 6f a7 47 8d 37 51 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | natd_hash: hash= b4 d5 09 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | Notify data b4 d5 09 b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #449 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #449: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #449 to 4294967295 after switching state | Message ID: IKE #449 skipping update_recv as MD is fake | Message ID: sent #449 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.197:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | state #449 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998033358 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab2de8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f4980038d68 size 128 | #449 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.881748 | resume sending helper answer for #449 suppresed complete_v2_state_transition() and stole MD | #449 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a002dc88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.887975; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | libevent_free: release ptr-libevent@0x7f49a0038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #441 spent 0.0907 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.899204; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f49a0038d68 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | libevent_free: release ptr-libevent@0x7f497802dd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #419 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.918502; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005922 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f497802dd68 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | libevent_free: release ptr-libevent@0x7f499c0285d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #328 spent 0.215 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.921929; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f499c0285d8 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #388 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.93134; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999858 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #434 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10652.941685; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00843 exceeds limit? YES "road-eastnet-nonat-198" #198: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-198" #198: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #450 at 0x55564da9f418 | State DB: adding IKEv2 state #450 in UNDEFINED | pstats #450 ikev2.ike started | Message ID: init #450: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #450: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #450; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-198" #450: initiating v2 parent SA to replace #198 | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 450 for state #450 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | #450 spent 0.116 milliseconds in ikev2_parent_outI1() | RESET processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #198 ikev2.ike failed too-many-retransmits | pstats #198 ikev2.ike deleted too-many-retransmits | #198 spent 3.21 milliseconds in total | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-198" #198: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #198: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #198 "road-eastnet-nonat-198" #198: deleting IKE SA for connection 'road-eastnet-nonat-198' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-198' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-198 | State DB: deleting IKEv2 state #198 in PARENT_I1 | parent state #198: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 resuming | crypto helper 11 starting work-order 450 for state #450 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 450 | stop processing: state #198 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f496c017ba8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | in statetime_stop() and could not find #198 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-198 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-198' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-198" | stop processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:349) | spent 0.0766 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 450 time elapsed 0.000825 seconds | (#450) spent 0.831 milliseconds in crypto helper computing work-order 450: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 450 for state #450 to event queue | scheduling resume sending helper answer for #450 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 450 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #450 | **emit ISAKMP Message: | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | ikev2 g^x 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | ikev2 g^x e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | ikev2 g^x bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | ikev2 g^x 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | ikev2 g^x 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | ikev2 g^x f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | ikev2 g^x b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | ikev2 g^x 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | ikev2 g^x 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ikev2 g^x ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | ikev2 g^x f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | ikev2 g^x a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | ikev2 g^x a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | ikev2 g^x 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ikev2 g^x ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dc fd de b4 d6 73 d0 71 9e 0f f0 0d d0 45 2c 00 | IKEv2 nonce 56 2f 67 89 d3 63 b6 77 99 fe 80 9e 37 44 9d a9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 e9 5f f6 9b 5a b4 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c6 | natd_hash: port=500 | natd_hash: hash= 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d be c0 53 a5 | natd_hash: hash= 2b d7 c0 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d be c0 53 a5 | Notify data 2b d7 c0 25 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 89 e9 5f f6 9b 5a b4 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | natd_hash: hash= b0 e2 21 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | Notify data b0 e2 21 15 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #450 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #450: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #450 to 4294967295 after switching state | Message ID: IKE #450 skipping update_recv as MD is fake | Message ID: sent #450 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.198:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | state #450 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d8544c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 | #450 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10652.943549 | resume sending helper answer for #450 suppresed complete_v2_state_transition() and stole MD | #450 spent 0.751 milliseconds in resume sending helper answer | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994038dd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0947 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10652.948846; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | libevent_free: release ptr-libevent@0x7f4994038ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #442 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10652.959197; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f4994038ed8 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | libevent_free: release ptr-libevent@0x7f496c02dda8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #420 spent 0.229 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0734 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10652.980652; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f496c02dda8 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #329 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0759 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10652.984086; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #389 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10652.985456; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #435 spent 0.225 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.002932; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008542 exceeds limit? YES "road-eastnet-nonat-199" #199: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-199" #199: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #451 at 0x55564daa0b28 | State DB: adding IKEv2 state #451 in UNDEFINED | pstats #451 ikev2.ike started | Message ID: init #451: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #451: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #451; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-199" #451: initiating v2 parent SA to replace #199 | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 451 for state #451 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa388 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f499400ca08 size 128 | #451 spent 0.122 milliseconds in ikev2_parent_outI1() | RESET processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #199 ikev2.ike failed too-many-retransmits | pstats #199 ikev2.ike deleted too-many-retransmits | #199 spent 2.46 milliseconds in total | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-199" #199: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #199: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #199 "road-eastnet-nonat-199" #199: deleting IKE SA for connection 'road-eastnet-nonat-199' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-199' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 12 resuming | in connection_discard for connection road-eastnet-nonat-199 | State DB: deleting IKEv2 state #199 in PARENT_I1 | crypto helper 12 starting work-order 451 for state #451 | parent state #199: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 451 | stop processing: state #199 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da92f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | in statetime_stop() and could not find #199 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-199 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-199' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-199" | stop processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:349) | spent 0.0837 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 451 time elapsed 0.001178 seconds | (#451) spent 1.19 milliseconds in crypto helper computing work-order 451: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 451 for state #451 to event queue | scheduling resume sending helper answer for #451 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 451 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #451 | **emit ISAKMP Message: | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | ikev2 g^x e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | ikev2 g^x bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | ikev2 g^x 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | ikev2 g^x 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | ikev2 g^x 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | ikev2 g^x bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | ikev2 g^x a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | ikev2 g^x 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | ikev2 g^x 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | ikev2 g^x 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | ikev2 g^x 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | ikev2 g^x 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | ikev2 g^x d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | ikev2 g^x a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | ikev2 g^x c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 14 76 db 55 | IKEv2 nonce a5 81 94 78 b6 a5 05 23 4b 4e ff 3f f3 bf 72 83 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d6 30 89 d0 c6 fe 2e 25 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c7 | natd_hash: port=500 | natd_hash: hash= 22 90 01 82 6b b3 25 12 42 35 ec 12 4d 07 71 bb | natd_hash: hash= 2c 80 fa be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 22 90 01 82 6b b3 25 12 42 35 ec 12 4d 07 71 bb | Notify data 2c 80 fa be | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d6 30 89 d0 c6 fe 2e 25 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | natd_hash: hash= b3 78 cb 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | Notify data b3 78 cb 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #451 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #451: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #451 to 4294967295 after switching state | Message ID: IKE #451 skipping update_recv as MD is fake | Message ID: sent #451 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.199:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | state #451 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499400ca08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaa388 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f4978038d98 size 128 | #451 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.005057 | resume sending helper answer for #451 suppresed complete_v2_state_transition() and stole MD | #451 spent 0.57 milliseconds in resume sending helper answer | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499801d3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.006309; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | libevent_free: release ptr-libevent@0x7f4998039588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #443 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0719 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.034694; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f4998039588 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #421 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.039129; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #330 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.04356; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #436 spent 0.229 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.061031; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007416 exceeds limit? YES "road-eastnet-nonat-200" #200: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-200" #200: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #452 at 0x55564daa22a8 | State DB: adding IKEv2 state #452 in UNDEFINED | pstats #452 ikev2.ike started | Message ID: init #452: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #452: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #452; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-200" #452: initiating v2 parent SA to replace #200 | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 452 for state #452 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f499002dc88 size 128 | #452 spent 0.124 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | RESET processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 452 for state #452 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #200 ikev2.ike failed too-many-retransmits | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 452 | pstats #200 ikev2.ike deleted too-many-retransmits | #200 spent 2.35 milliseconds in total | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-200" #200: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #200: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #200 "road-eastnet-nonat-200" #200: deleting IKE SA for connection 'road-eastnet-nonat-200' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-200' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-200 | State DB: deleting IKEv2 state #200 in PARENT_I1 | parent state #200: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #200 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 452 time elapsed 0.001009 seconds | libevent_free: release ptr-libevent@0x7f49ac022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | (#452) spent 1.01 milliseconds in crypto helper computing work-order 452: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 452 for state #452 to event queue | scheduling resume sending helper answer for #452 | in statetime_stop() and could not find #200 | libevent_malloc: new ptr-libevent@0x7f498c038bb8 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-200 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-200' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-200" | stop processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:349) | spent 0.0828 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 452 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #452 | **emit ISAKMP Message: | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | ikev2 g^x b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | ikev2 g^x 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | ikev2 g^x 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | ikev2 g^x 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | ikev2 g^x 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | ikev2 g^x c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | ikev2 g^x 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | ikev2 g^x b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | ikev2 g^x 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | ikev2 g^x d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ikev2 g^x ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | ikev2 g^x b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | ikev2 g^x 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | ikev2 g^x 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | ikev2 g^x 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 44 ed 19 a7 | IKEv2 nonce 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 87 20 49 a7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4b ce e5 9d a4 44 94 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c8 | natd_hash: port=500 | natd_hash: hash= 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 77 c1 c2 40 | natd_hash: hash= 5b 1c 06 ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 77 c1 c2 40 | Notify data 5b 1c 06 ff | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4b ce e5 9d a4 44 94 5b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | natd_hash: hash= 03 d8 15 e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | Notify data 03 d8 15 e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #452 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #452: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #452 to 4294967295 after switching state | Message ID: IKE #452 skipping update_recv as MD is fake | Message ID: sent #452 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.200:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | state #452 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499002dc88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f496c038ed8 size 128 | #452 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.062972 | resume sending helper answer for #452 suppresed complete_v2_state_transition() and stole MD | #452 spent 0.569 milliseconds in resume sending helper answer | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c038bb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0724 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.068228; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f498c038bb8 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #390 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0722 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.079611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | libevent_free: release ptr-libevent@0x7f498c038cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #444 spent 0.262 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.099172; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f498c038cb8 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #331 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0747 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.101615; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #437 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0719 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.111993; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | libevent_free: release ptr-libevent@0x7f49800336a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #422 spent 0.239 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.107 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.120498; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007377 exceeds limit? YES "road-eastnet-nonat-201" #201: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-201" #201: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #453 at 0x55564daa3a28 | State DB: adding IKEv2 state #453 in UNDEFINED | pstats #453 ikev2.ike started | Message ID: init #453: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #453: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #453; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-201" #453: initiating v2 parent SA to replace #201 | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 453 for state #453 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ede48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f49800336a8 size 128 | #453 spent 0.117 milliseconds in ikev2_parent_outI1() | RESET processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #201 ikev2.ike failed too-many-retransmits | pstats #201 ikev2.ike deleted too-many-retransmits | #201 spent 2.14 milliseconds in total | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-201" #201: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #201: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #201 "road-eastnet-nonat-201" #201: deleting IKE SA for connection 'road-eastnet-nonat-201' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-201' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 14 resuming | crypto helper 14 starting work-order 453 for state #453 | in connection_discard for connection road-eastnet-nonat-201 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 453 | State DB: deleting IKEv2 state #201 in PARENT_I1 | parent state #201: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 453 time elapsed 0.001423 seconds | stop processing: state #201 from 192.1.2.23 (in delete_state() at state.c:1143) | (#453) spent 1.43 milliseconds in crypto helper computing work-order 453: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 453 for state #453 to event queue | libevent_free: release ptr-libevent@0x7f499c0333b8 | scheduling resume sending helper answer for #453 | libevent_malloc: new ptr-libevent@0x7f4990038f08 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | in statetime_stop() and could not find #201 | crypto helper 14 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-201 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-201' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-201" | stop processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:349) | spent 0.0871 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 453 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #453 | **emit ISAKMP Message: | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | ikev2 g^x eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | ikev2 g^x 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | ikev2 g^x 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | ikev2 g^x e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | ikev2 g^x 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | ikev2 g^x cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | ikev2 g^x d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | ikev2 g^x d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | ikev2 g^x 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | ikev2 g^x 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | ikev2 g^x 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | ikev2 g^x 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | ikev2 g^x 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | ikev2 g^x f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | ikev2 g^x 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 6f fd 42 cd | IKEv2 nonce e3 dc db b6 15 17 6d a8 1d c1 72 18 3e 8c 11 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ec 3d ec 0d e1 4b 70 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c9 | natd_hash: port=500 | natd_hash: hash= f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 33 44 bc 1b | natd_hash: hash= f0 04 e1 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 33 44 bc 1b | Notify data f0 04 e1 8e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ec 3d ec 0d e1 4b 70 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | natd_hash: hash= 13 7b 39 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | Notify data 13 7b 39 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #453 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #453: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #453 to 4294967295 after switching state | Message ID: IKE #453 skipping update_recv as MD is fake | Message ID: sent #453 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.201:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | state #453 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800336a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ede48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f49bc03b778 size 128 | #453 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.122963 | resume sending helper answer for #453 suppresed complete_v2_state_transition() and stole MD | #453 spent 0.559 milliseconds in resume sending helper answer | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4990038f08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.136231; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f4990038f08 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | libevent_free: release ptr-libevent@0x7f496c01d468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #391 spent 0.216 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0938 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.1407; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | libevent_free: release ptr-libevent@0x7f4990038cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #445 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.164152; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f4990038cb8 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | libevent_free: release ptr-libevent@0x7f4998028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #332 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0784 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.176559; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #438 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0809 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.179942; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | libevent_free: release ptr-libevent@0x7f4974033568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #423 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.180181; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007863 exceeds limit? YES "road-eastnet-nonat-202" #202: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-202" #202: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #454 at 0x55564daa51a8 | State DB: adding IKEv2 state #454 in UNDEFINED | pstats #454 ikev2.ike started | Message ID: init #454: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #454: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #454; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-202" #454: initiating v2 parent SA to replace #202 | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 454 for state #454 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f4974033568 size 128 | #454 spent 0.144 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | crypto helper 15 starting work-order 454 for state #454 | RESET processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 454 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #202 ikev2.ike failed too-many-retransmits | pstats #202 ikev2.ike deleted too-many-retransmits | #202 spent 1.97 milliseconds in total | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-202" #202: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #202: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #202 "road-eastnet-nonat-202" #202: deleting IKE SA for connection 'road-eastnet-nonat-202' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-202' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-202 | State DB: deleting IKEv2 state #202 in PARENT_I1 | parent state #202: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #202 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a4022a68 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 454 time elapsed 0.000784 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | in statetime_stop() and could not find #202 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#454) spent 0.779 milliseconds in crypto helper computing work-order 454: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 454 for state #454 to event queue | scheduling resume sending helper answer for #454 recvmsg: received truncated IKE packet (MSG_TRUNC) | libevent_malloc: new ptr-libevent@0x7f4984038c38 size 128 | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | crypto helper 15 waiting (nothing to do) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-202 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-202' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-202" | stop processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:349) | spent 0.0656 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 454 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #454 | **emit ISAKMP Message: | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | ikev2 g^x 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | ikev2 g^x c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | ikev2 g^x 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | ikev2 g^x 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | ikev2 g^x fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | ikev2 g^x 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | ikev2 g^x 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | ikev2 g^x 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | ikev2 g^x 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | ikev2 g^x 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | ikev2 g^x c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | ikev2 g^x d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | ikev2 g^x c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ikev2 g^x ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | ikev2 g^x 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca 82 ac 8e c9 | IKEv2 nonce 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 02 22 14 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 6f 21 72 d3 8c b5 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ca | natd_hash: port=500 | natd_hash: hash= 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b 1a b8 2b 0a | natd_hash: hash= d6 01 c0 a9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b 1a b8 2b 0a | Notify data d6 01 c0 a9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= dc 6f 21 72 d3 8c b5 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | natd_hash: hash= c1 5d 34 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | Notify data c1 5d 34 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #454 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #454: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #454 to 4294967295 after switching state | Message ID: IKE #454 skipping update_recv as MD is fake | Message ID: sent #454 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.202:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | state #454 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974033568 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f49b403b738 size 128 | #454 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.181782 | resume sending helper answer for #454 suppresed complete_v2_state_transition() and stole MD | #454 spent 0.432 milliseconds in resume sending helper answer | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984038c38 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.198007; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f4984038c38 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | libevent_free: release ptr-libevent@0x7f49bc01ff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #392 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.199294; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | libevent_free: release ptr-libevent@0x7f4984038b38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #446 spent 0.0896 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.242555; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f4984038b38 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | libevent_free: release ptr-libevent@0x7f4980022b58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | #424 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.250857; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f4980022b58 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | libevent_free: release ptr-libevent@0x7f4974022cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #333 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.25915; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f4974022cd8 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | libevent_free: release ptr-libevent@0x7f4988038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #447 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.26845; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007193 exceeds limit? YES "road-eastnet-nonat-203" #203: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-203" #203: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #455 at 0x55564daa68b8 | State DB: adding IKEv2 state #455 in UNDEFINED | pstats #455 ikev2.ike started | Message ID: init #455: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #455: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #455; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-203" #455: initiating v2 parent SA to replace #203 | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 455 for state #455 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f4988038d68 size 128 | #455 spent 0.0809 milliseconds in ikev2_parent_outI1() | RESET processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 455 for state #455 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 455 | pstats #203 ikev2.ike failed too-many-retransmits | pstats #203 ikev2.ike deleted too-many-retransmits | #203 spent 5.94 milliseconds in total | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-203" #203: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #203: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #203 "road-eastnet-nonat-203" #203: deleting IKE SA for connection 'road-eastnet-nonat-203' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-203' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-203 | State DB: deleting IKEv2 state #203 in PARENT_I1 | parent state #203: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #203 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 455 time elapsed 0.001064 seconds | libevent_free: release ptr-libevent@0x55564da9a3e8 | (#455) spent 1.07 milliseconds in crypto helper computing work-order 455: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 455 for state #455 to event queue | scheduling resume sending helper answer for #455 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | crypto helper 16 waiting (nothing to do) | in statetime_stop() and could not find #203 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-203 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-203' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-203" | stop processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:349) | spent 0.0887 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 455 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #455 | **emit ISAKMP Message: | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | ikev2 g^x 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | ikev2 g^x 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | ikev2 g^x 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | ikev2 g^x 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | ikev2 g^x 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | ikev2 g^x 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ikev2 g^x ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | ikev2 g^x f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | ikev2 g^x 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | ikev2 g^x 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | ikev2 g^x 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | ikev2 g^x c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | ikev2 g^x f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | ikev2 g^x 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | ikev2 g^x 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 78 7d ae d5 | IKEv2 nonce b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 ef d5 7f 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 63 1b 88 8f c5 c9 4f d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cb | natd_hash: port=500 | natd_hash: hash= c9 9f 44 76 c8 47 af 0d 45 7f ad ac ea ea f2 ae | natd_hash: hash= cf aa 92 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 9f 44 76 c8 47 af 0d 45 7f ad ac ea ea f2 ae | Notify data cf aa 92 de | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 63 1b 88 8f c5 c9 4f d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | natd_hash: hash= b1 9d 32 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | Notify data b1 9d 32 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #455 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #455: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #455 to 4294967295 after switching state | Message ID: IKE #455 skipping update_recv as MD is fake | Message ID: sent #455 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.203:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | state #455 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4988038d68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da24f18 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f49b803c198 size 128 | #455 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.270295 | resume sending helper answer for #455 suppresed complete_v2_state_transition() and stole MD | #455 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498802dc48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0739 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.270436; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | libevent_free: release ptr-libevent@0x7f49a8038f48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | #439 spent 0.0757 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.270527; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f49a8038f48 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | libevent_free: release ptr-libevent@0x7f49b0033438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #393 spent 0.0671 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.303819; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f49b0033438 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | libevent_free: release ptr-libevent@0x7f4974022dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #425 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.309175; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f4974022dd8 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | libevent_free: release ptr-libevent@0x7f4984028c98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #334 spent 0.095 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.321457; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f4984028c98 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | libevent_free: release ptr-libevent@0x7f497c038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #448 spent 0.0998 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.32872; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00735 exceeds limit? YES "road-eastnet-nonat-204" #204: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-204" #204: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #456 at 0x55564daa8038 | State DB: adding IKEv2 state #456 in UNDEFINED | pstats #456 ikev2.ike started | Message ID: init #456: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #456: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #456; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-204" #456: initiating v2 parent SA to replace #204 | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 456 for state #456 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f497c038d68 size 128 | #456 spent 0.0972 milliseconds in ikev2_parent_outI1() | RESET processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 456 for state #456 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 456 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #204 ikev2.ike failed too-many-retransmits | pstats #204 ikev2.ike deleted too-many-retransmits | #204 spent 2.91 milliseconds in total | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-204" #204: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #204: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #204 "road-eastnet-nonat-204" #204: deleting IKE SA for connection 'road-eastnet-nonat-204' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-204' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-204 | State DB: deleting IKEv2 state #204 in PARENT_I1 | parent state #204: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #204 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da9a308 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | in statetime_stop() and could not find #204 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-204 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 456 time elapsed 0.000953 seconds | start processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-204' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | (#456) spent 1.01 milliseconds in crypto helper computing work-order 456: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 456 for state #456 to event queue | scheduling resume sending helper answer for #456 | libevent_malloc: new ptr-libevent@0x7f497c038c68 size 128 | crypto helper 1 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-204" | stop processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:349) | spent 0.0681 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 456 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #456 | **emit ISAKMP Message: | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | ikev2 g^x c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | ikev2 g^x 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ikev2 g^x ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | ikev2 g^x f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | ikev2 g^x 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ikev2 g^x ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | ikev2 g^x 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | ikev2 g^x cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | ikev2 g^x 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | ikev2 g^x df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | ikev2 g^x 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | ikev2 g^x 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | ikev2 g^x 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | ikev2 g^x 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | ikev2 g^x 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 bd bf a3 0a | IKEv2 nonce 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e c9 f6 01 39 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 26 5d da 58 eb 15 ce d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cc | natd_hash: port=500 | natd_hash: hash= 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c 3e 69 76 09 | natd_hash: hash= 0f 66 76 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c 3e 69 76 09 | Notify data 0f 66 76 f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 26 5d da 58 eb 15 ce d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | natd_hash: hash= 47 fc 4c fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | Notify data 47 fc 4c fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #456 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #456: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #456 to 4294967295 after switching state | Message ID: IKE #456 skipping update_recv as MD is fake | Message ID: sent #456 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.204:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | state #456 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c038d68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ae178 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f49ac03e538 size 128 | #456 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.330482 | resume sending helper answer for #456 suppresed complete_v2_state_transition() and stole MD | #456 spent 0.502 milliseconds in resume sending helper answer | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c038c68 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.331677; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f497c038c68 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #440 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.335998; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #394 spent 0.0922 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.364269; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #426 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.374564; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #335 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.382807; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501059 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | libevent_free: release ptr-libevent@0x7f4980038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #449 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.388223; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007042 exceeds limit? YES "road-eastnet-nonat-205" #205: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-205" #205: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #457 at 0x55564daa97b8 | State DB: adding IKEv2 state #457 in UNDEFINED | pstats #457 ikev2.ike started | Message ID: init #457: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #457: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #457; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-205" #457: initiating v2 parent SA to replace #205 | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 457 for state #457 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab2de8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f4980038d68 size 128 | #457 spent 0.0784 milliseconds in ikev2_parent_outI1() | RESET processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #205 ikev2.ike failed too-many-retransmits | pstats #205 ikev2.ike deleted too-many-retransmits | #205 spent 2.59 milliseconds in total | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-205" #205: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #205: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #205 "road-eastnet-nonat-205" #205: deleting IKE SA for connection 'road-eastnet-nonat-205' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-205' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-205 | crypto helper 3 resuming | crypto helper 3 starting work-order 457 for state #457 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 457 | State DB: deleting IKEv2 state #205 in PARENT_I1 | parent state #205: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 457 time elapsed 0.000545 seconds | (#457) spent 0.549 milliseconds in crypto helper computing work-order 457: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 457 for state #457 to event queue | scheduling resume sending helper answer for #457 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #205 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b00282c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | in statetime_stop() and could not find #205 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-205 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-205' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-205" | stop processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:349) | spent 0.0599 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 457 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #457 | **emit ISAKMP Message: | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | ikev2 g^x e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | ikev2 g^x b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | ikev2 g^x 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | ikev2 g^x cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | ikev2 g^x 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | ikev2 g^x be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | ikev2 g^x 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | ikev2 g^x 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | ikev2 g^x 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | ikev2 g^x 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | ikev2 g^x 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | ikev2 g^x 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | ikev2 g^x b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | ikev2 g^x 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | ikev2 g^x c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 49 44 3e fd 20 4a 74 27 21 c8 52 92 68 bf 06 | IKEv2 nonce f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 3b 0e 36 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 32 d0 a8 65 8e 61 17 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cd | natd_hash: port=500 | natd_hash: hash= 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a dc 40 4c 55 | natd_hash: hash= f1 b0 45 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a dc 40 4c 55 | Notify data f1 b0 45 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 32 d0 a8 65 8e 61 17 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | natd_hash: hash= 47 6a ae f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | Notify data 47 6a ae f9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #457 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #457: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #457 to 4294967295 after switching state | Message ID: IKE #457 skipping update_recv as MD is fake | Message ID: sent #457 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.205:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | state #457 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4980038d68 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab2de8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f49b003e468 size 128 | #457 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.389361 | resume sending helper answer for #457 suppresed complete_v2_state_transition() and stole MD | #457 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980038e68 | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.389393; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #441 spent 0.0704 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.392659; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #395 spent 0.0856 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.421063; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004391 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #427 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.443471; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499922 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | libevent_free: release ptr-libevent@0x7f4974038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #450 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0895 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.4499; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | libevent_free: release ptr-libevent@0x7f4994038dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #442 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.450148; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009098 exceeds limit? YES "road-eastnet-nonat-206" #206: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-206" #206: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #458 at 0x55564daaaf38 | State DB: adding IKEv2 state #458 in UNDEFINED | pstats #458 ikev2.ike started | Message ID: init #458: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #458: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #458; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-206" #458: initiating v2 parent SA to replace #206 | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 458 for state #458 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da731b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 | #458 spent 0.16 milliseconds in ikev2_parent_outI1() | RESET processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #206 ikev2.ike failed too-many-retransmits | pstats #206 ikev2.ike deleted too-many-retransmits | #206 spent 2.65 milliseconds in total | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-206" #206: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #206: PARENT_I1(half-open IKE SA) => delete | crypto helper 17 resuming | crypto helper 17 starting work-order 458 for state #458 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 458 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #206 "road-eastnet-nonat-206" #206: deleting IKE SA for connection 'road-eastnet-nonat-206' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-206' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-206 | State DB: deleting IKEv2 state #206 in PARENT_I1 | parent state #206: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 458 time elapsed 0.001374 seconds | (#458) spent 1.39 milliseconds in crypto helper computing work-order 458: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 458 for state #458 to event queue | scheduling resume sending helper answer for #458 | stop processing: state #206 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da2daf8 | libevent_malloc: new ptr-libevent@0x7f4974038f28 size 128 | crypto helper 17 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | in statetime_stop() and could not find #206 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-206 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-206' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-206" | stop processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:349) | spent 0.108 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 458 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #458 | **emit ISAKMP Message: | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | ikev2 g^x 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | ikev2 g^x 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | ikev2 g^x e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | ikev2 g^x aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | ikev2 g^x 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | ikev2 g^x 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | ikev2 g^x dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | ikev2 g^x 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | ikev2 g^x 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | ikev2 g^x c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | ikev2 g^x 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | ikev2 g^x 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | ikev2 g^x 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | ikev2 g^x d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | ikev2 g^x 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 53 59 07 d2 | IKEv2 nonce b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b d1 c2 c4 70 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8d bb 2c 0c bb f2 e2 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ce | natd_hash: port=500 | natd_hash: hash= 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 42 4e 44 e2 | natd_hash: hash= 08 c3 43 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 42 4e 44 e2 | Notify data 08 c3 43 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8d bb 2c 0c bb f2 e2 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | natd_hash: hash= 0e 47 59 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | Notify data 0e 47 59 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #458 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #458: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #458 to 4294967295 after switching state | Message ID: IKE #458 skipping update_recv as MD is fake | Message ID: sent #458 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.206:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | state #458 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994038dd8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da731b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f49a403ee58 size 128 | #458 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.452981 | resume sending helper answer for #458 suppresed complete_v2_state_transition() and stole MD | #458 spent 0.808 milliseconds in resume sending helper answer | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974038f28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.107 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.453186; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f4974038f28 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | libevent_free: release ptr-libevent@0x7f498001d4e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #396 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.459711; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | libevent_free: release ptr-libevent@0x7f497c017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #336 spent 0.279 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.141 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.479644; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #428 spent 0.448 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.505629; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | libevent_free: release ptr-libevent@0x7f4978038d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #451 spent 0.448 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.507573; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001539 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f4978038d98 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #443 spent 0.505 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.508214; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007573 exceeds limit? YES "road-eastnet-nonat-207" #207: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-207" #207: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #459 at 0x55564daac648 | State DB: adding IKEv2 state #459 in UNDEFINED | pstats #459 ikev2.ike started | Message ID: init #459: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #459: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #459; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-207" #459: initiating v2 parent SA to replace #207 | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 459 for state #459 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da0abf8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 | #459 spent 0.321 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | RESET processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 starting work-order 459 for state #459 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 459 | pstats #207 ikev2.ike failed too-many-retransmits | pstats #207 ikev2.ike deleted too-many-retransmits | #207 spent 2.64 milliseconds in total | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-207" #207: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #207: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #207 "road-eastnet-nonat-207" #207: deleting IKE SA for connection 'road-eastnet-nonat-207' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-207' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-207 | State DB: deleting IKEv2 state #207 in PARENT_I1 | parent state #207: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #207 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 459 time elapsed 0.002713 seconds | libevent_free: release ptr-libevent@0x7f499800ce98 | (#459) spent 2.7 milliseconds in crypto helper computing work-order 459: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | crypto helper 18 sending results from work-order 459 for state #459 to event queue | in statetime_stop() and could not find #207 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #459 | libevent_malloc: new ptr-libevent@0x7f4978038e98 size 128 | crypto helper 18 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-207 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-207' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-207" | stop processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:349) | spent 0.188 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 459 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #459 | **emit ISAKMP Message: | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | ikev2 g^x 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | ikev2 g^x b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | ikev2 g^x 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ikev2 g^x ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | ikev2 g^x 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | ikev2 g^x d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | ikev2 g^x a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ikev2 g^x ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | ikev2 g^x 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | ikev2 g^x 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | ikev2 g^x a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | ikev2 g^x b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | ikev2 g^x 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | ikev2 g^x 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | ikev2 g^x d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 89 f3 c1 29 | IKEv2 nonce 89 a6 5a f0 24 0e f4 34 99 58 be 22 00 7d 95 95 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 95 79 bd 78 78 1d ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cf | natd_hash: port=500 | natd_hash: hash= 7d 6d 7b ae 40 74 68 bf 01 b8 66 af 0e 81 43 49 | natd_hash: hash= cf c8 62 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 6d 7b ae 40 74 68 bf 01 b8 66 af 0e 81 43 49 | Notify data cf c8 62 ee | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 95 79 bd 78 78 1d ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | natd_hash: hash= ba aa e2 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | Notify data ba aa e2 09 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #459 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #459: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #459 to 4294967295 after switching state | Message ID: IKE #459 skipping update_recv as MD is fake | Message ID: sent #459 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.207:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | state #459 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da0abf8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f49a803e6b8 size 128 | #459 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.513574 | resume sending helper answer for #459 suppresed complete_v2_state_transition() and stole MD | #459 spent 1.54 milliseconds in resume sending helper answer | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978038e98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.215 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.517109; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f4978038e98 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | libevent_free: release ptr-libevent@0x7f49800284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #397 spent 0.397 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.543139; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f49800284c8 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | libevent_free: release ptr-libevent@0x7f49b40257e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #429 spent 0.459 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.543665; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49b40257e8 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #337 spent 0.336 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.563714; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | libevent_free: release ptr-libevent@0x7f496c038ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #452 spent 0.455 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.253 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.569717; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007865 exceeds limit? YES "road-eastnet-nonat-208" #208: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-208" #208: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #460 at 0x55564daadd58 | State DB: adding IKEv2 state #460 in UNDEFINED | pstats #460 ikev2.ike started | Message ID: init #460: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #460: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #460; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-208" #460: initiating v2 parent SA to replace #208 | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 460 for state #460 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f496c038ed8 size 128 | #460 spent 0.412 milliseconds in ikev2_parent_outI1() | RESET processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 19 resuming | crypto helper 19 starting work-order 460 for state #460 | pstats #208 ikev2.ike failed too-many-retransmits | pstats #208 ikev2.ike deleted too-many-retransmits | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 460 | #208 spent 2.81 milliseconds in total | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-208" #208: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #208: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #208 "road-eastnet-nonat-208" #208: deleting IKE SA for connection 'road-eastnet-nonat-208' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-208' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-208 | State DB: deleting IKEv2 state #208 in PARENT_I1 | parent state #208: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #208 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dac16c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | in statetime_stop() and could not find #208 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 460 time elapsed 0.002663 seconds | processing global timer EVENT_REVIVE_CONNS | (#460) spent 2.71 milliseconds in crypto helper computing work-order 460: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-208 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 19 sending results from work-order 460 for state #460 to event queue | scheduling resume sending helper answer for #460 | libevent_malloc: new ptr-libevent@0x7f496c038fd8 size 128 | crypto helper 19 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-208' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-208" | stop processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:349) | spent 0.208 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 460 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #460 | **emit ISAKMP Message: | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | ikev2 g^x 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | ikev2 g^x fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | ikev2 g^x 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | ikev2 g^x 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | ikev2 g^x 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | ikev2 g^x d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | ikev2 g^x 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | ikev2 g^x d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | ikev2 g^x d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | ikev2 g^x 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | ikev2 g^x 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | ikev2 g^x 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | ikev2 g^x fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ikev2 g^x ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | ikev2 g^x e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d 0b ae 15 77 | IKEv2 nonce 2f 54 6d c8 ba ff 83 91 73 aa 73 3b f6 61 18 fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f5 9d c1 de e7 d9 2c c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d0 | natd_hash: port=500 | natd_hash: hash= f4 04 11 98 48 8c fa 95 72 f5 77 7e b5 d6 a7 71 | natd_hash: hash= f3 fb de 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 04 11 98 48 8c fa 95 72 f5 77 7e b5 d6 a7 71 | Notify data f3 fb de 97 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f5 9d c1 de e7 d9 2c c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | natd_hash: hash= 86 15 56 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | Notify data 86 15 56 16 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #460 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #460: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #460 to 4294967295 after switching state | Message ID: IKE #460 skipping update_recv as MD is fake | Message ID: sent #460 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.208:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | state #460 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c038ed8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ab3c8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f499c03e698 size 128 | #460 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.574987 | resume sending helper answer for #460 suppresed complete_v2_state_transition() and stole MD | #460 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c038fd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.576556; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f496c038fd8 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #398 spent 0.433 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.580464; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #444 spent 0.428 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.603434; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | libevent_free: release ptr-libevent@0x7f4974028548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #338 spent 0.655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.296 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.623695; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f4974028548 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | libevent_free: release ptr-libevent@0x7f49bc03b778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #453 spent 0.458 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.630662; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008186 exceeds limit? YES "road-eastnet-nonat-209" #209: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-209" #209: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #461 at 0x55564daaf468 | State DB: adding IKEv2 state #461 in UNDEFINED | pstats #461 ikev2.ike started | Message ID: init #461: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #461: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #461; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-209" #461: initiating v2 parent SA to replace #209 | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 461 for state #461 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ede48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f49bc03b778 size 128 | #461 spent 0.332 milliseconds in ikev2_parent_outI1() | RESET processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #209 ikev2.ike failed too-many-retransmits | pstats #209 ikev2.ike deleted too-many-retransmits | #209 spent 3.32 milliseconds in total | crypto helper 0 resuming | crypto helper 0 starting work-order 461 for state #461 | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 461 "road-eastnet-nonat-209" #209: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #209: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #209 "road-eastnet-nonat-209" #209: deleting IKE SA for connection 'road-eastnet-nonat-209' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-209' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-209 | State DB: deleting IKEv2 state #209 in PARENT_I1 | parent state #209: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 461 time elapsed 0.002597 seconds | (#461) spent 2.6 milliseconds in crypto helper computing work-order 461: ikev2_outI1 KE (pcr) | stop processing: state #209 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c0179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | in statetime_stop() and could not find #209 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 0 sending results from work-order 461 for state #461 to event queue | scheduling resume sending helper answer for #461 Initiating connection road-eastnet-nonat-209 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f49bc03b678 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-209' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-209" | stop processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:349) | spent 0.21 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.634258; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f49a003e5d8 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | libevent_free: release ptr-libevent@0x7f498402dcc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #430 spent 0.385 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.63482; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f498402dcc8 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #399 spent 0.366 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 461 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #461 | **emit ISAKMP Message: | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | ikev2 g^x 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | ikev2 g^x 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | ikev2 g^x 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | ikev2 g^x 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | ikev2 g^x 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | ikev2 g^x da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | ikev2 g^x 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | ikev2 g^x eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | ikev2 g^x 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | ikev2 g^x 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | ikev2 g^x 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | ikev2 g^x 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | ikev2 g^x 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | ikev2 g^x aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | ikev2 g^x 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 45 49 4c 9f ca 37 9a 2c 95 23 12 df 0c 09 6b 96 | IKEv2 nonce cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 84 a2 b6 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 48 01 01 90 15 dc cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 29 14 fa ef a7 bb 09 80 c4 8a 40 1a 8e e3 7d 16 | natd_hash: hash= 39 f6 b7 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 14 fa ef a7 bb 09 80 c4 8a 40 1a 8e e3 7d 16 | Notify data 39 f6 b7 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 80 48 01 01 90 15 dc cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | natd_hash: hash= 3e 41 ea 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | Notify data 3e 41 ea 50 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #461 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #461: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #461 to 4294967295 after switching state | Message ID: IKE #461 skipping update_recv as MD is fake | Message ID: sent #461 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | state #461 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc03b778 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ede48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 | #461 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.637142 | resume sending helper answer for #461 suppresed complete_v2_state_transition() and stole MD | #461 spent 1.52 milliseconds in resume sending helper answer | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc03b678 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.187 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.6417; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f49bc03b678 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | libevent_free: release ptr-libevent@0x7f496c01d468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #445 spent 0.446 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.666667; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #339 spent 0.725 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.682875; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | libevent_free: release ptr-libevent@0x7f49b403b738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #454 spent 0.433 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.691708; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008651 exceeds limit? YES "road-eastnet-nonat-210" #210: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-210" #210: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #462 at 0x55564dab0be8 | State DB: adding IKEv2 state #462 in UNDEFINED | pstats #462 ikev2.ike started | Message ID: init #462: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #462: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #462; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-210" #462: initiating v2 parent SA to replace #210 | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 462 for state #462 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f49b403b738 size 128 | crypto helper 2 resuming | #462 spent 0.24 milliseconds in ikev2_parent_outI1() | crypto helper 2 starting work-order 462 for state #462 | RESET processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 462 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #210 ikev2.ike failed too-many-retransmits | pstats #210 ikev2.ike deleted too-many-retransmits | #210 spent 2.62 milliseconds in total | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-210" #210: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #210: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #210 "road-eastnet-nonat-210" #210: deleting IKE SA for connection 'road-eastnet-nonat-210' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-210' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-210 | State DB: deleting IKEv2 state #210 in PARENT_I1 | parent state #210: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #210 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 462 time elapsed 0.001692 seconds | libevent_free: release ptr-libevent@0x7f4994028448 | (#462) spent 1.7 milliseconds in crypto helper computing work-order 462: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | crypto helper 2 sending results from work-order 462 for state #462 to event queue | in statetime_stop() and could not find #210 | scheduling resume sending helper answer for #462 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49b403b638 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-210 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 2 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-210' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-210" | stop processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:349) | spent 0.117 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 462 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #462 | **emit ISAKMP Message: | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | ikev2 g^x cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | ikev2 g^x e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | ikev2 g^x 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | ikev2 g^x 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | ikev2 g^x 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | ikev2 g^x 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | ikev2 g^x d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | ikev2 g^x 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | ikev2 g^x 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | ikev2 g^x 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | ikev2 g^x 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | ikev2 g^x a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | ikev2 g^x e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | ikev2 g^x af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | ikev2 g^x c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 10 71 67 04 a0 28 14 a9 05 1f 3b 17 11 3a fd b3 | IKEv2 nonce 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 66 47 c6 87 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= eb c0 11 ab 1d f5 b8 e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d2 | natd_hash: port=500 | natd_hash: hash= ee 0f 51 53 10 ca 88 5f 6f ec c7 85 95 39 e7 67 | natd_hash: hash= 56 ca 30 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee 0f 51 53 10 ca 88 5f 6f ec c7 85 95 39 e7 67 | Notify data 56 ca 30 95 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= eb c0 11 ab 1d f5 b8 e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | natd_hash: hash= 04 93 f2 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | Notify data 04 93 f2 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #462 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #462: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #462 to 4294967295 after switching state | Message ID: IKE #462 skipping update_recv as MD is fake | Message ID: sent #462 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.210:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | state #462 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b403b738 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9db018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f499403e748 size 128 | #462 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.694764 | resume sending helper answer for #462 suppresed complete_v2_state_transition() and stole MD | #462 spent 0.765 milliseconds in resume sending helper answer | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b403b638 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0993 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.700039; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f49b403b638 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | libevent_free: release ptr-libevent@0x7f49bc01ff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #446 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0798 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.706431; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004711 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #400 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.722743; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #431 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.731027; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00611 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | libevent_free: release ptr-libevent@0x7f496c028738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #340 spent 0.0905 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.749273; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007631 exceeds limit? YES "road-eastnet-nonat-211" #211: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-211" #211: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #463 at 0x55564dab22f8 | State DB: adding IKEv2 state #463 in UNDEFINED | pstats #463 ikev2.ike started | Message ID: init #463: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #463: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #463; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-211" #463: initiating v2 parent SA to replace #211 | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 463 for state #463 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da82fe8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f496c028738 size 128 | #463 spent 0.0842 milliseconds in ikev2_parent_outI1() | RESET processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #211 ikev2.ike failed too-many-retransmits | pstats #211 ikev2.ike deleted too-many-retransmits | crypto helper 4 resuming | crypto helper 4 starting work-order 463 for state #463 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 463 | #211 spent 2.49 milliseconds in total | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-211" #211: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #211: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #211 "road-eastnet-nonat-211" #211: deleting IKE SA for connection 'road-eastnet-nonat-211' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-211' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-211 | State DB: deleting IKEv2 state #211 in PARENT_I1 | parent state #211: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 463 time elapsed 0.000563 seconds | stop processing: state #211 from 192.1.2.23 (in delete_state() at state.c:1143) | (#463) spent 0.561 milliseconds in crypto helper computing work-order 463: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 463 for state #463 to event queue | scheduling resume sending helper answer for #463 | libevent_malloc: new ptr-libevent@0x7f49b803c298 size 128 | libevent_free: release ptr-libevent@0x7f49a8022bf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | in statetime_stop() and could not find #211 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 4 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-211 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-211' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-211" | stop processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:349) | spent 0.0741 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 463 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #463 | **emit ISAKMP Message: | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | ikev2 g^x d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | ikev2 g^x 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | ikev2 g^x 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | ikev2 g^x e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | ikev2 g^x d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | ikev2 g^x 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | ikev2 g^x 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | ikev2 g^x cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | ikev2 g^x 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | ikev2 g^x 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | ikev2 g^x 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | ikev2 g^x aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | ikev2 g^x eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | ikev2 g^x 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | ikev2 g^x 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 87 8d 28 3b | IKEv2 nonce b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 cf 5a db f1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 8e 7f 4e b9 e0 b3 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d3 | natd_hash: port=500 | natd_hash: hash= d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b b0 8e 64 5c | natd_hash: hash= 81 71 e9 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b b0 8e 64 5c | Notify data 81 71 e9 48 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e3 8e 7f 4e b9 e0 b3 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | natd_hash: hash= 04 a3 af 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | Notify data 04 a3 af 63 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #463 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #463: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #463 to 4294967295 after switching state | Message ID: IKE #463 skipping update_recv as MD is fake | Message ID: sent #463 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.211:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | state #463 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f496c028738 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da82fe8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f499803e4b8 size 128 | #463 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.750445 | resume sending helper answer for #463 suppresed complete_v2_state_transition() and stole MD | #463 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b803c298 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.760636; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f49b803c298 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | libevent_free: release ptr-libevent@0x7f4974022cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #447 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.770939; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f4974022cd8 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | libevent_free: release ptr-libevent@0x7f49b803c198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #455 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.776253; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f49b803c198 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #401 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.808551; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #432 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0932 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.821924; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | libevent_free: release ptr-libevent@0x7f4990028328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #341 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.822073; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | libevent_free: release ptr-libevent@0x7f4984028c98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #448 spent 0.0888 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0524 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.831502; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50102 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f4984028c98 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | libevent_free: release ptr-libevent@0x7f49ac03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #456 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.831599; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f49ac03e538 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | libevent_free: release ptr-libevent@0x7f49780239c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #402 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.831681; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008203 exceeds limit? YES "road-eastnet-nonat-212" #212: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-212" #212: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #464 at 0x55564dab3a08 | State DB: adding IKEv2 state #464 in UNDEFINED | pstats #464 ikev2.ike started | Message ID: init #464: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #464: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #464; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-212" #464: initiating v2 parent SA to replace #212 | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 464 for state #464 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ff3b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f49780239c8 size 128 | #464 spent 0.0747 milliseconds in ikev2_parent_outI1() | RESET processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #212 ikev2.ike failed too-many-retransmits | pstats #212 ikev2.ike deleted too-many-retransmits | #212 spent 4 milliseconds in total | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-212" #212: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #212: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #212 "road-eastnet-nonat-212" #212: deleting IKE SA for connection 'road-eastnet-nonat-212' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 5 resuming | crypto helper 5 starting work-order 464 for state #464 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 464 | add revival: connection 'road-eastnet-nonat-212' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-212 | State DB: deleting IKEv2 state #212 in PARENT_I1 | parent state #212: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 464 time elapsed 0.000525 seconds | (#464) spent 0.529 milliseconds in crypto helper computing work-order 464: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 464 for state #464 to event queue | scheduling resume sending helper answer for #464 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #212 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499c022a68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | in statetime_stop() and could not find #212 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-212 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-212' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-212" | stop processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:349) | spent 0.0573 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 464 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #464 | **emit ISAKMP Message: | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | ikev2 g^x 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | ikev2 g^x a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ikev2 g^x ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | ikev2 g^x 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | ikev2 g^x f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | ikev2 g^x 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | ikev2 g^x bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | ikev2 g^x 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | ikev2 g^x e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | ikev2 g^x f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | ikev2 g^x 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | ikev2 g^x 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | ikev2 g^x 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | ikev2 g^x b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | ikev2 g^x b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 00 0c 76 35 | IKEv2 nonce 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 5b 1d 24 57 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 18 af 1b c7 b3 d2 ea 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d4 | natd_hash: port=500 | natd_hash: hash= e6 67 3a 0a 79 9a 19 29 be 54 17 fa fd c3 0b 8e | natd_hash: hash= 98 f3 d9 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 67 3a 0a 79 9a 19 29 be 54 17 fa fd c3 0b 8e | Notify data 98 f3 d9 84 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 18 af 1b c7 b3 d2 ea 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | natd_hash: hash= 64 7c 4f 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | Notify data 64 7c 4f 5c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #464 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #464: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #464 to 4294967295 after switching state | Message ID: IKE #464 skipping update_recv as MD is fake | Message ID: sent #464 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.212:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | state #464 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49780239c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ff3b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f498c03e528 size 128 | #464 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.832888 | resume sending helper answer for #464 suppresed complete_v2_state_transition() and stole MD | #464 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.870151; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | libevent_free: release ptr-libevent@0x7f497402df08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #433 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.883504; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f497402df08 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #449 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0937 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.89093; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | libevent_free: release ptr-libevent@0x7f49b003e468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #457 spent 0.229 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.894541; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f49b003e468 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | libevent_free: release ptr-libevent@0x7f499802dcf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #403 spent 0.266 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.899117; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f499802dcf8 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | libevent_free: release ptr-libevent@0x7f49b802b8f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #342 spent 0.33 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.164 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10653.924919; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005805 exceeds limit? YES "road-eastnet-nonat-213" #213: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-213" #213: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #465 at 0x55564dab5118 | State DB: adding IKEv2 state #465 in UNDEFINED | pstats #465 ikev2.ike started | Message ID: init #465: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #465: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #465; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-213" #465: initiating v2 parent SA to replace #213 | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 465 for state #465 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f49b802b8f8 size 128 | #465 spent 0.271 milliseconds in ikev2_parent_outI1() | RESET processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #213 ikev2.ike failed too-many-retransmits | pstats #213 ikev2.ike deleted too-many-retransmits | #213 spent 8.41 milliseconds in total | crypto helper 6 resuming | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-213" #213: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | crypto helper 6 starting work-order 465 for state #465 | parent state #213: PARENT_I1(half-open IKE SA) => delete | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 465 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #213 "road-eastnet-nonat-213" #213: deleting IKE SA for connection 'road-eastnet-nonat-213' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-213' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-213 | State DB: deleting IKEv2 state #213 in PARENT_I1 | parent state #213: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 465 time elapsed 0.002584 seconds | (#465) spent 2.58 milliseconds in crypto helper computing work-order 465: ikev2_outI1 KE (pcr) | stop processing: state #213 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da661a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | in statetime_stop() and could not find #213 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 sending results from work-order 465 for state #465 to event queue | scheduling resume sending helper answer for #465 | libevent_malloc: new ptr-libevent@0x7f49b003e368 size 128 | crypto helper 6 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-213 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-213' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-213" | stop processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:349) | spent 0.175 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 465 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #465 | **emit ISAKMP Message: | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | ikev2 g^x 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | ikev2 g^x 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | ikev2 g^x a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | ikev2 g^x 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | ikev2 g^x c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | ikev2 g^x 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | ikev2 g^x 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | ikev2 g^x c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | ikev2 g^x a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | ikev2 g^x 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | ikev2 g^x 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | ikev2 g^x 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | ikev2 g^x 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | ikev2 g^x 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | ikev2 g^x 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 1a d2 0d f1 | IKEv2 nonce c7 69 24 12 74 11 37 0f 73 dd 2e 25 9f 42 89 68 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 33 9a 33 7c d0 96 23 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d5 | natd_hash: port=500 | natd_hash: hash= 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 e7 ae 0e a2 | natd_hash: hash= de 4f d0 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 e7 ae 0e a2 | Notify data de 4f d0 c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 33 9a 33 7c d0 96 23 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | natd_hash: hash= 8a ba 41 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | Notify data 8a ba 41 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #465 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #465: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #465 to 4294967295 after switching state | Message ID: IKE #465 skipping update_recv as MD is fake | Message ID: sent #465 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.213:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | state #465 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b802b8f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f499003e518 size 128 | #465 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10653.93006 | resume sending helper answer for #465 suppresed complete_v2_state_transition() and stole MD | #465 spent 1.51 milliseconds in resume sending helper answer | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b003e368 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.932618; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f49b003e368 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #434 spent 0.412 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10653.9445; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #450 spent 0.419 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10653.953405; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | libevent_free: release ptr-libevent@0x7f49a403ee58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #458 spent 0.41 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10653.958405; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f49a403ee58 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #404 spent 0.454 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.216 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10653.986412; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #435 spent 0.464 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10653.986978; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #343 spent 0.369 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.283 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.26 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.007238; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #451 spent 0.412 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.223 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.012185; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011365 exceeds limit? YES "road-eastnet-nonat-214" #214: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-214" #214: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #466 at 0x55564dab6828 | State DB: adding IKEv2 state #466 in UNDEFINED | pstats #466 ikev2.ike started | Message ID: init #466: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #466: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #466; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-214" #466: initiating v2 parent SA to replace #214 | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 466 for state #466 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dad4478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 | #466 spent 0.265 milliseconds in ikev2_parent_outI1() | RESET processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #214 ikev2.ike failed too-many-retransmits | pstats #214 ikev2.ike deleted too-many-retransmits | #214 spent 4.69 milliseconds in total | crypto helper 7 resuming | crypto helper 7 starting work-order 466 for state #466 | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 466 "road-eastnet-nonat-214" #214: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #214: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #214 "road-eastnet-nonat-214" #214: deleting IKE SA for connection 'road-eastnet-nonat-214' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-214' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-214 | State DB: deleting IKEv2 state #214 in PARENT_I1 | parent state #214: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 466 time elapsed 0.002567 seconds | (#466) spent 2.56 milliseconds in crypto helper computing work-order 466: ikev2_outI1 KE (pcr) | stop processing: state #214 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b0033238 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | in statetime_stop() and could not find #214 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 7 sending results from work-order 466 for state #466 to event queue | scheduling resume sending helper answer for #466 Initiating connection road-eastnet-nonat-214 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f49a403f768 size 128 | crypto helper 7 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-214' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-214" | stop processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:349) | spent 0.217 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.015627; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f498403e3a8 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | libevent_free: release ptr-libevent@0x7f49a803e6b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #459 spent 0.377 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 466 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #466 | **emit ISAKMP Message: | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | ikev2 g^x 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | ikev2 g^x a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | ikev2 g^x 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | ikev2 g^x d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | ikev2 g^x d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | ikev2 g^x c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | ikev2 g^x 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | ikev2 g^x e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | ikev2 g^x 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | ikev2 g^x e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | ikev2 g^x bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | ikev2 g^x 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | ikev2 g^x 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | ikev2 g^x 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | ikev2 g^x 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 0a fd 4f 4d c5 ab bd a3 50 55 52 c1 47 ce 5e | IKEv2 nonce c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 c3 fb 83 7f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 26 0e c3 ea 1f e1 b5 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d6 | natd_hash: port=500 | natd_hash: hash= 85 66 7c c9 ae 88 04 09 4c 88 1c 79 45 94 b2 ca | natd_hash: hash= f5 8e f9 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 66 7c c9 ae 88 04 09 4c 88 1c 79 45 94 b2 ca | Notify data f5 8e f9 62 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 26 0e c3 ea 1f e1 b5 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | natd_hash: hash= 07 33 a7 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | Notify data 07 33 a7 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #466 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #466: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #466 to 4294967295 after switching state | Message ID: IKE #466 skipping update_recv as MD is fake | Message ID: sent #466 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.214:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | state #466 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dad4478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f49a803e6b8 size 128 | #466 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.017748 | resume sending helper answer for #466 suppresed complete_v2_state_transition() and stole MD | #466 spent 1.47 milliseconds in resume sending helper answer | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a403f768 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.018152; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f49a403f768 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | libevent_free: release ptr-libevent@0x7f4984022d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #405 spent 0.319 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.184 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.044932; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #436 spent 0.425 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.065058; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #452 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.065558; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | libevent_free: release ptr-libevent@0x7f49b001d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #344 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.181 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.069592; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009753 exceeds limit? YES "road-eastnet-nonat-215" #215: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-215" #215: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #467 at 0x55564dab7fa8 | State DB: adding IKEv2 state #467 in UNDEFINED | pstats #467 ikev2.ike started | Message ID: init #467: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #467: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #467; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-215" #467: initiating v2 parent SA to replace #215 | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 467 for state #467 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f49b001d568 size 128 | #467 spent 0.279 milliseconds in ikev2_parent_outI1() | RESET processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #215 ikev2.ike failed too-many-retransmits | pstats #215 ikev2.ike deleted too-many-retransmits | #215 spent 2.44 milliseconds in total | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 8 resuming | crypto helper 8 starting work-order 467 for state #467 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 467 "road-eastnet-nonat-215" #215: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #215: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #215 "road-eastnet-nonat-215" #215: deleting IKE SA for connection 'road-eastnet-nonat-215' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-215' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-215 | State DB: deleting IKEv2 state #215 in PARENT_I1 | parent state #215: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 467 time elapsed 0.002556 seconds | (#467) spent 2.56 milliseconds in crypto helper computing work-order 467: ikev2_outI1 KE (pcr) | stop processing: state #215 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 8 sending results from work-order 467 for state #467 to event queue | libevent_free: release ptr-libevent@0x55564daad218 | scheduling resume sending helper answer for #467 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | libevent_malloc: new ptr-libevent@0x7f49a803e5b8 size 128 | in statetime_stop() and could not find #215 | crypto helper 8 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-215 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-215' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-215" | stop processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:349) | spent 0.169 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 467 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #467 | **emit ISAKMP Message: | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | ikev2 g^x 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | ikev2 g^x 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | ikev2 g^x 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | ikev2 g^x 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | ikev2 g^x 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | ikev2 g^x db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | ikev2 g^x eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | ikev2 g^x eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | ikev2 g^x 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | ikev2 g^x 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | ikev2 g^x 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | ikev2 g^x 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | ikev2 g^x c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | ikev2 g^x 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | ikev2 g^x 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 93 ef af 46 7b d9 a2 e4 a7 5c ad 17 56 44 b1 | IKEv2 nonce a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 42 ab ef 0b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a5 b3 01 7a 93 4b 01 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d7 | natd_hash: port=500 | natd_hash: hash= 58 44 80 52 87 dc 97 e7 86 8d 4d a4 c0 9d 78 2b | natd_hash: hash= fc 27 27 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 44 80 52 87 dc 97 e7 86 8d 4d a4 c0 9d 78 2b | Notify data fc 27 27 bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a5 b3 01 7a 93 4b 01 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | natd_hash: hash= ea 93 38 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | Notify data ea 93 38 3f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #467 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #467: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #467 to 4294967295 after switching state | Message ID: IKE #467 skipping update_recv as MD is fake | Message ID: sent #467 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.215:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | state #467 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b001d568 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00ac8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f498803e5d8 size 128 | #467 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.074568 | resume sending helper answer for #467 suppresed complete_v2_state_transition() and stole MD | #467 spent 1.49 milliseconds in resume sending helper answer | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a803e5b8 | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.074725; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f49a803e5b8 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | libevent_free: release ptr-libevent@0x7f4980018dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #406 spent 0.358 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.251 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.23 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.075749; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | libevent_free: release ptr-libevent@0x7f499c03e698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #460 spent 0.566 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.328 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.102986; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003277 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f499c03e698 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #437 spent 0.495 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.124992; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | libevent_free: release ptr-libevent@0x7f4974028548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #453 spent 0.729 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.132389; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008831 exceeds limit? YES "road-eastnet-nonat-216" #216: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-216" #216: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #468 at 0x55564dab9728 | State DB: adding IKEv2 state #468 in UNDEFINED | pstats #468 ikev2.ike started | Message ID: init #468: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #468: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #468; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-216" #468: initiating v2 parent SA to replace #216 | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 468 for state #468 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53408 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f4974028548 size 128 | #468 spent 0.465 milliseconds in ikev2_parent_outI1() | RESET processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #216 ikev2.ike failed too-many-retransmits | pstats #216 ikev2.ike deleted too-many-retransmits | crypto helper 9 resuming | crypto helper 9 starting work-order 468 for state #468 | #216 spent 2.5 milliseconds in total | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 468 | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-216" #216: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #216: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #216 "road-eastnet-nonat-216" #216: deleting IKE SA for connection 'road-eastnet-nonat-216' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-216' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-216 | State DB: deleting IKEv2 state #216 in PARENT_I1 | parent state #216: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #216 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | in statetime_stop() and could not find #216 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 468 time elapsed 0.002551 seconds | processing global timer EVENT_REVIVE_CONNS | (#468) spent 2.61 milliseconds in crypto helper computing work-order 468: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 468 for state #468 to event queue Initiating connection road-eastnet-nonat-216 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #468 | libevent_malloc: new ptr-libevent@0x7f499c03e798 size 128 | crypto helper 9 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-216' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-216" | stop processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:349) | spent 0.198 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 468 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #468 | **emit ISAKMP Message: | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | ikev2 g^x 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | ikev2 g^x d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | ikev2 g^x 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | ikev2 g^x 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | ikev2 g^x 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | ikev2 g^x 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | ikev2 g^x 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | ikev2 g^x c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | ikev2 g^x e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | ikev2 g^x 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | ikev2 g^x bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | ikev2 g^x 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | ikev2 g^x 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | ikev2 g^x 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | ikev2 g^x 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f 7c 14 15 84 | IKEv2 nonce a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 71 ee 35 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a1 c8 e0 f4 15 61 84 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d8 | natd_hash: port=500 | natd_hash: hash= 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb 8e ec 4d f1 | natd_hash: hash= 04 45 0e d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb 8e ec 4d f1 | Notify data 04 45 0e d0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a1 c8 e0 f4 15 61 84 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | natd_hash: hash= 0a e2 9e 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | Notify data 0a e2 9e 7d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #468 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #468: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #468 to 4294967295 after switching state | Message ID: IKE #468 skipping update_recv as MD is fake | Message ID: sent #468 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.216:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | state #468 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974028548 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53408 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f497c03e5d8 size 128 | #468 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.137934 | resume sending helper answer for #468 suppresed complete_v2_state_transition() and stole MD | #468 spent 1.82 milliseconds in resume sending helper answer | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c03e798 | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.138127; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f499c03e798 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #461 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.22 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.141138; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | libevent_free: release ptr-libevent@0x7f4974033668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #407 spent 0.317 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.164 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.156736; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f4974033668 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | libevent_free: release ptr-libevent@0x7f49a802df28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #345 spent 0.203 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0948 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.177274; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f49a802df28 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | libevent_free: release ptr-libevent@0x7f4998028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #438 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.183647; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #454 spent 0.0839 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.193063; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00769 exceeds limit? YES "road-eastnet-nonat-217" #217: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-217" #217: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #469 at 0x55564dabae38 | State DB: adding IKEv2 state #469 in UNDEFINED | pstats #469 ikev2.ike started | Message ID: init #469: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #469: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #469; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-217" #469: initiating v2 parent SA to replace #217 | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 469 for state #469 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f0c68 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f49800066b8 size 128 | #469 spent 0.0845 milliseconds in ikev2_parent_outI1() | RESET processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #217 ikev2.ike failed too-many-retransmits | pstats #217 ikev2.ike deleted too-many-retransmits | #217 spent 3.22 milliseconds in total | crypto helper 10 resuming | crypto helper 10 starting work-order 469 for state #469 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 469 | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-217" #217: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #217: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #217 "road-eastnet-nonat-217" #217: deleting IKE SA for connection 'road-eastnet-nonat-217' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-217' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-217 | State DB: deleting IKEv2 state #217 in PARENT_I1 | parent state #217: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 469 time elapsed 0.000551 seconds | stop processing: state #217 from 192.1.2.23 (in delete_state() at state.c:1143) | (#469) spent 0.557 milliseconds in crypto helper computing work-order 469: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 469 for state #469 to event queue | scheduling resume sending helper answer for #469 | libevent_free: release ptr-libevent@0x7f49a00179e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | in statetime_stop() and could not find #217 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49a003e4d8 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-217 which received a Delete/Notify but must remain up per local policy | crypto helper 10 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-217' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-217" | stop processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:349) | spent 0.0768 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 469 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #469 | **emit ISAKMP Message: | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | ikev2 g^x 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | ikev2 g^x 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | ikev2 g^x cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | ikev2 g^x 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | ikev2 g^x 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | ikev2 g^x 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | ikev2 g^x 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | ikev2 g^x 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | ikev2 g^x 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | ikev2 g^x aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | ikev2 g^x be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | ikev2 g^x e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | ikev2 g^x 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | ikev2 g^x 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | ikev2 g^x 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6a c3 91 14 92 14 91 8d 24 86 e7 0a 25 ed 14 61 | IKEv2 nonce 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 36 42 db 95 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 00 d4 e9 48 f9 6b 36 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d9 | natd_hash: port=500 | natd_hash: hash= 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f ef 04 01 5b | natd_hash: hash= b5 6a 80 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f ef 04 01 5b | Notify data b5 6a 80 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 00 d4 e9 48 f9 6b 36 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | natd_hash: hash= 5f 8c 37 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | Notify data 5f 8c 37 0b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #469 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #469: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #469 to 4294967295 after switching state | Message ID: IKE #469 skipping update_recv as MD is fake | Message ID: sent #469 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.217:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | state #469 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800066b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f0c68 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f498003e5c8 size 128 | #469 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.194247 | resume sending helper answer for #469 suppresed complete_v2_state_transition() and stole MD | #469 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a003e4d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.195522; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f49a003e4d8 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | libevent_free: release ptr-libevent@0x7f499403e748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #462 spent 0.0809 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.208866; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f499403e748 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | libevent_free: release ptr-libevent@0x7f497c022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #408 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.249468; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #346 spent 0.245 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.106 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.252306; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | libevent_free: release ptr-libevent@0x7f499803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #463 spent 0.288 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.12 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.256932; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00822 exceeds limit? YES "road-eastnet-nonat-218" #218: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-218" #218: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #470 at 0x55564dabc5b8 | State DB: adding IKEv2 state #470 in UNDEFINED | pstats #470 ikev2.ike started | Message ID: init #470: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #470: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #470; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-218" #470: initiating v2 parent SA to replace #218 | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 470 for state #470 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da82fe8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f499803e4b8 size 128 | #470 spent 0.311 milliseconds in ikev2_parent_outI1() | RESET processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #218 ikev2.ike failed too-many-retransmits | crypto helper 11 resuming | crypto helper 11 starting work-order 470 for state #470 | pstats #218 ikev2.ike deleted too-many-retransmits | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 470 | #218 spent 2.7 milliseconds in total | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-218" #218: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #218: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #218 "road-eastnet-nonat-218" #218: deleting IKE SA for connection 'road-eastnet-nonat-218' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-218' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-218 | State DB: deleting IKEv2 state #218 in PARENT_I1 | parent state #218: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 470 time elapsed 0.001962 seconds | stop processing: state #218 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dab17b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | in statetime_stop() and could not find #218 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#470) spent 1.94 milliseconds in crypto helper computing work-order 470: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-218 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 11 sending results from work-order 470 for state #470 to event queue | scheduling resume sending helper answer for #470 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 | crypto helper 11 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-218' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-218" | stop processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:349) | spent 0.179 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 470 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #470 | **emit ISAKMP Message: | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ikev2 g^x ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | ikev2 g^x d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ikev2 g^x ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | ikev2 g^x 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | ikev2 g^x 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | ikev2 g^x 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | ikev2 g^x 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | ikev2 g^x a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | ikev2 g^x aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | ikev2 g^x b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | ikev2 g^x e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | ikev2 g^x da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | ikev2 g^x 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | ikev2 g^x 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | ikev2 g^x 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 06 6e 9c 2a | IKEv2 nonce 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 61 56 8d 3c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 28 0d f6 78 7b 90 48 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 da | natd_hash: port=500 | natd_hash: hash= 46 54 d3 21 aa c2 da 7e 42 15 54 b5 90 79 8b f7 | natd_hash: hash= d4 b8 db 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 54 d3 21 aa c2 da 7e 42 15 54 b5 90 79 8b f7 | Notify data d4 b8 db 9c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 28 0d f6 78 7b 90 48 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | natd_hash: hash= a1 4b 6a 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | Notify data a1 4b 6a 99 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #470 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #470: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #470 to 4294967295 after switching state | Message ID: IKE #470 skipping update_recv as MD is fake | Message ID: sent #470 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.218:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | state #470 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499803e4b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da82fe8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f497403e5d8 size 128 | #470 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.26127 | resume sending helper answer for #470 suppresed complete_v2_state_transition() and stole MD | #470 spent 1.48 milliseconds in resume sending helper answer | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994038dd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.16 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.269856; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | libevent_free: release ptr-libevent@0x7f49a8038e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #409 spent 0.419 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.27172; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f49a8038e48 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | libevent_free: release ptr-libevent@0x7f498802dc48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #439 spent 0.425 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.272429; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | libevent_free: release ptr-libevent@0x7f4974022cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #455 spent 0.328 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.185 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.316233; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007913 exceeds limit? YES "road-eastnet-nonat-219" #219: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-219" #219: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #471 at 0x55564dabdcc8 | State DB: adding IKEv2 state #471 in UNDEFINED | pstats #471 ikev2.ike started | Message ID: init #471: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #471: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #471; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-219" #471: initiating v2 parent SA to replace #219 | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 471 for state #471 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da6bd78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f4974022cd8 size 128 | #471 spent 0.283 milliseconds in ikev2_parent_outI1() | RESET processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #219 ikev2.ike failed too-many-retransmits | pstats #219 ikev2.ike deleted too-many-retransmits | #219 spent 2.7 milliseconds in total | crypto helper 12 resuming | crypto helper 12 starting work-order 471 for state #471 | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 471 "road-eastnet-nonat-219" #219: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #219: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #219 "road-eastnet-nonat-219" #219: deleting IKE SA for connection 'road-eastnet-nonat-219' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-219' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-219 | State DB: deleting IKEv2 state #219 in PARENT_I1 | parent state #219: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #219 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 471 time elapsed 0.002747 seconds | (#471) spent 2.77 milliseconds in crypto helper computing work-order 471: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 471 for state #471 to event queue | scheduling resume sending helper answer for #471 | libevent_free: release ptr-libevent@0x55564da57968 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | crypto helper 12 waiting (nothing to do) | in statetime_stop() and could not find #219 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-219 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-219' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-219" | stop processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:349) | spent 0.184 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 471 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #471 | **emit ISAKMP Message: | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | ikev2 g^x 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | ikev2 g^x 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | ikev2 g^x 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | ikev2 g^x cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ikev2 g^x ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | ikev2 g^x e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | ikev2 g^x 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | ikev2 g^x 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | ikev2 g^x 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | ikev2 g^x 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | ikev2 g^x 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | ikev2 g^x c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | ikev2 g^x a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | ikev2 g^x 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | ikev2 g^x 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 fa 72 a9 1f | IKEv2 nonce 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 4d bc f0 c7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 9c 61 6f 0c 62 aa 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 db | natd_hash: port=500 | natd_hash: hash= 0f 34 43 49 15 52 ae c1 19 58 f4 8b 2d c1 6d 53 | natd_hash: hash= 4e 4a d1 b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f 34 43 49 15 52 ae c1 19 58 f4 8b 2d c1 6d 53 | Notify data 4e 4a d1 b8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 57 9c 61 6f 0c 62 aa 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | natd_hash: hash= 31 b0 d4 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | Notify data 31 b0 d4 58 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #471 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #471: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #471 to 4294967295 after switching state | Message ID: IKE #471 skipping update_recv as MD is fake | Message ID: sent #471 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.219:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | state #471 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4974022cd8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da6bd78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f497803e548 size 128 | #471 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.321512 | resume sending helper answer for #471 suppresed complete_v2_state_transition() and stole MD | #471 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499801d3d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.32906; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | libevent_free: release ptr-libevent@0x7f499c038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #410 spent 0.406 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.329522; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f499c038e28 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | libevent_free: release ptr-libevent@0x7f49a801d688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #347 spent 0.328 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.233 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.332629; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f49a801d688 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | libevent_free: release ptr-libevent@0x7f4984028c98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #456 spent 0.701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.333448; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f4984028c98 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | libevent_free: release ptr-libevent@0x7f497c038c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #440 spent 0.465 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.204 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.33436; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f497c038c68 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | libevent_free: release ptr-libevent@0x7f498c03e528 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #464 spent 0.325 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.377192; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009855 exceeds limit? YES "road-eastnet-nonat-220" #220: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-220" #220: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #472 at 0x55564dabf3d8 | State DB: adding IKEv2 state #472 in UNDEFINED | pstats #472 ikev2.ike started | Message ID: init #472: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #472: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #472; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-220" #472: initiating v2 parent SA to replace #220 | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 472 for state #472 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ff3b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f498c03e528 size 128 | #472 spent 0.393 milliseconds in ikev2_parent_outI1() | RESET processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 13 resuming | crypto helper 13 starting work-order 472 for state #472 | pstats #220 ikev2.ike failed too-many-retransmits | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 472 | pstats #220 ikev2.ike deleted too-many-retransmits | #220 spent 2.4 milliseconds in total | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-220" #220: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #220: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #220 "road-eastnet-nonat-220" #220: deleting IKE SA for connection 'road-eastnet-nonat-220' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-220' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-220 | State DB: deleting IKEv2 state #220 in PARENT_I1 | parent state #220: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 472 time elapsed 0.002615 seconds | (#472) spent 2.59 milliseconds in crypto helper computing work-order 472: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 472 for state #472 to event queue | stop processing: state #220 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49ac028338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | in statetime_stop() and could not find #220 | scheduling resume sending helper answer for #472 | libevent_malloc: new ptr-libevent@0x7f498c03e428 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 13 waiting (nothing to do) Initiating connection road-eastnet-nonat-220 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-220' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-220" | stop processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:349) | spent 0.204 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 472 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #472 | **emit ISAKMP Message: | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | ikev2 g^x 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ikev2 g^x ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | ikev2 g^x 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ikev2 g^x ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | ikev2 g^x e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | ikev2 g^x 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | ikev2 g^x cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | ikev2 g^x b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | ikev2 g^x f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | ikev2 g^x f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | ikev2 g^x e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | ikev2 g^x 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | ikev2 g^x 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | ikev2 g^x 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | ikev2 g^x b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 47 41 c1 04 88 06 e2 02 7f e1 a0 fa d8 62 de e7 | IKEv2 nonce bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 64 54 93 fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2b 36 08 ac c5 b0 88 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dc | natd_hash: port=500 | natd_hash: hash= 68 f0 31 05 4e d3 c0 76 2e dd 89 da b2 f1 f8 3d | natd_hash: hash= 8b bb c9 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 f0 31 05 4e d3 c0 76 2e dd 89 da b2 f1 f8 3d | Notify data 8b bb c9 b7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 2b 36 08 ac c5 b0 88 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | natd_hash: hash= 61 e6 5a 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | Notify data 61 e6 5a 5e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #472 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #472: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #472 to 4294967295 after switching state | Message ID: IKE #472 skipping update_recv as MD is fake | Message ID: sent #472 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.220:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | state #472 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c03e528 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9ff3b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f496c03e738 size 128 | #472 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.382401 | resume sending helper answer for #472 suppresed complete_v2_state_transition() and stole MD | #472 spent 1.51 milliseconds in resume sending helper answer | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c03e428 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.385957; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f498c03e428 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #411 spent 0.406 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.388821; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | libevent_free: release ptr-libevent@0x7f499802df48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #348 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.390665; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f499802df48 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | libevent_free: release ptr-libevent@0x7f4980038e68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #441 spent 0.416 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.39253; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #457 spent 0.414 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.42941; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | libevent_free: release ptr-libevent@0x7f499003e518 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #465 spent 0.441 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb998 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.435353; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005807 exceeds limit? YES "road-eastnet-nonat-221" #221: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-221" #221: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #473 at 0x55564dac0ae8 | State DB: adding IKEv2 state #473 in UNDEFINED | pstats #473 ikev2.ike started | Message ID: init #473: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #473: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #473; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-221" #473: initiating v2 parent SA to replace #221 | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 473 for state #473 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f499003e518 size 128 | #473 spent 0.398 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 473 for state #473 | RESET processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 473 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #221 ikev2.ike failed too-many-retransmits | pstats #221 ikev2.ike deleted too-many-retransmits | #221 spent 2.85 milliseconds in total | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-221" #221: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #221: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #221 "road-eastnet-nonat-221" #221: deleting IKE SA for connection 'road-eastnet-nonat-221' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-221' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-221 | State DB: deleting IKEv2 state #221 in PARENT_I1 | parent state #221: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 473 time elapsed 0.002598 seconds | (#473) spent 2.59 milliseconds in crypto helper computing work-order 473: ikev2_outI1 KE (pcr) | stop processing: state #221 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f498003e3c8 | crypto helper 14 sending results from work-order 473 for state #473 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb998 | in statetime_stop() and could not find #221 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #473 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f499003e418 size 128 Initiating connection road-eastnet-nonat-221 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-221' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-221" | stop processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:349) | spent 0.2 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 473 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #473 | **emit ISAKMP Message: | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | ikev2 g^x cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | ikev2 g^x 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | ikev2 g^x f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | ikev2 g^x a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | ikev2 g^x d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | ikev2 g^x 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | ikev2 g^x bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | ikev2 g^x a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | ikev2 g^x bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | ikev2 g^x 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | ikev2 g^x 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | ikev2 g^x 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | ikev2 g^x be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | ikev2 g^x cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | ikev2 g^x c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 81 d2 c6 e0 | IKEv2 nonce 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 8f f9 b9 d7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4c 57 6b e8 a8 0b fa 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dd | natd_hash: port=500 | natd_hash: hash= 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 1e 99 38 50 | natd_hash: hash= 8e ff d5 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 1e 99 38 50 | Notify data 8e ff d5 bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4c 57 6b e8 a8 0b fa 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | natd_hash: hash= 1e 39 62 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | Notify data 1e 39 62 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #473 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #473: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #473 to 4294967295 after switching state | Message ID: IKE #473 skipping update_recv as MD is fake | Message ID: sent #473 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.221:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | state #473 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499003e518 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da846f8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f49bc040fd8 size 128 | #473 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.440551 | resume sending helper answer for #473 suppresed complete_v2_state_transition() and stole MD | #473 spent 1.53 milliseconds in resume sending helper answer | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499003e418 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.450102; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f499003e418 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | libevent_free: release ptr-libevent@0x7f498c02db98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #349 spent 0.441 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.450638; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f498c02db98 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | libevent_free: release ptr-libevent@0x7f49b4036078 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #412 spent 0.459 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.246 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.178 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.451673; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f49b4036078 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | libevent_free: release ptr-libevent@0x7f4974038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #442 spent 0.423 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.183 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.454563; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #458 spent 0.416 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.508462; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | libevent_free: release ptr-libevent@0x7f4978038d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #443 spent 0.447 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.511396; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f4978038d98 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | libevent_free: release ptr-libevent@0x7f499401d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #350 spent 0.421 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.271 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.516376; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002802 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f499401d668 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | libevent_free: release ptr-libevent@0x7f498403e3a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #459 spent 0.406 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.518234; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500486 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f498403e3a8 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | libevent_free: release ptr-libevent@0x7f49a803e6b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #466 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.528174; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f49a803e6b8 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #413 spent 0.455 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.530071; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007617 exceeds limit? YES "road-eastnet-nonat-222" #222: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-222" #222: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #474 at 0x55564dac22f8 | State DB: adding IKEv2 state #474 in UNDEFINED | pstats #474 ikev2.ike started | Message ID: init #474: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #474: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #474; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-222" #474: initiating v2 parent SA to replace #222 | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 474 for state #474 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f49800184b8 size 128 | #474 spent 0.272 milliseconds in ikev2_parent_outI1() | RESET processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #222 ikev2.ike failed too-many-retransmits | pstats #222 ikev2.ike deleted too-many-retransmits | #222 spent 5.74 milliseconds in total | crypto helper 15 resuming | crypto helper 15 starting work-order 474 for state #474 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 474 | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-222" #222: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #222: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #222 "road-eastnet-nonat-222" #222: deleting IKE SA for connection 'road-eastnet-nonat-222' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-222' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-222 | State DB: deleting IKEv2 state #222 in PARENT_I1 | parent state #222: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 474 time elapsed 0.002555 seconds | (#474) spent 2.56 milliseconds in crypto helper computing work-order 474: ikev2_outI1 KE (pcr) | stop processing: state #222 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da5bf58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | in statetime_stop() and could not find #222 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 15 sending results from work-order 474 for state #474 to event queue | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-222 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #474 | libevent_malloc: new ptr-libevent@0x7f498403e2a8 size 128 | crypto helper 15 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-222' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-222" | stop processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:349) | spent 0.182 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 474 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #474 | **emit ISAKMP Message: | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ikev2 g^x ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | ikev2 g^x 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | ikev2 g^x 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ikev2 g^x ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | ikev2 g^x 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | ikev2 g^x 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | ikev2 g^x 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | ikev2 g^x 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | ikev2 g^x d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | ikev2 g^x bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | ikev2 g^x d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | ikev2 g^x 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | ikev2 g^x 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ikev2 g^x ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | ikev2 g^x 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce df 38 21 9b c8 79 39 a8 97 b7 e7 63 ee 58 b2 42 | IKEv2 nonce 1a e1 b0 cb df 35 eb af c7 2a 6c bf 74 ce 41 84 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 05 27 f5 f5 1e 00 e6 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 de | natd_hash: port=500 | natd_hash: hash= a1 b5 b7 4a c6 20 18 db f0 ed 70 df e7 b2 6e ac | natd_hash: hash= cf 7e 53 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 b5 b7 4a c6 20 18 db f0 ed 70 df e7 b2 6e ac | Notify data cf 7e 53 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 05 27 f5 f5 1e 00 e6 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | natd_hash: hash= 93 84 e8 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | Notify data 93 84 e8 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #474 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #474: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #474 to 4294967295 after switching state | Message ID: IKE #474 skipping update_recv as MD is fake | Message ID: sent #474 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.222:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | state #474 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800184b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9be0a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f49b4040f98 size 128 | #474 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.535042 | resume sending helper answer for #474 suppresed complete_v2_state_transition() and stole MD | #474 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498403e2a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.569747; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f498403e2a8 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | libevent_free: release ptr-libevent@0x7f499002dd88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #351 spent 0.472 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.57492; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | libevent_free: release ptr-libevent@0x7f498803e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #467 spent 0.469 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.57687; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f498803e5d8 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | libevent_free: release ptr-libevent@0x7f4980018dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #460 spent 0.411 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.581968; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003193 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #444 spent 0.446 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.222 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.589084; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | libevent_free: release ptr-libevent@0x7f49a8022cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #414 spent 0.445 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.216 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.624077; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006754 exceeds limit? YES "road-eastnet-nonat-223" #223: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-223" #223: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #475 at 0x55564dac3958 | State DB: adding IKEv2 state #475 in UNDEFINED | pstats #475 ikev2.ike started | Message ID: init #475: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #475: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #475; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-223" #475: initiating v2 parent SA to replace #223 | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 475 for state #475 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da5d588 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f49a8022cf8 size 128 | #475 spent 0.278 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | RESET processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 475 for state #475 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #223 ikev2.ike failed too-many-retransmits | pstats #223 ikev2.ike deleted too-many-retransmits | #223 spent 7.23 milliseconds in total | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 475 | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-223" #223: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #223: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #223 "road-eastnet-nonat-223" #223: deleting IKE SA for connection 'road-eastnet-nonat-223' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-223' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-223 | State DB: deleting IKEv2 state #223 in PARENT_I1 | parent state #223: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #223 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 475 time elapsed 0.00278 seconds | libevent_free: release ptr-libevent@0x7f499402dcb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | in statetime_stop() and could not find #223 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#475) spent 2.77 milliseconds in crypto helper computing work-order 475: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 16 sending results from work-order 475 for state #475 to event queue | scheduling resume sending helper answer for #475 Initiating connection road-eastnet-nonat-223 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f498803e6d8 size 128 | crypto helper 16 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-223' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-223" | stop processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:349) | spent 0.239 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 475 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #475 | **emit ISAKMP Message: | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ikev2 g^x ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | ikev2 g^x 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | ikev2 g^x 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | ikev2 g^x 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | ikev2 g^x b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | ikev2 g^x 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ikev2 g^x ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | ikev2 g^x e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ikev2 g^x ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | ikev2 g^x 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | ikev2 g^x 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | ikev2 g^x d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | ikev2 g^x f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | ikev2 g^x 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | ikev2 g^x 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 d5 75 9a 37 | IKEv2 nonce 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c f0 00 eb 1a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8d 3e 78 64 22 25 1e 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 df | natd_hash: port=500 | natd_hash: hash= 25 42 6a ab df 08 2f 4e 08 28 ee e9 b6 c0 a2 76 | natd_hash: hash= b1 1a 80 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 25 42 6a ab df 08 2f 4e 08 28 ee e9 b6 c0 a2 76 | Notify data b1 1a 80 3a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8d 3e 78 64 22 25 1e 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | natd_hash: hash= 34 34 48 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | Notify data 34 34 48 f4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #475 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #475: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #475 to 4294967295 after switching state | Message ID: IKE #475 skipping update_recv as MD is fake | Message ID: sent #475 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.223:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | state #475 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8022cf8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da5d588 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f49b8041948 size 128 | #475 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.629291 | resume sending helper answer for #475 suppresed complete_v2_state_transition() and stole MD | #475 spent 1.54 milliseconds in resume sending helper answer | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498803e6d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.629673; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f498803e6d8 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #352 spent 0.351 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.182 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.637737; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | libevent_free: release ptr-libevent@0x7f497c03e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #468 spent 0.465 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.638282; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f497c03e5d8 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | libevent_free: release ptr-libevent@0x7f499c03e798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #461 spent 0.332 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.182 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.64355; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f499c03e798 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | libevent_free: release ptr-libevent@0x7f49bc03b678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #445 spent 0.457 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.649531; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f49bc03b678 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | libevent_free: release ptr-libevent@0x7f499c022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #415 spent 0.444 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.690411; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #353 spent 0.231 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.12 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.695974; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | libevent_free: release ptr-libevent@0x7f498003e5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #469 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.696178; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f498003e5c8 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | libevent_free: release ptr-libevent@0x7f49a003e4d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #462 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0825 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.701625; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f49a003e4d8 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | libevent_free: release ptr-libevent@0x7f49b403b638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #446 spent 0.275 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.12 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.710185; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f49b403b638 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | libevent_free: release ptr-libevent@0x7f49a0022ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #416 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0525 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.724513; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008862 exceeds limit? YES "road-eastnet-nonat-224" #224: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-224" #224: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #476 at 0x55564dac5068 | State DB: adding IKEv2 state #476 in UNDEFINED | pstats #476 ikev2.ike started | Message ID: init #476: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #476: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #476; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-224" #476: initiating v2 parent SA to replace #224 | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 476 for state #476 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8408 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 | #476 spent 0.0826 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | RESET processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 starting work-order 476 for state #476 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #224 ikev2.ike failed too-many-retransmits | pstats #224 ikev2.ike deleted too-many-retransmits | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 476 | #224 spent 7.65 milliseconds in total | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-224" #224: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #224: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #224 "road-eastnet-nonat-224" #224: deleting IKE SA for connection 'road-eastnet-nonat-224' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-224' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-224 | State DB: deleting IKEv2 state #224 in PARENT_I1 | parent state #224: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #224 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 476 time elapsed 0.000562 seconds | libevent_free: release ptr-libevent@0x55564daba2f8 | (#476) spent 0.556 milliseconds in crypto helper computing work-order 476: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | in statetime_stop() and could not find #224 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 1 sending results from work-order 476 for state #476 to event queue | scheduling resume sending helper answer for #476 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f497c03e6d8 size 128 Initiating connection road-eastnet-nonat-224 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-224' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-224" | stop processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:349) | spent 0.0617 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 476 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #476 | **emit ISAKMP Message: | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | ikev2 g^x b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | ikev2 g^x dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | ikev2 g^x 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | ikev2 g^x 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | ikev2 g^x b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | ikev2 g^x be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | ikev2 g^x 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | ikev2 g^x f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | ikev2 g^x c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | ikev2 g^x 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | ikev2 g^x f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | ikev2 g^x 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | ikev2 g^x 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | ikev2 g^x 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | ikev2 g^x bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 55 de 16 56 16 6e d2 6a c3 9f 4a d0 a5 11 72 | IKEv2 nonce aa f8 26 b2 90 04 d2 34 93 e8 c5 56 e3 6a bb 19 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 27 50 bf 31 06 86 e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e0 | natd_hash: port=500 | natd_hash: hash= fe c4 3b fe 5a f9 49 45 55 46 ff 60 42 a7 b9 12 | natd_hash: hash= b7 5e e0 df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fe c4 3b fe 5a f9 49 45 55 46 ff 60 42 a7 b9 12 | Notify data b7 5e e0 df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ad 27 50 bf 31 06 86 e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | natd_hash: hash= 38 af be fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | Notify data 38 af be fa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #476 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #476: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #476 to 4294967295 after switching state | Message ID: IKE #476 skipping update_recv as MD is fake | Message ID: sent #476 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.224:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | state #476 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a0022ab8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8408 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f49ac043d98 size 128 | #476 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.725626 | resume sending helper answer for #476 suppresed complete_v2_state_transition() and stole MD | #476 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c03e6d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.747825; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f497c03e6d8 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #354 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.753135; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #463 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.760422; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | libevent_free: release ptr-libevent@0x7f497403e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #470 spent 0.0975 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.761666; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f497403e5d8 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | libevent_free: release ptr-libevent@0x7f49b803c298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #447 spent 0.0929 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0746 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.77192; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f49b803c298 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #417 spent 0.0949 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.810194; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | libevent_free: release ptr-libevent@0x7f49bc02af48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #355 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.819462; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007954 exceeds limit? YES "road-eastnet-nonat-225" #225: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-225" #225: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #477 at 0x55564dac6878 | State DB: adding IKEv2 state #477 in UNDEFINED | pstats #477 ikev2.ike started | Message ID: init #477: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #477: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #477; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-225" #477: initiating v2 parent SA to replace #225 | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 477 for state #477 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ad8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f49bc02af48 size 128 | #477 spent 0.0811 milliseconds in ikev2_parent_outI1() | RESET processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #225 ikev2.ike failed too-many-retransmits | pstats #225 ikev2.ike deleted too-many-retransmits | #225 spent 6.81 milliseconds in total | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-225" #225: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #225: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #225 "road-eastnet-nonat-225" #225: deleting IKE SA for connection 'road-eastnet-nonat-225' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-225' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-225 | State DB: deleting IKEv2 state #225 in PARENT_I1 | parent state #225: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 resuming | crypto helper 3 starting work-order 477 for state #477 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 477 | stop processing: state #225 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dabba78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | in statetime_stop() and could not find #225 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-225 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-225' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-225" | stop processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:349) | spent 0.0608 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 477 time elapsed 0.000567 seconds | (#477) spent 0.544 milliseconds in crypto helper computing work-order 477: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 477 for state #477 to event queue | scheduling resume sending helper answer for #477 | libevent_malloc: new ptr-libevent@0x7f498003e6c8 size 128 | crypto helper 3 waiting (nothing to do) | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.820238; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f49b0043cc8 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | libevent_free: release ptr-libevent@0x7f497803e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #471 spent 0.0914 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 477 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #477 | **emit ISAKMP Message: | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | ikev2 g^x 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | ikev2 g^x 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | ikev2 g^x 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | ikev2 g^x 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | ikev2 g^x f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ikev2 g^x ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | ikev2 g^x 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | ikev2 g^x d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | ikev2 g^x 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | ikev2 g^x af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | ikev2 g^x 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | ikev2 g^x 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | ikev2 g^x 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | ikev2 g^x 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | ikev2 g^x 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c 09 52 1d 2f | IKEv2 nonce 1b b5 89 1b ed eb a5 53 3e d1 34 17 23 ec 94 7e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 04 07 ac 1e c1 b2 a0 f3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e1 | natd_hash: port=500 | natd_hash: hash= b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 18 18 1b d7 | natd_hash: hash= 3e 7a 1d 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 18 18 1b d7 | Notify data 3e 7a 1d 00 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 04 07 ac 1e c1 b2 a0 f3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | natd_hash: hash= e1 7d 70 a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | Notify data e1 7d 70 a8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #477 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #477: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #477 to 4294967295 after switching state | Message ID: IKE #477 skipping update_recv as MD is fake | Message ID: sent #477 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.225:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | state #477 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49bc02af48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ad8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f497803e548 size 128 | #477 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.82066 | resume sending helper answer for #477 suppresed complete_v2_state_transition() and stole MD | #477 spent 0.302 milliseconds in resume sending helper answer | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498003e6c8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0373 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.82384; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f498003e6c8 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | libevent_free: release ptr-libevent@0x7f4990028328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #448 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.835098; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | libevent_free: release ptr-libevent@0x7f497c038c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #464 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.84037; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f497c038c68 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | libevent_free: release ptr-libevent@0x7f49780242d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #418 spent 0.0856 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.876625; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #356 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0769 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.881922; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | libevent_free: release ptr-libevent@0x7f496c03e738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #472 spent 0.0898 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.884172; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f496c03e738 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | libevent_free: release ptr-libevent@0x7f497402df08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #449 spent 0.0827 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.893386; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008677 exceeds limit? YES "road-eastnet-nonat-226" #226: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-226" #226: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #478 at 0x55564dac7ed8 | State DB: adding IKEv2 state #478 in UNDEFINED | pstats #478 ikev2.ike started | Message ID: init #478: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #478: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #478; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-226" #478: initiating v2 parent SA to replace #226 | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 478 for state #478 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f497402df08 size 128 | #478 spent 0.0767 milliseconds in ikev2_parent_outI1() | RESET processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #226 ikev2.ike failed too-many-retransmits | pstats #226 ikev2.ike deleted too-many-retransmits | #226 spent 3.22 milliseconds in total | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-226" #226: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #226: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #226 "road-eastnet-nonat-226" #226: deleting IKE SA for connection 'road-eastnet-nonat-226' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-226' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-226 | State DB: deleting IKEv2 state #226 in PARENT_I1 | parent state #226: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 resuming | crypto helper 17 starting work-order 478 for state #478 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 478 | stop processing: state #226 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f497c022b28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | in statetime_stop() and could not find #226 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-226 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-226' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-226" | stop processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:349) | spent 0.0756 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 478 time elapsed 0.000566 seconds | (#478) spent 0.571 milliseconds in crypto helper computing work-order 478: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 478 for state #478 to event queue | scheduling resume sending helper answer for #478 | libevent_malloc: new ptr-libevent@0x7f497403e6d8 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 478 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #478 | **emit ISAKMP Message: | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | ikev2 g^x 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | ikev2 g^x b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | ikev2 g^x 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | ikev2 g^x 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ikev2 g^x ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ikev2 g^x ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | ikev2 g^x 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | ikev2 g^x eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | ikev2 g^x 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | ikev2 g^x 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ikev2 g^x ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ikev2 g^x ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | ikev2 g^x d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | ikev2 g^x d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | ikev2 g^x 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 08 91 c3 2a | IKEv2 nonce 59 e6 69 03 a0 22 6c bc 34 1c ab ab 31 ab 29 8d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 b2 13 6c 1a 0a 8a 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e2 | natd_hash: port=500 | natd_hash: hash= 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 36 da bd 15 | natd_hash: hash= b0 47 af 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 36 da bd 15 | Notify data b0 47 af 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a3 b2 13 6c 1a 0a 8a 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | natd_hash: hash= 68 14 18 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | Notify data 68 14 18 52 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #478 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #478: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #478 to 4294967295 after switching state | Message ID: IKE #478 skipping update_recv as MD is fake | Message ID: sent #478 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.226:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | state #478 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497402df08 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da07e48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f49a4043cd8 size 128 | #478 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.89452 | resume sending helper answer for #478 suppresed complete_v2_state_transition() and stole MD | #478 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497403e6d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.900704; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f497403e6d8 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | libevent_free: release ptr-libevent@0x7f49a0038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #419 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10654.930105; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f49a0038d68 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #465 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.9375; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | libevent_free: release ptr-libevent@0x7f49b401a508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #357 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10654.940915; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | libevent_free: release ptr-libevent@0x7f49bc040fd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #473 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10654.945553; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f49bc040fd8 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #450 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10654.959857; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | libevent_free: release ptr-libevent@0x7f4994038ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #420 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.08 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10654.964256; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006046 exceeds limit? YES "road-eastnet-nonat-227" #227: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-227" #227: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #479 at 0x55564dac9658 | State DB: adding IKEv2 state #479 in UNDEFINED | pstats #479 ikev2.ike started | Message ID: init #479: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #479: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #479; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-227" #479: initiating v2 parent SA to replace #227 | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 479 for state #479 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da56298 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f4994038ed8 size 128 | #479 spent 0.105 milliseconds in ikev2_parent_outI1() | RESET processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #227 ikev2.ike failed too-many-retransmits | pstats #227 ikev2.ike deleted too-many-retransmits | #227 spent 3.61 milliseconds in total | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-227" #227: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #227: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #227 "road-eastnet-nonat-227" #227: deleting IKE SA for connection 'road-eastnet-nonat-227' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-227' added to the list and scheduled for 0 seconds | crypto helper 18 resuming | crypto helper 18 starting work-order 479 for state #479 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 479 | in connection_discard for connection road-eastnet-nonat-227 | State DB: deleting IKEv2 state #227 in PARENT_I1 | parent state #227: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 479 time elapsed 0.000908 seconds | stop processing: state #227 from 192.1.2.23 (in delete_state() at state.c:1143) | (#479) spent 0.916 milliseconds in crypto helper computing work-order 479: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 479 for state #479 to event queue | scheduling resume sending helper answer for #479 | libevent_malloc: new ptr-libevent@0x7f497803e648 size 128 | crypto helper 18 waiting (nothing to do) | libevent_free: release ptr-libevent@0x55564da91708 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | in statetime_stop() and could not find #227 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-227 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-227' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-227" | stop processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:349) | spent 0.0753 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 479 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #479 | **emit ISAKMP Message: | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | ikev2 g^x 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | ikev2 g^x 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | ikev2 g^x eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | ikev2 g^x c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | ikev2 g^x bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | ikev2 g^x 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | ikev2 g^x 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ikev2 g^x ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | ikev2 g^x 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | ikev2 g^x 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | ikev2 g^x 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | ikev2 g^x 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | ikev2 g^x a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | ikev2 g^x f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | ikev2 g^x a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 56 e8 e6 21 | IKEv2 nonce 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 bb ba c5 16 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d7 9e fa 5e 40 c6 fe 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e3 | natd_hash: port=500 | natd_hash: hash= 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 bd 33 c4 5a | natd_hash: hash= 73 5d 0b 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 bd 33 c4 5a | Notify data 73 5d 0b 72 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= d7 9e fa 5e 40 c6 fe 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | natd_hash: hash= 79 5c e1 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | Notify data 79 5c e1 1d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #479 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #479: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #479 to 4294967295 after switching state | Message ID: IKE #479 skipping update_recv as MD is fake | Message ID: sent #479 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.227:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | state #479 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994038ed8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da56298 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f49a8043f28 size 128 | #479 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10654.966053 | resume sending helper answer for #479 suppresed complete_v2_state_transition() and stole MD | #479 spent 0.492 milliseconds in resume sending helper answer | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497803e648 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10654.994427; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f497803e648 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | libevent_free: release ptr-libevent@0x7f49ac02dd98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #358 spent 0.468 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.008638; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003581 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #451 spent 0.462 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.019607; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | libevent_free: release ptr-libevent@0x7f498403e3a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #466 spent 0.443 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.031557; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00926 exceeds limit? YES "road-eastnet-nonat-228" #228: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-228" #228: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #480 at 0x55564dacadd8 | State DB: adding IKEv2 state #480 in UNDEFINED | pstats #480 ikev2.ike started | Message ID: init #480: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #480: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #480; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-228" #480: initiating v2 parent SA to replace #228 | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 480 for state #480 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da00b38 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f498403e3a8 size 128 | #480 spent 0.282 milliseconds in ikev2_parent_outI1() | RESET processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #228 ikev2.ike failed too-many-retransmits | pstats #228 ikev2.ike deleted too-many-retransmits | #228 spent 2.2 milliseconds in total | crypto helper 19 resuming | crypto helper 19 starting work-order 480 for state #480 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 480 | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-228" #228: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #228: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #228 "road-eastnet-nonat-228" #228: deleting IKE SA for connection 'road-eastnet-nonat-228' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-228' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-228 | State DB: deleting IKEv2 state #228 in PARENT_I1 | parent state #228: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 480 time elapsed 0.002557 seconds | (#480) spent 2.57 milliseconds in crypto helper computing work-order 480: ikev2_outI1 KE (pcr) | stop processing: state #228 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 19 sending results from work-order 480 for state #480 to event queue | libevent_free: release ptr-libevent@0x7f49a8028468 | scheduling resume sending helper answer for #480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | libevent_malloc: new ptr-libevent@0x7f496c03e838 size 128 | in statetime_stop() and could not find #228 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 19 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-228 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-228' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-228" | stop processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:349) | spent 0.18 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 480 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #480 | **emit ISAKMP Message: | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | ikev2 g^x 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | ikev2 g^x 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | ikev2 g^x 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | ikev2 g^x 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | ikev2 g^x d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | ikev2 g^x 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | ikev2 g^x 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | ikev2 g^x 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | ikev2 g^x dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | ikev2 g^x 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | ikev2 g^x 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | ikev2 g^x d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | ikev2 g^x 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | ikev2 g^x c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | ikev2 g^x a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 dc df 51 f3 4d c7 f5 6e c9 9c ae e4 87 69 d0 | IKEv2 nonce 94 da 30 14 3f b9 29 38 f5 cf e7 4a 36 0d 4c 95 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5d 96 f6 31 50 66 7e 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e4 | natd_hash: port=500 | natd_hash: hash= a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a f4 97 8a 8f | natd_hash: hash= 2d 52 c9 e8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a f4 97 8a 8f | Notify data 2d 52 c9 e8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5d 96 f6 31 50 66 7e 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | natd_hash: hash= 25 ce 33 a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | Notify data 25 ce 33 a2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #480 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #480: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #480 to 4294967295 after switching state | Message ID: IKE #480 skipping update_recv as MD is fake | Message ID: sent #480 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.228:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | state #480 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498403e3a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da00b38 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f499c043e58 size 128 | #480 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.036612 | resume sending helper answer for #480 suppresed complete_v2_state_transition() and stole MD | #480 spent 1.51 milliseconds in resume sending helper answer | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c03e838 | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.036784; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f496c03e838 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | libevent_free: release ptr-libevent@0x7f49b4040f98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #474 spent 0.343 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.194 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.172 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.037598; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f49b4040f98 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | libevent_free: release ptr-libevent@0x7f4998039588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #421 spent 0.343 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.179 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.056436; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f4998039588 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | libevent_free: release ptr-libevent@0x7f49bc030908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #359 spent 0.41 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.065391; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f49bc030908 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #452 spent 0.466 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.075363; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | libevent_free: release ptr-libevent@0x7f499002dd88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #467 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.094262; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008877 exceeds limit? YES "road-eastnet-nonat-229" #229: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-229" #229: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #481 at 0x55564dacc558 | State DB: adding IKEv2 state #481 in UNDEFINED | pstats #481 ikev2.ike started | Message ID: init #481: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #481: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #481; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-229" #481: initiating v2 parent SA to replace #229 | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 481 for state #481 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 | #481 spent 0.273 milliseconds in ikev2_parent_outI1() | RESET processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #229 ikev2.ike failed too-many-retransmits | pstats #229 ikev2.ike deleted too-many-retransmits | crypto helper 0 resuming | #229 spent 2.77 milliseconds in total | crypto helper 0 starting work-order 481 for state #481 | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23 (in delete_state() at state.c:879) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 481 "road-eastnet-nonat-229" #229: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #229: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #229 "road-eastnet-nonat-229" #229: deleting IKE SA for connection 'road-eastnet-nonat-229' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-229' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-229 | State DB: deleting IKEv2 state #229 in PARENT_I1 | parent state #229: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #229 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 481 time elapsed 0.002794 seconds | libevent_free: release ptr-libevent@0x7f49b401a408 | (#481) spent 2.77 milliseconds in crypto helper computing work-order 481: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | crypto helper 0 sending results from work-order 481 for state #481 to event queue | in statetime_stop() and could not find #229 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #481 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7f49bc0410d8 size 128 Initiating connection road-eastnet-nonat-229 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-229' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-229" | stop processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:349) | spent 0.198 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 481 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #481 | **emit ISAKMP Message: | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | ikev2 g^x a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | ikev2 g^x 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | ikev2 g^x cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | ikev2 g^x 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | ikev2 g^x 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | ikev2 g^x 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | ikev2 g^x 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ikev2 g^x ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | ikev2 g^x 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | ikev2 g^x 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | ikev2 g^x dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | ikev2 g^x 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | ikev2 g^x e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | ikev2 g^x c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | ikev2 g^x da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c 7a c5 f0 99 | IKEv2 nonce 78 21 04 1c 53 96 36 91 5a 6f b6 78 f8 34 08 07 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 81 72 23 ad 6d 0e da 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e5 | natd_hash: port=500 | natd_hash: hash= e5 c0 34 de db ba 71 bb 7d 20 8d 44 59 4a e4 c3 | natd_hash: hash= 5d 9b 48 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 c0 34 de db ba 71 bb 7d 20 8d 44 59 4a e4 c3 | Notify data 5d 9b 48 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 81 72 23 ad 6d 0e da 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | natd_hash: hash= 67 40 94 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | Notify data 67 40 94 f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #481 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #481: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #481 to 4294967295 after switching state | Message ID: IKE #481 skipping update_recv as MD is fake | Message ID: sent #481 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.229:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | state #481 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499002dd88 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f49a0043d98 size 128 | #481 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.099907 | resume sending helper answer for #481 suppresed complete_v2_state_transition() and stole MD | #481 spent 1.83 milliseconds in resume sending helper answer | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc0410d8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.29 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.113503; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f49bc0410d8 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #422 spent 0.23 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.114994; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | libevent_free: release ptr-libevent@0x7f49b4030608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #360 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0949 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.126437; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f49b4030608 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #453 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.128805; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | libevent_free: release ptr-libevent@0x7f49b8041948 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #475 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.139124; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f49b8041948 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #468 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0505 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd128 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.1584; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007975 exceeds limit? YES "road-eastnet-nonat-230" #230: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-230" #230: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #482 at 0x55564dacdcd8 | State DB: adding IKEv2 state #482 in UNDEFINED | pstats #482 ikev2.ike started | Message ID: init #482: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #482: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #482; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-230" #482: initiating v2 parent SA to replace #230 | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 482 for state #482 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f499c0123d8 size 128 | #482 spent 0.0789 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 482 for state #482 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 482 | RESET processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #230 ikev2.ike failed too-many-retransmits | pstats #230 ikev2.ike deleted too-many-retransmits | #230 spent 2.65 milliseconds in total | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-230" #230: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #230: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #230 "road-eastnet-nonat-230" #230: deleting IKE SA for connection 'road-eastnet-nonat-230' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-230' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-230 | State DB: deleting IKEv2 state #230 in PARENT_I1 | parent state #230: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 482 time elapsed 0.001008 seconds | (#482) spent 0.997 milliseconds in crypto helper computing work-order 482: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 482 for state #482 to event queue | scheduling resume sending helper answer for #482 | libevent_malloc: new ptr-libevent@0x7f49b4041098 size 128 | crypto helper 2 waiting (nothing to do) | stop processing: state #230 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49a8043d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd128 | in statetime_stop() and could not find #230 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-230 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-230' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-230" | stop processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:349) | spent 0.0598 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 482 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #482 | **emit ISAKMP Message: | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | ikev2 g^x 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | ikev2 g^x 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | ikev2 g^x 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | ikev2 g^x fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | ikev2 g^x 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | ikev2 g^x 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | ikev2 g^x a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ikev2 g^x ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | ikev2 g^x fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ikev2 g^x ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | ikev2 g^x 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ikev2 g^x ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ikev2 g^x ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | ikev2 g^x d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | ikev2 g^x 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae b7 fb ac f0 | IKEv2 nonce 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 d5 09 70 e0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 51 f2 5d 06 da c3 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e6 | natd_hash: port=500 | natd_hash: hash= 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 c9 70 14 59 | natd_hash: hash= fa a1 2f 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 c9 70 14 59 | Notify data fa a1 2f 65 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 48 51 f2 5d 06 da c3 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | natd_hash: hash= 21 30 9b 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | Notify data 21 30 9b 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #482 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #482: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #482 to 4294967295 after switching state | Message ID: IKE #482 skipping update_recv as MD is fake | Message ID: sent #482 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.230:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | state #482 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f499c0123d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f4994043fb8 size 128 | #482 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.160083 | resume sending helper answer for #482 suppresed complete_v2_state_transition() and stole MD | #482 spent 0.425 milliseconds in resume sending helper answer | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b4041098 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.178298; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f49b4041098 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | libevent_free: release ptr-libevent@0x7f49b8031268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #361 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.181581; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f49b8031268 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #423 spent 0.0853 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.184808; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | libevent_free: release ptr-libevent@0x7f4998028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #454 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.197153; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #469 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.226457; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | libevent_free: release ptr-libevent@0x7f49ac043d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #476 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.229732; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006872 exceeds limit? YES "road-eastnet-nonat-231" #231: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-231" #231: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #483 at 0x55564dacf3e8 | State DB: adding IKEv2 state #483 in UNDEFINED | pstats #483 ikev2.ike started | Message ID: init #483: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #483: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #483; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-231" #483: initiating v2 parent SA to replace #231 | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 483 for state #483 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8408 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f49ac043d98 size 128 | #483 spent 0.114 milliseconds in ikev2_parent_outI1() | RESET processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #231 ikev2.ike failed too-many-retransmits | pstats #231 ikev2.ike deleted too-many-retransmits | #231 spent 3.03 milliseconds in total | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-231" #231: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #231: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #231 "road-eastnet-nonat-231" #231: deleting IKE SA for connection 'road-eastnet-nonat-231' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-231' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-231 | crypto helper 4 resuming | crypto helper 4 starting work-order 483 for state #483 | State DB: deleting IKEv2 state #231 in PARENT_I1 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 483 | parent state #231: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #231 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da98cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | in statetime_stop() and could not find #231 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-231 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-231' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-231" | stop processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:349) | spent 0.0639 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 483 time elapsed 0.000528 seconds | (#483) spent 0.53 milliseconds in crypto helper computing work-order 483: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 483 for state #483 to event queue | scheduling resume sending helper answer for #483 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 483 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #483 | **emit ISAKMP Message: | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | ikev2 g^x 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | ikev2 g^x f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | ikev2 g^x c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | ikev2 g^x bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | ikev2 g^x 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | ikev2 g^x 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | ikev2 g^x 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | ikev2 g^x fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | ikev2 g^x 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | ikev2 g^x 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | ikev2 g^x 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | ikev2 g^x 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | ikev2 g^x b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | ikev2 g^x 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | ikev2 g^x 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 f8 84 9d 22 9d 27 ee be 88 c5 00 49 72 1e 3e | IKEv2 nonce cb b1 3f a8 8f 85 26 d9 03 43 77 74 78 e0 4e 3b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= da ff be 60 98 28 4e c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e7 | natd_hash: port=500 | natd_hash: hash= 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 98 d6 24 99 | natd_hash: hash= e5 16 17 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 98 d6 24 99 | Notify data e5 16 17 4e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= da ff be 60 98 28 4e c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | natd_hash: hash= 77 c5 97 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | Notify data 77 c5 97 6f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #483 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #483: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #483 to 4294967295 after switching state | Message ID: IKE #483 skipping update_recv as MD is fake | Message ID: sent #483 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.231:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | state #483 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac043d98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8408 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f4998043d28 size 128 | #483 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.230876 | resume sending helper answer for #483 suppresed complete_v2_state_transition() and stole MD | #483 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b801a578 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.243061; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | libevent_free: release ptr-libevent@0x7f4984038b38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #424 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.250354; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f4984038b38 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | libevent_free: release ptr-libevent@0x7f49bc020028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #362 spent 0.0985 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.261636; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f49bc020028 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #470 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.272937; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | libevent_free: release ptr-libevent@0x7f498802dc48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #455 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.297227; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008868 exceeds limit? YES "road-eastnet-nonat-232" #232: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-232" #232: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #484 at 0x55564dad0af8 | State DB: adding IKEv2 state #484 in UNDEFINED | pstats #484 ikev2.ike started | Message ID: init #484: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #484: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #484; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-232" #484: initiating v2 parent SA to replace #232 | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 484 for state #484 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f498802dc48 size 128 | #484 spent 0.0811 milliseconds in ikev2_parent_outI1() | RESET processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #232 ikev2.ike failed too-many-retransmits | pstats #232 ikev2.ike deleted too-many-retransmits | #232 spent 3.03 milliseconds in total | crypto helper 5 starting work-order 484 for state #484 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 484 | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-232" #232: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #232: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #232 "road-eastnet-nonat-232" #232: deleting IKE SA for connection 'road-eastnet-nonat-232' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-232' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-232 | State DB: deleting IKEv2 state #232 in PARENT_I1 | parent state #232: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 484 time elapsed 0.000663 seconds | (#484) spent 0.656 milliseconds in crypto helper computing work-order 484: ikev2_outI1 KE (pcr) | stop processing: state #232 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da63318 | crypto helper 5 sending results from work-order 484 for state #484 to event queue | scheduling resume sending helper answer for #484 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | in statetime_stop() and could not find #232 | libevent_malloc: new ptr-libevent@0x7f49ac043e98 size 128 | crypto helper 5 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-232 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-232' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-232" | stop processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:349) | spent 0.0734 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 484 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #484 | **emit ISAKMP Message: | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | ikev2 g^x 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | ikev2 g^x 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | ikev2 g^x d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | ikev2 g^x a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | ikev2 g^x 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | ikev2 g^x fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | ikev2 g^x 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | ikev2 g^x f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | ikev2 g^x e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | ikev2 g^x 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | ikev2 g^x b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | ikev2 g^x 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | ikev2 g^x 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ikev2 g^x ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | ikev2 g^x fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f da 9f 36 f7 | IKEv2 nonce a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e a4 7a 0e ca | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 03 6f 76 47 a2 6e c6 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e8 | natd_hash: port=500 | natd_hash: hash= 70 c5 44 0e 59 ee 70 43 76 92 01 fa f5 7b c0 3d | natd_hash: hash= e7 51 e7 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 c5 44 0e 59 ee 70 43 76 92 01 fa f5 7b c0 3d | Notify data e7 51 e7 dc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 03 6f 76 47 a2 6e c6 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | natd_hash: hash= ad e4 a5 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | Notify data ad e4 a5 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #484 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #484: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #484 to 4294967295 after switching state | Message ID: IKE #484 skipping update_recv as MD is fake | Message ID: sent #484 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.232:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | state #484 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498802dc48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f498c043d98 size 128 | #484 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.298492 | resume sending helper answer for #484 suppresed complete_v2_state_transition() and stole MD | #484 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac043e98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.304654; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f49ac043e98 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | libevent_free: release ptr-libevent@0x7f49b0033438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #425 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.320964; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f49b0033438 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | libevent_free: release ptr-libevent@0x7f497803e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #477 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.32111; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999598 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f497803e548 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | libevent_free: release ptr-libevent@0x7f49b0043cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #471 spent 0.0729 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.327393; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f49b0043cc8 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #363 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.333675; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003193 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | libevent_free: release ptr-libevent@0x7f49a801d688 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #456 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad16c8 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.361064; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008331 exceeds limit? YES "road-eastnet-nonat-233" #233: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-233" #233: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #485 at 0x55564dad2278 | State DB: adding IKEv2 state #485 in UNDEFINED | pstats #485 ikev2.ike started | Message ID: init #485: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #485: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #485; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-233" #485: initiating v2 parent SA to replace #233 | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 485 for state #485 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da8ea48 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f49a801d688 size 128 | #485 spent 0.0773 milliseconds in ikev2_parent_outI1() | RESET processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #233 ikev2.ike failed too-many-retransmits | pstats #233 ikev2.ike deleted too-many-retransmits | #233 spent 3.03 milliseconds in total | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-233" #233: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #233: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #233 "road-eastnet-nonat-233" #233: deleting IKE SA for connection 'road-eastnet-nonat-233' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-233' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-233 | crypto helper 6 resuming | crypto helper 6 starting work-order 485 for state #485 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 485 | State DB: deleting IKEv2 state #233 in PARENT_I1 | parent state #233: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 485 time elapsed 0.000692 seconds | stop processing: state #233 from 192.1.2.23 (in delete_state() at state.c:1143) | (#485) spent 0.679 milliseconds in crypto helper computing work-order 485: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7f4994043db8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad16c8 | crypto helper 6 sending results from work-order 485 for state #485 to event queue | scheduling resume sending helper answer for #485 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 | in statetime_stop() and could not find #233 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-233 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-233' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-233" | stop processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:349) | spent 0.0767 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 485 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #485 | **emit ISAKMP Message: | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | ikev2 g^x 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | ikev2 g^x 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | ikev2 g^x fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | ikev2 g^x 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | ikev2 g^x a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | ikev2 g^x 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ikev2 g^x ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ikev2 g^x ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | ikev2 g^x 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | ikev2 g^x a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | ikev2 g^x d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | ikev2 g^x de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | ikev2 g^x d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | ikev2 g^x 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | ikev2 g^x 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 e9 02 db ce c4 64 cf 59 cb 7e 7e 2e 91 92 85 | IKEv2 nonce c1 2b 55 06 88 64 df ff d4 61 eb 43 84 a7 ab 07 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e9 0b 91 d5 9e 08 9f b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e9 | natd_hash: port=500 | natd_hash: hash= 81 41 06 fc 1a fe d8 83 97 86 d0 70 ff 7b d2 d5 | natd_hash: hash= e6 7e 21 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 41 06 fc 1a fe d8 83 97 86 d0 70 ff 7b d2 d5 | Notify data e6 7e 21 01 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e9 0b 91 d5 9e 08 9f b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | natd_hash: hash= df c2 f1 a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | Notify data df c2 f1 a5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #485 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #485: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #485 to 4294967295 after switching state | Message ID: IKE #485 skipping update_recv as MD is fake | Message ID: sent #485 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.233:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | state #485 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a801d688 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da8ea48 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f4990044548 size 128 | #485 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.362402 | resume sending helper answer for #485 suppresed complete_v2_state_transition() and stole MD | #485 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b0012388 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.365582; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #426 spent 0.0865 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.383823; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #472 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0763 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.389148; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | libevent_free: release ptr-libevent@0x7f497c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #364 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.393433; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | libevent_free: release ptr-libevent@0x7f4980038e68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #457 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.395802; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | libevent_free: release ptr-libevent@0x7f49a4043cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #478 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.422094; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f49a4043cd8 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #427 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.426425; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008569 exceeds limit? YES "road-eastnet-nonat-234" #234: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-234" #234: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #486 at 0x55564dad3988 | State DB: adding IKEv2 state #486 in UNDEFINED | pstats #486 ikev2.ike started | Message ID: init #486: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #486: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #486; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-234" #486: initiating v2 parent SA to replace #234 | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 486 for state #486 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f49a8017c18 size 128 | #486 spent 0.0829 milliseconds in ikev2_parent_outI1() | RESET processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 486 for state #486 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 486 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #234 ikev2.ike failed too-many-retransmits | pstats #234 ikev2.ike deleted too-many-retransmits | #234 spent 3.15 milliseconds in total | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-234" #234: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #234: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #234 "road-eastnet-nonat-234" #234: deleting IKE SA for connection 'road-eastnet-nonat-234' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-234' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-234 | State DB: deleting IKEv2 state #234 in PARENT_I1 | parent state #234: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 486 time elapsed 0.000859 seconds | (#486) spent 0.867 milliseconds in crypto helper computing work-order 486: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 486 for state #486 to event queue | scheduling resume sending helper answer for #486 | stop processing: state #234 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7f49a4043bd8 size 128 | libevent_free: release ptr-libevent@0x55564da9d1c8 | crypto helper 7 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | in statetime_stop() and could not find #234 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-234 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-234' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-234" | stop processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 486 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #486 | **emit ISAKMP Message: | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | ikev2 g^x 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | ikev2 g^x 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | ikev2 g^x f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | ikev2 g^x 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | ikev2 g^x 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | ikev2 g^x 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | ikev2 g^x 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | ikev2 g^x be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | ikev2 g^x fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | ikev2 g^x b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | ikev2 g^x e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | ikev2 g^x a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | ikev2 g^x 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | ikev2 g^x 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | ikev2 g^x 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 e0 d4 b1 4a | IKEv2 nonce ab 8c f9 bf 5f a7 37 a2 46 be b1 91 ad ac 7a 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 55 0e 3a 86 80 34 c4 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ea | natd_hash: port=500 | natd_hash: hash= 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 69 6b de b7 | natd_hash: hash= d6 44 b5 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 69 6b de b7 | Notify data d6 44 b5 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 55 0e 3a 86 80 34 c4 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | natd_hash: hash= 51 51 fa f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | Notify data 51 51 fa f1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #486 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #486: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #486 to 4294967295 after switching state | Message ID: IKE #486 skipping update_recv as MD is fake | Message ID: sent #486 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.234:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | state #486 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a8017c18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f49a00058b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f4984043c18 size 128 | #486 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.427914 | resume sending helper answer for #486 suppresed complete_v2_state_transition() and stole MD | #486 spent 0.357 milliseconds in resume sending helper answer | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a4043bd8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0797 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.44216; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f49a4043bd8 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | libevent_free: release ptr-libevent@0x7f49b401a508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #473 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.446453; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #365 spent 0.0981 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.455759; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | libevent_free: release ptr-libevent@0x7f4974038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #458 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.466082; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | libevent_free: release ptr-libevent@0x7f49a8043f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #479 spent 0.0954 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.481354; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f49a8043f28 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | libevent_free: release ptr-libevent@0x7f497c017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #428 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.490685; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008433 exceeds limit? YES "road-eastnet-nonat-235" #235: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-235" #235: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #487 at 0x55564dad5098 | State DB: adding IKEv2 state #487 in UNDEFINED | pstats #487 ikev2.ike started | Message ID: init #487: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #487: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #487; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-235" #487: initiating v2 parent SA to replace #235 | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 487 for state #487 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 | #487 spent 0.107 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | crypto helper 8 starting work-order 487 for state #487 | RESET processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 487 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #235 ikev2.ike failed too-many-retransmits | pstats #235 ikev2.ike deleted too-many-retransmits | #235 spent 2.34 milliseconds in total | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-235" #235: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #235: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #235 "road-eastnet-nonat-235" #235: deleting IKE SA for connection 'road-eastnet-nonat-235' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-235' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-235 | State DB: deleting IKEv2 state #235 in PARENT_I1 | parent state #235: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 487 time elapsed 0.000652 seconds | stop processing: state #235 from 192.1.2.23 (in delete_state() at state.c:1143) | (#487) spent 0.651 milliseconds in crypto helper computing work-order 487: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x55564daca298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | in statetime_stop() and could not find #235 | crypto helper 8 sending results from work-order 487 for state #487 to event queue | scheduling resume sending helper answer for #487 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49a8044028 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 8 waiting (nothing to do) Initiating connection road-eastnet-nonat-235 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-235' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-235" | stop processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:349) | spent 0.0838 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 487 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #487 | **emit ISAKMP Message: | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | ikev2 g^x c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | ikev2 g^x a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | ikev2 g^x 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | ikev2 g^x 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | ikev2 g^x 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | ikev2 g^x 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | ikev2 g^x 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | ikev2 g^x a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | ikev2 g^x f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | ikev2 g^x 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ikev2 g^x ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | ikev2 g^x 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | ikev2 g^x 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | ikev2 g^x 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | ikev2 g^x 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 88 3f 70 df | IKEv2 nonce 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 5c d0 cc ad | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 97 38 bc eb ce be 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 eb | natd_hash: port=500 | natd_hash: hash= eb bc c0 11 92 f1 7c ce 7a d4 ce 7e fa 41 f4 42 | natd_hash: hash= 19 90 92 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb bc c0 11 92 f1 7c ce 7a d4 ce 7e fa 41 f4 42 | Notify data 19 90 92 64 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= bb 97 38 bc eb ce be 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | natd_hash: hash= 2a 0c 8f df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | Notify data 2a 0c 8f df | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #487 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #487: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #487 to 4294967295 after switching state | Message ID: IKE #487 skipping update_recv as MD is fake | Message ID: sent #487 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.235:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | state #487 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c017c48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dadd028 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f4988044608 size 128 | #487 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.492077 | resume sending helper answer for #487 suppresed complete_v2_state_transition() and stole MD | #487 spent 0.385 milliseconds in resume sending helper answer | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a8044028 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.503264; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f49a8044028 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | libevent_free: release ptr-libevent@0x7f499c02de48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | #366 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.517599; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | libevent_free: release ptr-libevent@0x7f499401d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #459 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0922 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.53598; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000938 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f499401d668 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | libevent_free: release ptr-libevent@0x7f496c03e838 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #474 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.536117; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f496c03e838 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | libevent_free: release ptr-libevent@0x7f499c043e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #480 spent 0.0692 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.544393; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f499c043e58 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | libevent_free: release ptr-libevent@0x7f49800284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #429 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.553687; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006567 exceeds limit? YES "road-eastnet-nonat-236" #236: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-236" #236: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #488 at 0x55564dad67a8 | State DB: adding IKEv2 state #488 in UNDEFINED | pstats #488 ikev2.ike started | Message ID: init #488: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #488: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #488; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-236" #488: initiating v2 parent SA to replace #236 | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 488 for state #488 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f49800284c8 size 128 | #488 spent 0.098 milliseconds in ikev2_parent_outI1() | RESET processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #236 ikev2.ike failed too-many-retransmits | pstats #236 ikev2.ike deleted too-many-retransmits | #236 spent 2.1 milliseconds in total | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-236" #236: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #236: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #236 "road-eastnet-nonat-236" #236: deleting IKE SA for connection 'road-eastnet-nonat-236' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-236' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 9 resuming | in connection_discard for connection road-eastnet-nonat-236 | State DB: deleting IKEv2 state #236 in PARENT_I1 | crypto helper 9 starting work-order 488 for state #488 | parent state #236: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 488 | stop processing: state #236 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49ac0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | in statetime_stop() and could not find #236 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-236 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-236' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-236" | stop processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:349) | spent 0.0606 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 488 time elapsed 0.00054 seconds | (#488) spent 0.543 milliseconds in crypto helper computing work-order 488: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 488 for state #488 to event queue | scheduling resume sending helper answer for #488 | libevent_malloc: new ptr-libevent@0x7f499c043d58 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 488 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #488 | **emit ISAKMP Message: | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | ikev2 g^x e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | ikev2 g^x 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | ikev2 g^x c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | ikev2 g^x bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | ikev2 g^x 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | ikev2 g^x 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | ikev2 g^x 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | ikev2 g^x 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | ikev2 g^x 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | ikev2 g^x 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | ikev2 g^x 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | ikev2 g^x 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | ikev2 g^x 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | ikev2 g^x d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | ikev2 g^x 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 16 da 58 9f | IKEv2 nonce f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 c5 e0 92 84 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5e dd 0d 7a 41 6b da ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ec | natd_hash: port=500 | natd_hash: hash= fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a 29 8f c7 b6 | natd_hash: hash= 31 c3 8d 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a 29 8f c7 b6 | Notify data 31 c3 8d 8b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 5e dd 0d 7a 41 6b da ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | natd_hash: hash= 27 df 7d 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | Notify data 27 df 7d 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #488 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #488: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #488 to 4294967295 after switching state | Message ID: IKE #488 skipping update_recv as MD is fake | Message ID: sent #488 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.236:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | state #488 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800284c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f497c043e48 size 128 | #488 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.554865 | resume sending helper answer for #488 suppresed complete_v2_state_transition() and stole MD | #488 spent 0.362 milliseconds in resume sending helper answer | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499c043d58 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.563023; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f499c043d58 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | libevent_free: release ptr-libevent@0x7f49a00333f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #367 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.577314; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f49a00333f8 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | libevent_free: release ptr-libevent@0x7f498803e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #460 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.599609; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499702 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f498803e5d8 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | libevent_free: release ptr-libevent@0x7f49a0043d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #481 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.619901; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009189 exceeds limit? YES "road-eastnet-nonat-237" #237: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-237" #237: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #489 at 0x55564dad7f28 | State DB: adding IKEv2 state #489 in UNDEFINED | pstats #489 ikev2.ike started | Message ID: init #489: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #489: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #489; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-237" #489: initiating v2 parent SA to replace #237 | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 489 for state #489 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f49a0043d98 size 128 | #489 spent 0.0753 milliseconds in ikev2_parent_outI1() | RESET processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #237 ikev2.ike failed too-many-retransmits | pstats #237 ikev2.ike deleted too-many-retransmits | #237 spent 2.54 milliseconds in total | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-237" #237: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #237: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #237 "road-eastnet-nonat-237" #237: deleting IKE SA for connection 'road-eastnet-nonat-237' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-237' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-237 | State DB: deleting IKEv2 state #237 in PARENT_I1 | parent state #237: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 resuming | crypto helper 10 starting work-order 489 for state #489 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 489 | stop processing: state #237 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f499401d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | in statetime_stop() and could not find #237 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-237 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-237' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-237" | stop processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:349) | spent 0.0641 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 489 time elapsed 0.00052 seconds | (#489) spent 0.524 milliseconds in crypto helper computing work-order 489: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 489 for state #489 to event queue | scheduling resume sending helper answer for #489 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 489 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #489 | **emit ISAKMP Message: | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | ikev2 g^x 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | ikev2 g^x c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | ikev2 g^x 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | ikev2 g^x e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | ikev2 g^x a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | ikev2 g^x fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | ikev2 g^x 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | ikev2 g^x 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | ikev2 g^x a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | ikev2 g^x d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | ikev2 g^x 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | ikev2 g^x 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | ikev2 g^x 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | ikev2 g^x 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | ikev2 g^x 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f de dd e7 2b 33 09 16 de 76 0e 1f 62 7e 38 3e | IKEv2 nonce a7 07 6f 2e c4 a6 47 06 da e2 5a 7b 64 dc 20 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4d cc d5 00 b6 45 21 c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ed | natd_hash: port=500 | natd_hash: hash= 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f 28 f5 d6 dd | natd_hash: hash= 88 eb 93 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f 28 f5 d6 dd | Notify data 88 eb 93 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 4d cc d5 00 b6 45 21 c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | natd_hash: hash= 15 3f 09 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | Notify data 15 3f 09 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #489 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #489: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #489 to 4294967295 after switching state | Message ID: IKE #489 skipping update_recv as MD is fake | Message ID: sent #489 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.237:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | state #489 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a0043d98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f49800445f8 size 128 | #489 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.620998 | resume sending helper answer for #489 suppresed complete_v2_state_transition() and stole MD | #489 spent 0.354 milliseconds in resume sending helper answer | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49a0022ab8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.625149; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | libevent_free: release ptr-libevent@0x7f4994033678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #368 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.630453; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f4994033678 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #475 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.635746; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | libevent_free: release ptr-libevent@0x7f49a003e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #430 spent 0.0985 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.638986; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f49a003e5d8 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | libevent_free: release ptr-libevent@0x7f497c03e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #461 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.660243; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f497c03e5d8 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | libevent_free: release ptr-libevent@0x7f4994043fb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #482 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad8af8 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.683516; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008096 exceeds limit? YES "road-eastnet-nonat-238" #238: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-238" #238: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #490 at 0x55564dad96a8 | State DB: adding IKEv2 state #490 in UNDEFINED | pstats #490 ikev2.ike started | Message ID: init #490: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #490: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #490; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-238" #490: initiating v2 parent SA to replace #238 | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 490 for state #490 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f4994043fb8 size 128 | #490 spent 0.0794 milliseconds in ikev2_parent_outI1() | RESET processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #238 ikev2.ike failed too-many-retransmits | crypto helper 11 resuming | pstats #238 ikev2.ike deleted too-many-retransmits | crypto helper 11 starting work-order 490 for state #490 | #238 spent 2.38 milliseconds in total | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 490 | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-238" #238: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #238: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #238 "road-eastnet-nonat-238" #238: deleting IKE SA for connection 'road-eastnet-nonat-238' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-238' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-238 | State DB: deleting IKEv2 state #238 in PARENT_I1 | parent state #238: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #238 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4988017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad8af8 | in statetime_stop() and could not find #238 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-238 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 490 time elapsed 0.000583 seconds | (#490) spent 0.626 milliseconds in crypto helper computing work-order 490: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 490 for state #490 to event queue | scheduling resume sending helper answer for #490 | start processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-238' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | libevent_malloc: new ptr-libevent@0x7f4994038ed8 size 128 | crypto helper 11 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-238" | stop processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:349) | spent 0.0991 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.684391; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f4974043e48 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | libevent_free: release ptr-libevent@0x7f4998033558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #369 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 490 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #490 | **emit ISAKMP Message: | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | ikev2 g^x 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | ikev2 g^x 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | ikev2 g^x 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | ikev2 g^x 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | ikev2 g^x d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | ikev2 g^x 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | ikev2 g^x cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | ikev2 g^x 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | ikev2 g^x d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | ikev2 g^x d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | ikev2 g^x b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | ikev2 g^x 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | ikev2 g^x 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | ikev2 g^x 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ikev2 g^x ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 02 d4 5b 03 | IKEv2 nonce 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 89 68 47 96 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 38 99 c7 81 b9 d2 d1 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ee | natd_hash: port=500 | natd_hash: hash= 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 f4 6f 78 7d | natd_hash: hash= f7 11 02 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 f4 6f 78 7d | Notify data f7 11 02 f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 38 99 c7 81 b9 d2 d1 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | natd_hash: hash= 04 22 74 eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | Notify data 04 22 74 eb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #490 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #490: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #490 to 4294967295 after switching state | Message ID: IKE #490 skipping update_recv as MD is fake | Message ID: sent #490 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.238:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | state #490 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4994043fb8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daaba28 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f4998033558 size 128 | #490 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.684991 | resume sending helper answer for #490 suppresed complete_v2_state_transition() and stole MD | #490 spent 0.396 milliseconds in resume sending helper answer | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4994038ed8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0518 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.697203; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f4994038ed8 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | libevent_free: release ptr-libevent@0x7f498003e5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #462 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.723542; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f498003e5c8 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #431 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.727944; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #476 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.731227; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | libevent_free: release ptr-libevent@0x7f4998043d28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #483 spent 0.0941 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada278 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.743543; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006222 exceeds limit? YES "road-eastnet-nonat-239" #239: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-239" #239: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #491 at 0x55564dadae28 | State DB: adding IKEv2 state #491 in UNDEFINED | pstats #491 ikev2.ike started | Message ID: init #491: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #491: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #491; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-239" #491: initiating v2 parent SA to replace #239 | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 491 for state #491 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8408 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f4998043d28 size 128 | crypto helper 12 resuming | #491 spent 0.108 milliseconds in ikev2_parent_outI1() | crypto helper 12 starting work-order 491 for state #491 | RESET processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 491 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #239 ikev2.ike failed too-many-retransmits | pstats #239 ikev2.ike deleted too-many-retransmits | #239 spent 3.06 milliseconds in total | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-239" #239: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #239: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #239 "road-eastnet-nonat-239" #239: deleting IKE SA for connection 'road-eastnet-nonat-239' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-239' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-239 | State DB: deleting IKEv2 state #239 in PARENT_I1 | parent state #239: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #239 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 491 time elapsed 0.000671 seconds | libevent_free: release ptr-libevent@0x7f497c043c48 | (#491) spent 0.676 milliseconds in crypto helper computing work-order 491: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada278 | in statetime_stop() and could not find #239 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 12 sending results from work-order 491 for state #491 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #491 Initiating connection road-eastnet-nonat-239 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7f4998043c28 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-239' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-239" | stop processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:349) | spent 0.102 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 491 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #491 | **emit ISAKMP Message: | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | ikev2 g^x 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | ikev2 g^x db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | ikev2 g^x 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | ikev2 g^x 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | ikev2 g^x 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | ikev2 g^x e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | ikev2 g^x 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | ikev2 g^x 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | ikev2 g^x fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | ikev2 g^x fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | ikev2 g^x 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | ikev2 g^x 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | ikev2 g^x e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | ikev2 g^x 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | ikev2 g^x 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 80 f2 2d f7 19 64 29 91 76 39 f9 08 f4 39 ae ee | IKEv2 nonce 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 72 36 80 d4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 71 ec 75 d4 55 ad 0d 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ef | natd_hash: port=500 | natd_hash: hash= c0 3b a7 72 3e 2c fe 72 31 a4 4a db d0 c3 f1 1b | natd_hash: hash= 7b 68 2a 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 3b a7 72 3e 2c fe 72 31 a4 4a db d0 c3 f1 1b | Notify data 7b 68 2a 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 71 ec 75 d4 55 ad 0d 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | natd_hash: hash= 8b 97 eb 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | Notify data 8b 97 eb 1b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #491 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #491: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #491 to 4294967295 after switching state | Message ID: IKE #491 skipping update_recv as MD is fake | Message ID: sent #491 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.239:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | state #491 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998043d28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9c8408 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f4978043db8 size 128 | #491 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.744951 | resume sending helper answer for #491 suppresed complete_v2_state_transition() and stole MD | #491 spent 0.395 milliseconds in resume sending helper answer | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4998043c28 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.754133; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003688 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada278 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f4998043c28 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #463 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.768474; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | libevent_free: release ptr-libevent@0x7f498c033448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #370 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00335 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.798913; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | libevent_free: release ptr-libevent@0x7f498c043d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #484 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadb918 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.805209; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006291 exceeds limit? YES "road-eastnet-nonat-240" #240: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-240" #240: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #492 at 0x55564dadc538 | State DB: adding IKEv2 state #492 in UNDEFINED | pstats #492 ikev2.ike started | Message ID: init #492: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #492: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #492; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-240" #492: initiating v2 parent SA to replace #240 | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 492 for state #492 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f498c043d98 size 128 | #492 spent 0.079 milliseconds in ikev2_parent_outI1() | RESET processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | crypto helper 13 starting work-order 492 for state #492 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 492 | pstats #240 ikev2.ike failed too-many-retransmits | pstats #240 ikev2.ike deleted too-many-retransmits | #240 spent 2.36 milliseconds in total | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-240" #240: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #240: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #240 "road-eastnet-nonat-240" #240: deleting IKE SA for connection 'road-eastnet-nonat-240' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-240' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-240 | State DB: deleting IKEv2 state #240 in PARENT_I1 | parent state #240: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 492 time elapsed 0.000881 seconds | (#492) spent 0.881 milliseconds in crypto helper computing work-order 492: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 492 for state #492 to event queue | scheduling resume sending helper answer for #492 | libevent_malloc: new ptr-libevent@0x7f498c043e98 size 128 | crypto helper 13 waiting (nothing to do) | stop processing: state #240 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dabfec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadb918 | in statetime_stop() and could not find #240 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-240 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-240' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-240" | stop processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:349) | spent 0.0624 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 492 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #492 | **emit ISAKMP Message: | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | ikev2 g^x 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | ikev2 g^x 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | ikev2 g^x 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | ikev2 g^x a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | ikev2 g^x e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | ikev2 g^x 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | ikev2 g^x 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | ikev2 g^x 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | ikev2 g^x 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | ikev2 g^x 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | ikev2 g^x 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | ikev2 g^x c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | ikev2 g^x d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | ikev2 g^x 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | ikev2 g^x 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 f9 e7 bf 6c db 58 6c 14 64 92 6f 6a 94 04 eb | IKEv2 nonce ab 72 37 9a 17 bf fc 97 52 9a 5f 7d 46 eb 72 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8d 50 51 d3 05 9e f9 53 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f0 | natd_hash: port=500 | natd_hash: hash= 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 f5 5e af 29 | natd_hash: hash= f0 8c 08 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 f5 5e af 29 | Notify data f0 8c 08 bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 8d 50 51 d3 05 9e f9 53 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | natd_hash: hash= db a9 58 9a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | Notify data db a9 58 9a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #492 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #492: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #492 to 4294967295 after switching state | Message ID: IKE #492 skipping update_recv as MD is fake | Message ID: sent #492 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.240:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | state #492 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c043d98 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da53478 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f496c043ef8 size 128 | #492 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.806779 | resume sending helper answer for #492 suppresed complete_v2_state_transition() and stole MD | #492 spent 0.403 milliseconds in resume sending helper answer | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f498c043e98 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.808948; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadb918 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f498c043e98 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #432 spent 0.0933 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.822202; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | libevent_free: release ptr-libevent@0x7f49b0033438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #477 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada198 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.8265; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f49b0033438 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | libevent_free: release ptr-libevent@0x7f4994022ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada198 | #371 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.836842; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003954 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f4994022ed8 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | libevent_free: release ptr-libevent@0x7f4990028328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #464 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.863175; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500773 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | libevent_free: release ptr-libevent@0x7f4990044548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #485 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0716 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.871523; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002108 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f4990044548 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #433 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.871671; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006626 exceeds limit? YES "road-eastnet-nonat-241" #241: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-241" #241: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #493 at 0x55564daddc48 | State DB: adding IKEv2 state #493 in UNDEFINED | pstats #493 ikev2.ike started | Message ID: init #493: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #493: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #493; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-241" #493: initiating v2 parent SA to replace #241 | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 493 for state #493 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da20978 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | #493 spent 0.12 milliseconds in ikev2_parent_outI1() | RESET processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 14 resuming | pstats #241 ikev2.ike failed too-many-retransmits | pstats #241 ikev2.ike deleted too-many-retransmits | #241 spent 2.53 milliseconds in total | crypto helper 14 starting work-order 493 for state #493 | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-241" #241: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #241: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #241 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 493 "road-eastnet-nonat-241" #241: deleting IKE SA for connection 'road-eastnet-nonat-241' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-241' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-241 | State DB: deleting IKEv2 state #241 in PARENT_I1 | parent state #241: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #241 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 493 time elapsed 0.000544 seconds | libevent_free: release ptr-libevent@0x55564da37d98 | (#493) spent 0.546 milliseconds in crypto helper computing work-order 493: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | crypto helper 14 sending results from work-order 493 for state #493 to event queue | scheduling resume sending helper answer for #493 | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 | crypto helper 14 waiting (nothing to do) | in statetime_stop() and could not find #241 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 56 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-241 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-241' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-241" | stop processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:349) | spent 0.0754 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 493 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #493 | **emit ISAKMP Message: | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | ikev2 g^x 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | ikev2 g^x 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ikev2 g^x ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | ikev2 g^x 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | ikev2 g^x 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | ikev2 g^x e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | ikev2 g^x 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | ikev2 g^x 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | ikev2 g^x b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | ikev2 g^x 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | ikev2 g^x c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | ikev2 g^x d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | ikev2 g^x 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | ikev2 g^x 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | ikev2 g^x 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a 49 a4 f8 e5 | IKEv2 nonce f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd 88 a9 b3 8a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 c1 0e 6e a5 b1 01 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f1 | natd_hash: port=500 | natd_hash: hash= 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 62 6f 96 2c | natd_hash: hash= 30 9b 35 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 62 6f 96 2c | Notify data 30 9b 35 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 43 c1 0e 6e a5 b1 01 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | natd_hash: hash= e8 0f 34 78 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | Notify data e8 0f 34 78 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #493 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #493: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #493 to 4294967295 after switching state | Message ID: IKE #493 skipping update_recv as MD is fake | Message ID: sent #493 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.241:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | 29 00 00 24 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a | 49 a4 f8 e5 f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd | 88 a9 b3 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 | 62 6f 96 2c 30 9b 35 42 00 00 00 1c 00 00 40 05 | e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | e8 0f 34 78 | state #493 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da20978 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f49bc046848 size 128 | #493 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.873127 | resume sending helper answer for #493 suppresed complete_v2_state_transition() and stole MD | #493 spent 0.514 milliseconds in resume sending helper answer | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f499002dd88 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.891344; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | libevent_free: release ptr-libevent@0x7f49900333f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #372 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.896629; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f49900333f8 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | libevent_free: release ptr-libevent@0x7f4980038e68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #478 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.928884; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | libevent_free: release ptr-libevent@0x7f4984043c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #486 spent 0.0971 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10655.931201; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f4984043c18 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | libevent_free: release ptr-libevent@0x7f49a0038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #465 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.933456; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f49a0038d68 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | libevent_free: release ptr-libevent@0x7f49b003e368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #434 spent 0.0902 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.936695; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009901 exceeds limit? YES "road-eastnet-nonat-242" #242: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-242" #242: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #494 at 0x55564dadf358 | State DB: adding IKEv2 state #494 in UNDEFINED | pstats #494 ikev2.ike started | Message ID: init #494: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #494: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #494; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-242" #494: initiating v2 parent SA to replace #242 | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 494 for state #494 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da41e38 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f49b003e368 size 128 | #494 spent 0.106 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | RESET processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 494 for state #494 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #242 ikev2.ike failed too-many-retransmits | pstats #242 ikev2.ike deleted too-many-retransmits | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 494 | #242 spent 2.16 milliseconds in total | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-242" #242: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #242: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #242 "road-eastnet-nonat-242" #242: deleting IKE SA for connection 'road-eastnet-nonat-242' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-242' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-242 | State DB: deleting IKEv2 state #242 in PARENT_I1 | parent state #242: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #242 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d986f58 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 494 time elapsed 0.000554 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | (#494) spent 0.566 milliseconds in crypto helper computing work-order 494: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 494 for state #494 to event queue | scheduling resume sending helper answer for #494 | libevent_malloc: new ptr-libevent@0x7f4984043d18 size 128 | in statetime_stop() and could not find #242 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 15 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-242 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-242' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-242" | stop processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:349) | spent 0.0844 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 494 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #494 | **emit ISAKMP Message: | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | ikev2 g^x 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | ikev2 g^x 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | ikev2 g^x 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | ikev2 g^x f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | ikev2 g^x 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | ikev2 g^x 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | ikev2 g^x 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | ikev2 g^x 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | ikev2 g^x cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | ikev2 g^x 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | ikev2 g^x 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | ikev2 g^x 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | ikev2 g^x 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | ikev2 g^x 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | ikev2 g^x 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 a7 b9 77 10 76 d3 84 87 df 4c ec eb ae fa 7e | IKEv2 nonce 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c e5 88 d7 37 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= de 11 fe 27 7e af ba 75 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f2 | natd_hash: port=500 | natd_hash: hash= 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 53 de b9 65 | natd_hash: hash= f0 23 59 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 53 de b9 65 | Notify data f0 23 59 01 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= de 11 fe 27 7e af ba 75 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | natd_hash: hash= 60 31 b3 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | Notify data 60 31 b3 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #494 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #494: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #494 to 4294967295 after switching state | Message ID: IKE #494 skipping update_recv as MD is fake | Message ID: sent #494 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.242:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | 29 00 00 24 e3 a7 b9 77 10 76 d3 84 87 df 4c ec | eb ae fa 7e 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c | e5 88 d7 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 | 53 de b9 65 f0 23 59 01 00 00 00 1c 00 00 40 05 | c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | 60 31 b3 7b | state #494 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b003e368 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da41e38 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f49b4046758 size 128 | #494 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.938014 | resume sending helper answer for #494 suppresed complete_v2_state_transition() and stole MD | #494 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4984043d18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10655.944175; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f4984043d18 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | libevent_free: release ptr-libevent@0x7f4984033488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | #373 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10655.967465; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f4984033488 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | libevent_free: release ptr-libevent@0x7f4974038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #479 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0494 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10655.987791; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #435 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dadd028 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10655.992144; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | libevent_free: release ptr-libevent@0x7f4988044608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadd028 | #487 spent 0.0927 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10655.993409; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005789 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadd028 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #253 | libevent_malloc: new ptr-libevent@0x7f4988044608 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 5a 20 74 9d bf 88 79 17 30 93 36 43 7d 95 cf | 58 ff ba 80 86 a6 a4 e2 aa f3 04 de 00 c2 d5 4e | 0a 35 98 d9 41 ed 55 a3 08 fa 13 75 ce e5 12 e5 | fc 95 06 f8 78 9b ef 99 bf bd 4e 7f 8b 24 1c b2 | 48 5a 9c d2 ac bd cc 6a 3b 31 b7 e8 ca 28 c8 9f | 50 a9 60 af e6 91 dd 31 a0 be f9 e5 b7 05 66 8f | 2f 02 50 89 98 be 73 b4 2a 82 6d af 4f 0f 38 92 | 3a 61 f8 23 09 4f 55 df 41 27 e4 f9 dc eb a4 49 | 80 0c e8 f1 4b 4a a5 ba 12 6e 4d 08 b9 4e 6a 7b | c6 8d db 2c 90 20 59 de 6b f9 9e e3 f8 f2 f2 ad | 53 3a 37 5a 0a 68 61 2c 36 a5 54 10 51 52 df b3 | ec 43 d3 69 43 7a 0a b5 ba 12 d4 ed 84 a7 ef 43 | f8 eb 65 27 90 2a 83 f7 ee f5 bb a0 b3 f3 88 4a | 83 ce 4e bb 51 e3 a7 93 9b 43 25 8c 18 d0 5b 43 | ee a4 23 44 6d b7 00 96 9c 62 f3 d9 20 c7 5b 55 | 63 06 86 8b fb 1e 9c 5f 7a 17 60 85 62 59 14 02 | 29 00 00 24 a5 42 5e f7 c6 5b 07 5b bf 71 ec f1 | e8 07 ac f0 6e c9 ee 8d 01 3e f4 96 79 14 dd d4 | 7a 4f 29 e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da dd bd 77 c5 6b 31 65 18 90 fc b8 | 37 4c f9 9d 83 6a fa fe 00 00 00 1c 00 00 40 05 | 89 2e e6 9c 70 a3 48 a2 e5 8c 67 19 26 72 2a 7e | b2 85 55 b5 | libevent_free: release ptr-libevent@0x7f49a001d4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #253 spent 0.087 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 10 73 8d c2 b0 5b eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | d3 10 73 8d c2 b0 5b eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10655.997636; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008031 exceeds limit? YES "road-eastnet-nonat-243" #243: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-243" #243: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #495 at 0x55564dae0a68 | State DB: adding IKEv2 state #495 in UNDEFINED | pstats #495 ikev2.ike started | Message ID: init #495: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #495: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #495; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-243" #495: initiating v2 parent SA to replace #243 | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 495 for state #495 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f49a001d4f8 size 128 | #495 spent 0.105 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | RESET processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 495 for state #495 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 495 | pstats #243 ikev2.ike failed too-many-retransmits | pstats #243 ikev2.ike deleted too-many-retransmits | #243 spent 3.15 milliseconds in total | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-243" #243: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #243: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #243 "road-eastnet-nonat-243" #243: deleting IKE SA for connection 'road-eastnet-nonat-243' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-243' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-243 | State DB: deleting IKEv2 state #243 in PARENT_I1 | parent state #243: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #243 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dab2ec8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | in statetime_stop() and could not find #243 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 495 time elapsed 0.001005 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#495) spent 1 milliseconds in crypto helper computing work-order 495: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 495 for state #495 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #495 Initiating connection road-eastnet-nonat-243 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f4988044f18 size 128 | crypto helper 16 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-243' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-243" | stop processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:349) | spent 0.0735 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 495 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #495 | **emit ISAKMP Message: | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | ikev2 g^x c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | ikev2 g^x 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | ikev2 g^x 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | ikev2 g^x 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | ikev2 g^x fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ikev2 g^x ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | ikev2 g^x 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | ikev2 g^x 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | ikev2 g^x d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | ikev2 g^x 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | ikev2 g^x 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | ikev2 g^x 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | ikev2 g^x e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | ikev2 g^x 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | ikev2 g^x fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 46 9e a2 d2 02 ad 06 61 c4 c1 de 0f 9e 45 25 | IKEv2 nonce 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 95 ce 52 e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ce 78 23 a3 15 b1 37 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f3 | natd_hash: port=500 | natd_hash: hash= 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 29 e9 4b b6 | natd_hash: hash= 9e 67 fa 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 29 e9 4b b6 | Notify data 9e 67 fa 0c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= ce 78 23 a3 15 b1 37 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | natd_hash: hash= 81 9a 48 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | Notify data 81 9a 48 25 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #495 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #495: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #495 to 4294967295 after switching state | Message ID: IKE #495 skipping update_recv as MD is fake | Message ID: sent #495 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.243:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | 29 00 00 24 23 46 9e a2 d2 02 ad 06 61 c4 c1 de | 0f 9e 45 25 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 | 95 ce 52 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 | 29 e9 4b b6 9e 67 fa 0c 00 00 00 1c 00 00 40 05 | 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | 81 9a 48 25 | state #495 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a001d4f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da59018 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f49b80471b8 size 128 | #495 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10655.999377 | resume sending helper answer for #495 suppresed complete_v2_state_transition() and stole MD | #495 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4988044f18 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.006574; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f4988044f18 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | libevent_free: release ptr-libevent@0x7f4988033608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #374 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.020892; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f4988033608 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #466 spent 0.097 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.037156; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | libevent_free: release ptr-libevent@0x7f496c03e838 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #480 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.046471; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f496c03e838 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | libevent_free: release ptr-libevent@0x7f4984022d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #436 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.055788; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | libevent_free: release ptr-libevent@0x7f497c043e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #488 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.062075; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007702 exceeds limit? YES "road-eastnet-nonat-244" #244: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-244" #244: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #496 at 0x55564dae20c8 | State DB: adding IKEv2 state #496 in UNDEFINED | pstats #496 ikev2.ike started | Message ID: init #496: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #496: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #496; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-244" #496: initiating v2 parent SA to replace #244 | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 496 for state #496 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f497c043e48 size 128 | #496 spent 0.082 milliseconds in ikev2_parent_outI1() | RESET processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 496 for state #496 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #244 ikev2.ike failed too-many-retransmits | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 496 | pstats #244 ikev2.ike deleted too-many-retransmits | #244 spent 2.26 milliseconds in total | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-244" #244: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #244: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #244 "road-eastnet-nonat-244" #244: deleting IKE SA for connection 'road-eastnet-nonat-244' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-244' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-244 | State DB: deleting IKEv2 state #244 in PARENT_I1 | parent state #244: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 496 time elapsed 0.000977 seconds | (#496) spent 0.981 milliseconds in crypto helper computing work-order 496: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 496 for state #496 to event queue | scheduling resume sending helper answer for #496 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #244 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564d991478 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | in statetime_stop() and could not find #244 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-244 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-244' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-244" | stop processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 496 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #496 | **emit ISAKMP Message: | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | ikev2 g^x 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | ikev2 g^x 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | ikev2 g^x f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | ikev2 g^x 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | ikev2 g^x a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ikev2 g^x ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | ikev2 g^x 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | ikev2 g^x 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | ikev2 g^x 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | ikev2 g^x a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | ikev2 g^x 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | ikev2 g^x 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | ikev2 g^x a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | ikev2 g^x 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | ikev2 g^x fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 8e 41 9a 8c | IKEv2 nonce 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 0d f1 36 72 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e8 90 29 fb f9 3e 72 aa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f4 | natd_hash: port=500 | natd_hash: hash= ba d6 cc d8 42 54 a7 fe 61 5b ca f1 36 92 a6 77 | natd_hash: hash= db 6f 08 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba d6 cc d8 42 54 a7 fe 61 5b ca f1 36 92 a6 77 | Notify data db 6f 08 a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= e8 90 29 fb f9 3e 72 aa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | natd_hash: hash= 92 7e bf ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | Notify data 92 7e bf ac | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #496 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #496: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #496 to 4294967295 after switching state | Message ID: IKE #496 skipping update_recv as MD is fake | Message ID: sent #496 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.244:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | 29 00 00 24 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 | 8e 41 9a 8c 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 | 0d f1 36 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba d6 cc d8 42 54 a7 fe 61 5b ca f1 | 36 92 a6 77 db 6f 08 a3 00 00 00 1c 00 00 40 05 | d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | 92 7e bf ac | state #496 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497c043e48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f49ac049558 size 128 | #496 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.063605 | resume sending helper answer for #496 suppresed complete_v2_state_transition() and stole MD | #496 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f497c017c48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.069804; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #375 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.076053; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #467 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.100328; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | libevent_free: release ptr-libevent@0x7f498803e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #481 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab3c8 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.104615; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f498803e5d8 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | libevent_free: release ptr-libevent@0x7f499c03e698 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | #437 spent 0.0917 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.113957; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab3c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #254 | libevent_malloc: new ptr-libevent@0x7f499c03e698 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b e8 99 f5 12 96 f2 6b b7 fb 60 db a7 09 c8 2a | a4 40 3e 4d 3d 92 89 bf 6e c3 85 64 cf 4a 9e 30 | f2 bb 5c 5f 98 1a 11 e4 42 5a ea 8b a9 ff e1 ca | 68 40 39 0d 73 4c 49 8f 08 0f cf cb c5 fb 84 3a | 5f ec e1 ee 91 44 09 2a a7 63 cb 3f 70 cb a3 92 | d1 b0 f3 8c d8 9a a4 84 99 0f ca a2 a2 ee db f2 | 66 85 c1 0c ea b7 81 98 f9 80 0a bc 67 43 e5 75 | 33 20 da c2 70 ec 67 c3 0e c5 02 6d f2 1e 45 77 | d5 cb ad f3 14 e8 03 5d 8a b2 cf d9 29 14 21 65 | 59 c3 23 f0 71 2d 6b f5 b0 e4 c8 2f 4c 09 2c 9e | 97 14 09 ba b9 45 ff 2a bb 17 99 9e fb d3 a9 56 | ee 43 40 45 75 24 03 0a 11 19 f7 34 6e f9 d7 03 | fe 6a 42 73 1f c4 21 4c 37 94 7a 44 76 18 55 b2 | 58 4c 9e 43 39 05 0d 14 e2 8c f7 c2 c5 5d e9 0d | f4 0a d6 da 7b 56 69 d7 11 77 ec 55 93 3d b6 97 | c5 1a e7 2c 1b 9f 24 1e 49 2c c0 07 23 80 c4 43 | 29 00 00 24 d4 42 99 42 06 69 a3 05 c0 fa ef 33 | 7c 49 2c 5b d5 52 b2 60 63 21 13 77 12 b6 64 c7 | 08 fa fb b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 d6 f1 bc a2 42 4d 46 2a 7c 54 98 | a9 68 32 7c a0 13 65 e7 00 00 00 1c 00 00 40 05 | 2b 30 18 85 3f 15 5b fc 3c 59 f1 93 f8 4a 45 07 | 15 a9 66 5d | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #254 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 3e 0c 64 12 56 91 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | 67 3e 0c 64 12 56 91 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.121336; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500338 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | libevent_free: release ptr-libevent@0x7f49800445f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #489 spent 0.0856 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae2c98 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.127551; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006674 exceeds limit? YES "road-eastnet-nonat-245" #245: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-245" #245: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #497 at 0x55564dae3848 | State DB: adding IKEv2 state #497 in UNDEFINED | pstats #497 ikev2.ike started | Message ID: init #497: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #497: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #497; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-245" #497: initiating v2 parent SA to replace #245 | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 497 for state #497 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f49800445f8 size 128 | #497 spent 0.0766 milliseconds in ikev2_parent_outI1() | RESET processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #245 ikev2.ike failed too-many-retransmits | pstats #245 ikev2.ike deleted too-many-retransmits | #245 spent 2.74 milliseconds in total | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-245" #245: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #245: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #245 "road-eastnet-nonat-245" #245: deleting IKE SA for connection 'road-eastnet-nonat-245' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-245' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 3 resuming | in connection_discard for connection road-eastnet-nonat-245 | State DB: deleting IKEv2 state #245 in PARENT_I1 | crypto helper 3 starting work-order 497 for state #497 | parent state #245: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 497 | stop processing: state #245 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f49b40465a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae2c98 | in statetime_stop() and could not find #245 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-245 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-245' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-245" | stop processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:349) | spent 0.0762 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 497 time elapsed 0.000603 seconds | (#497) spent 0.601 milliseconds in crypto helper computing work-order 497: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 497 for state #497 to event queue | scheduling resume sending helper answer for #497 | libevent_malloc: new ptr-libevent@0x7f4980044f08 size 128 | crypto helper 3 waiting (nothing to do) | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.128347; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae2c98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f49b0049538 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #376 spent 0.0754 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 497 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #497 | **emit ISAKMP Message: | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | ikev2 g^x 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | ikev2 g^x 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | ikev2 g^x 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | ikev2 g^x 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | ikev2 g^x 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | ikev2 g^x da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ikev2 g^x ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | ikev2 g^x d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | ikev2 g^x 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | ikev2 g^x 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | ikev2 g^x 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | ikev2 g^x 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | ikev2 g^x 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | ikev2 g^x 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | ikev2 g^x 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 f6 5c 32 38 | IKEv2 nonce 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e b9 af 03 e1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cc aa 94 47 e5 64 b5 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f5 | natd_hash: port=500 | natd_hash: hash= b2 3b c4 a0 4e eb 77 67 fc cf 56 aa bb 93 30 1b | natd_hash: hash= a3 4a 6f 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 3b c4 a0 4e eb 77 67 fc cf 56 aa bb 93 30 1b | Notify data a3 4a 6f 76 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= cc aa 94 47 e5 64 b5 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | natd_hash: hash= cf 50 46 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | Notify data cf 50 46 7e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #497 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #497: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #497 to 4294967295 after switching state | Message ID: IKE #497 skipping update_recv as MD is fake | Message ID: sent #497 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.245:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | 29 00 00 24 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 | f6 5c 32 38 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e | b9 af 03 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 3b c4 a0 4e eb 77 67 fc cf 56 aa | bb 93 30 1b a3 4a 6f 76 00 00 00 1c 00 00 40 05 | fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | cf 50 46 7e | state #497 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49800445f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da649b8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 | #497 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.12874 | resume sending helper answer for #497 suppresed complete_v2_state_transition() and stole MD | #497 spent 0.298 milliseconds in resume sending helper answer | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4980044f08 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.140932; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002998 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f4980044f08 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | libevent_free: release ptr-libevent@0x7f49b8041948 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #468 spent 0.0839 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.161158; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f49b8041948 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | libevent_free: release ptr-libevent@0x7f497c03e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #482 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab358 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.178558; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f497c03e5d8 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | libevent_free: release ptr-libevent@0x7f49a802df28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab358 | #438 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.17873; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab358 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #255 | libevent_malloc: new ptr-libevent@0x7f49a802df28 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b c1 61 93 24 09 ee 2f ad e6 71 67 44 28 38 fb | bb c9 88 6e 24 94 b8 0d 9e 96 5c a7 34 9c a4 e7 | 27 1c 01 e2 24 ef e5 0e 56 f9 ec 5f 58 40 a9 63 | 8e 79 03 40 f3 36 4b db 20 03 96 d8 6c 4b d8 d7 | 20 a1 f7 7b dd f0 4e 85 14 2f 6d 45 f6 56 e9 2e | a7 44 a0 24 45 40 07 c2 94 87 7f db 92 54 ee 12 | 84 23 5e 25 40 06 ea 61 64 85 af 39 dd 76 55 09 | 16 f5 1a 91 3c 6a 2f 00 49 9d ba 8b 19 8e da 33 | 09 8b cc da ff 38 96 bf 5b 8e 47 df dd 89 83 40 | 49 a5 4f 22 88 86 2a 29 2b c4 ca 6a 40 0b e8 64 | 58 72 f8 00 dd 4f f8 6a cb 71 ba 95 b0 8e 4e a5 | 86 bf 9a 37 95 64 63 d6 05 f4 66 33 fb 5f 05 a2 | 45 36 27 cf 01 33 cc 53 ef b3 6f 07 75 40 87 2a | 5e 69 5d 81 34 c9 0e ef f5 ec 5e c4 0f 44 18 33 | ec 6d 77 c2 2b 3a 98 2d 48 b3 17 5e 22 d6 dc e2 | 4e b9 3d db c5 79 15 f0 b0 49 32 bc e4 c4 78 6a | 29 00 00 24 c7 fe 65 6b 8f 30 d9 43 7e 7e f8 f9 | fe cf 12 0f c6 89 63 53 55 66 6b 21 6e 20 f9 45 | 0c 95 cc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7d 52 54 fe 5c 3a d6 dd b9 ba 8c | a5 eb 91 30 fe 49 be 77 00 00 00 1c 00 00 40 05 | eb 49 84 d8 6b 49 2d 7e 1d 8f 18 41 57 27 6e 04 | e3 64 fc 24 | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #255 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 6a f2 a5 e4 93 d7 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | 5c 6a f2 a5 e4 93 d7 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0497 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.185061; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | libevent_free: release ptr-libevent@0x7f4998033558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #490 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.191387; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f4998033558 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | libevent_free: release ptr-libevent@0x7f498c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #377 spent 0.22 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.107 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.195864; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009539 exceeds limit? YES "road-eastnet-nonat-246" #246: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-246" #246: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #498 at 0x55564dae4fc8 | State DB: adding IKEv2 state #498 in UNDEFINED | pstats #498 ikev2.ike started | Message ID: init #498: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #498: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #498; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-246" #498: initiating v2 parent SA to replace #246 | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 498 for state #498 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dab8a98 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f498c01d5b8 size 128 | #498 spent 0.198 milliseconds in ikev2_parent_outI1() | RESET processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #246 ikev2.ike failed too-many-retransmits | pstats #246 ikev2.ike deleted too-many-retransmits | #246 spent 2.58 milliseconds in total | crypto helper 17 resuming | crypto helper 17 starting work-order 498 for state #498 | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-246" #246: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 498 | parent state #246: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #246 "road-eastnet-nonat-246" #246: deleting IKE SA for connection 'road-eastnet-nonat-246' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-246' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-246 | State DB: deleting IKEv2 state #246 in PARENT_I1 | parent state #246: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 498 time elapsed 0.00141 seconds | stop processing: state #246 from 192.1.2.23 (in delete_state() at state.c:1143) | (#498) spent 1.43 milliseconds in crypto helper computing work-order 498: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7f49b001d368 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | in statetime_stop() and could not find #246 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 sending results from work-order 498 for state #498 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #498 Initiating connection road-eastnet-nonat-246 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7f4974043f48 size 128 | crypto helper 17 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-246' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-246" | stop processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:349) | spent 0.117 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 498 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #498 | **emit ISAKMP Message: | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | ikev2 g^x 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ikev2 g^x ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | ikev2 g^x 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | ikev2 g^x 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | ikev2 g^x 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | ikev2 g^x 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | ikev2 g^x 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | ikev2 g^x 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | ikev2 g^x 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | ikev2 g^x 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | ikev2 g^x de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | ikev2 g^x 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ikev2 g^x ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | ikev2 g^x eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | ikev2 g^x d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 9e f4 16 12 f8 89 df 66 51 be 2a 1b ac 38 dd | IKEv2 nonce 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 71 30 8c a1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a5 92 cb 5e a7 23 a8 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f6 | natd_hash: port=500 | natd_hash: hash= e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 fa 1e 4e 52 | natd_hash: hash= 6e 6a 7f 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 fa 1e 4e 52 | Notify data 6e 6a 7f 5c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a5 92 cb 5e a7 23 a8 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | natd_hash: hash= 94 aa f7 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | Notify data 94 aa f7 cb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #498 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #498: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #498 to 4294967295 after switching state | Message ID: IKE #498 skipping update_recv as MD is fake | Message ID: sent #498 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.246:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | 29 00 00 24 56 9e f4 16 12 f8 89 df 66 51 be 2a | 1b ac 38 dd 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 | 71 30 8c a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 | fa 1e 4e 52 6e 6a 7f 5c 00 00 00 1c 00 00 40 05 | a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | 94 aa f7 cb | state #498 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f498c01d5b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dab8a98 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f49a4049498 size 128 | #498 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.198474 | resume sending helper answer for #498 suppresed complete_v2_state_transition() and stole MD | #498 spent 0.633 milliseconds in resume sending helper answer | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4974043f48 | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.19854; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f4974043f48 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | libevent_free: release ptr-libevent@0x7f4998028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #469 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0895 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0737 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a2698 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.233042; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | libevent_free: release ptr-libevent@0x7f4974017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a2698 | #483 spent 0.352 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.233474; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006796 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a2698 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #256 | libevent_malloc: new ptr-libevent@0x7f4974017df8 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 de 1b 91 a4 66 4f 0a 4a 2e d6 60 c0 56 56 fb | f4 7a e0 2d 9e 36 89 b9 5d 25 b4 b9 63 91 24 f7 | 7a af 75 40 5f e0 3b c7 fe 89 b5 bc 73 91 d7 19 | 2e e6 52 2d 6d 62 88 1a dd 78 2e f4 ac b3 5d 81 | 5b 46 f2 8c 2b 56 64 43 9f cb 41 77 72 cc e3 c7 | fb 02 45 f2 aa d1 05 3d bd b9 7c fb 42 ed 8c ff | 30 ff dc e1 5c 3c 77 19 45 42 cf a4 f8 bb b6 59 | 36 b7 c3 c6 2e 48 57 81 bd ad 2b e0 a1 3b 08 0d | d4 7e e8 b3 54 cf b6 c1 f1 d3 d3 21 29 2d 7d 22 | 29 6a b9 b0 a3 2e 78 9a e5 ad 9d 82 54 dd 66 40 | 43 c9 c9 92 3d a2 4c 93 72 8d 37 32 47 10 80 59 | 24 1f c8 11 bb 61 1a 46 7a 4d ba b6 84 af 28 ff | be 8e f0 43 0c 06 44 de ae 2c 59 dd 64 11 1d c0 | 88 11 b8 a5 02 76 c4 93 9e 7f 1e 21 b4 f3 73 11 | 90 a7 6f cb 88 17 f6 a3 f8 f0 93 c2 45 ae 06 42 | 2e 9e ce b5 ac c6 ef 02 87 05 55 92 05 32 95 5a | 29 00 00 24 44 f7 e9 8f fb 08 1f 93 34 e2 1a a8 | e9 ff 2b f2 50 bf 46 2d 48 5b cd 18 f5 67 41 24 | 24 c6 54 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b c4 e3 50 01 6f e1 d7 66 5d b6 f6 | 35 cd f9 70 92 a0 50 f5 00 00 00 1c 00 00 40 05 | 94 c6 29 30 82 a4 65 ff 23 9b 09 9b 50 67 ac 71 | 21 55 e4 8f | libevent_free: release ptr-libevent@0x7f499c01d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #256 spent 0.267 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.16 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 2b 92 95 5f e9 dc 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | 61 2b 92 95 5f e9 dc 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.246223; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f499c01d3f8 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | libevent_free: release ptr-libevent@0x7f4978043db8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #491 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.25055; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f4978043db8 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | libevent_free: release ptr-libevent@0x7f4998033458 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #378 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.260863; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008278 exceeds limit? YES "road-eastnet-nonat-247" #247: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-247" #247: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #499 at 0x55564dae66d8 | State DB: adding IKEv2 state #499 in UNDEFINED | pstats #499 ikev2.ike started | Message ID: init #499: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #499: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #499; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-247" #499: initiating v2 parent SA to replace #247 | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 499 for state #499 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f4998033458 size 128 | #499 spent 0.0972 milliseconds in ikev2_parent_outI1() | RESET processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #247 ikev2.ike failed too-many-retransmits | pstats #247 ikev2.ike deleted too-many-retransmits | #247 spent 2.65 milliseconds in total | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-247" #247: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #247: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #247 "road-eastnet-nonat-247" #247: deleting IKE SA for connection 'road-eastnet-nonat-247' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-247' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-247 | crypto helper 18 resuming | crypto helper 18 starting work-order 499 for state #499 | State DB: deleting IKEv2 state #247 in PARENT_I1 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 499 | parent state #247: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #247 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564dabd188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | in statetime_stop() and could not find #247 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-247 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 499 time elapsed 0.00076 seconds | (#499) spent 0.811 milliseconds in crypto helper computing work-order 499: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 499 for state #499 to event queue | scheduling resume sending helper answer for #499 | libevent_malloc: new ptr-libevent@0x7f4978043cb8 size 128 | start processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:186) | crypto helper 18 waiting (nothing to do) | connection 'road-eastnet-nonat-247' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-247" | stop processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:349) | spent 0.0993 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.261982; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f49a8049798 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | libevent_free: release ptr-libevent@0x7f49bc020028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #470 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0898 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 499 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #499 | **emit ISAKMP Message: | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ikev2 g^x ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ikev2 g^x ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | ikev2 g^x c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | ikev2 g^x 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | ikev2 g^x 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | ikev2 g^x c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ikev2 g^x ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | ikev2 g^x 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | ikev2 g^x 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | ikev2 g^x 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | ikev2 g^x 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | ikev2 g^x 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | ikev2 g^x e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | ikev2 g^x 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | ikev2 g^x 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a9 0b 28 38 2e de 26 e9 76 17 33 4c 94 7b a2 b1 | IKEv2 nonce a4 23 3a 31 ea 41 71 23 a6 cd b8 69 1b a5 53 c3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1b b4 5a 0d 48 5b 19 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f7 | natd_hash: port=500 | natd_hash: hash= 66 02 d6 6f ac 39 1a fb 71 6e 39 92 4b 5a 34 27 | natd_hash: hash= ea bd 0b d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 02 d6 6f ac 39 1a fb 71 6e 39 92 4b 5a 34 27 | Notify data ea bd 0b d7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 1b b4 5a 0d 48 5b 19 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | natd_hash: hash= 5a 51 13 ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | Notify data 5a 51 13 ab | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #499 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #499: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #499 to 4294967295 after switching state | Message ID: IKE #499 skipping update_recv as MD is fake | Message ID: sent #499 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.247:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | 29 00 00 24 a9 0b 28 38 2e de 26 e9 76 17 33 4c | 94 7b a2 b1 a4 23 3a 31 ea 41 71 23 a6 cd b8 69 | 1b a5 53 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 02 d6 6f ac 39 1a fb 71 6e 39 92 | 4b 5a 34 27 ea bd 0b d7 00 00 00 1c 00 00 40 05 | fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | 5a 51 13 ab | state #499 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f4998033458 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564daefde8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f49bc020028 size 128 | #499 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.262957 | resume sending helper answer for #499 suppresed complete_v2_state_transition() and stole MD | #499 spent 0.654 milliseconds in resume sending helper answer | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f4978043cb8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0813 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da34e98 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.272206; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f4978043cb8 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | libevent_free: release ptr-libevent@0x7f49a8038e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da34e98 | #439 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0854 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.297656; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da34e98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #257 | libevent_malloc: new ptr-libevent@0x7f49a8038e48 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 d8 80 70 c5 66 84 36 8d ee 98 11 d2 e1 06 cc | e0 ce 0e 91 34 dd f4 98 e3 a1 56 02 fa 26 0d 55 | f0 85 87 f2 88 7c 18 92 2c b2 b5 70 65 62 12 58 | 63 ec 0d b3 81 a3 a1 b0 7f d4 f1 73 50 27 8a 6d | 7a 97 19 8f 1d e1 78 5c 25 86 a6 96 c9 d9 32 fd | 63 b1 68 da ae 9b 83 52 2b 9d 35 78 c7 cb 34 a5 | 6c 9b 0a f7 0e 01 7c b7 4d be a4 9e 4b d2 b7 c8 | e6 81 e9 27 5b d0 4e 9d 27 35 78 34 2b 8c c5 90 | e6 38 3c 24 7d 4e 59 04 02 05 c3 b2 c9 b7 8d 40 | a4 15 c2 7c 66 19 42 7f a2 bb 8f 49 82 2a cb 7c | 29 8e e7 15 94 ec a6 51 eb 55 44 44 ca 29 c9 b1 | 9d 5c 44 31 b6 6b 83 ee 54 d9 57 b0 85 85 41 5f | 8f 5c c0 5b 20 ba 80 de 37 49 07 32 78 9f 13 6f | 31 c1 01 da ce 6e 48 0a 82 fd 81 fc 69 e1 60 96 | 8a f3 2a 1a 5d a5 52 06 e4 c4 a7 0e f6 35 06 31 | 40 45 cf f0 c1 e3 01 06 57 c2 98 4f e0 cc 1c 25 | 29 00 00 24 f7 cb fc a5 12 74 07 5e 69 fc 20 9a | 02 45 6b 00 ce 47 18 1b b2 92 43 02 64 d8 50 6a | 81 39 e8 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 98 df 6d 1d fc 97 54 32 1c af 26 | 90 79 98 b0 39 22 96 df 00 00 00 1c 00 00 40 05 | d1 22 9a 1f 38 70 7b 00 b6 df 93 73 f4 f0 4a 35 | 40 3e 57 a2 | libevent_free: release ptr-libevent@0x7f4994012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #257 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 e0 b6 36 89 4f ef 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | 17 e0 b6 36 89 4f ef 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.30003; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | libevent_free: release ptr-libevent@0x7f498c033448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #484 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.083 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.307437; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | libevent_free: release ptr-libevent@0x7f496c043ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #492 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.313803; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f496c043ef8 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | libevent_free: release ptr-libevent@0x7f496c033718 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #379 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.32209; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f496c033718 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | libevent_free: release ptr-libevent@0x7f497803e548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #471 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.324432; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007443 exceeds limit? YES "road-eastnet-nonat-248" #248: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-248" #248: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #500 at 0x55564dae7de8 | State DB: adding IKEv2 state #500 in UNDEFINED | pstats #500 ikev2.ike started | Message ID: init #500: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #500: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #500; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-248" #500: initiating v2 parent SA to replace #248 | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 500 for state #500 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ad8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f497803e548 size 128 | #500 spent 0.0799 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | RESET processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 500 for state #500 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 500 | pstats #248 ikev2.ike failed too-many-retransmits | pstats #248 ikev2.ike deleted too-many-retransmits | #248 spent 2.45 milliseconds in total | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-248" #248: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #248: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #248 "road-eastnet-nonat-248" #248: deleting IKE SA for connection 'road-eastnet-nonat-248' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-248' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-248 | State DB: deleting IKEv2 state #248 in PARENT_I1 | parent state #248: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #248 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 500 time elapsed 0.000582 seconds | libevent_free: release ptr-libevent@0x7f4978028358 | (#500) spent 0.585 milliseconds in crypto helper computing work-order 500: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | crypto helper 19 sending results from work-order 500 for state #500 to event queue | in statetime_stop() and could not find #248 | scheduling resume sending helper answer for #500 | libevent_malloc: new ptr-libevent@0x7f496c043df8 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 19 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-248 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-248' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-248" | stop processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:349) | spent 0.0616 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 500 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #500 | **emit ISAKMP Message: | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | ikev2 g^x a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ikev2 g^x ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | ikev2 g^x 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | ikev2 g^x 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | ikev2 g^x bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | ikev2 g^x 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | ikev2 g^x a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | ikev2 g^x 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | ikev2 g^x e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | ikev2 g^x e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | ikev2 g^x 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | ikev2 g^x 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | ikev2 g^x e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | ikev2 g^x 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ikev2 g^x ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 27 bd ef b5 | IKEv2 nonce b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 78 29 16 8a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 7c c4 cb 9a 2d 26 f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f8 | natd_hash: port=500 | natd_hash: hash= ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 78 19 5f 00 | natd_hash: hash= a2 d7 7a 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 78 19 5f 00 | Notify data a2 d7 7a 84 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 75 7c c4 cb 9a 2d 26 f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | natd_hash: hash= 5a fb e6 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | Notify data 5a fb e6 0b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #500 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #500: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #500 to 4294967295 after switching state | Message ID: IKE #500 skipping update_recv as MD is fake | Message ID: sent #500 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.248:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | 29 00 00 24 b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 | 27 bd ef b5 b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 | 78 29 16 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 | 78 19 5f 00 a2 d7 7a 84 00 00 00 1c 00 00 40 05 | 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | 5a fb e6 0b | state #500 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f497803e548 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9f3ad8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f499c0496b8 size 128 | #500 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.325681 | resume sending helper answer for #500 suppresed complete_v2_state_transition() and stole MD | #500 spent 0.419 milliseconds in resume sending helper answer | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f496c043df8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab16d8 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.333861; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f496c043df8 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | libevent_free: release ptr-libevent@0x7f4984028c98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab16d8 | #440 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.357126; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab16d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #258 | libevent_malloc: new ptr-libevent@0x7f4984028c98 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 87 d4 63 43 e7 1f 09 38 34 ff 26 00 14 0c d4 | 25 73 94 98 c0 af 89 28 15 38 a0 6b 43 8a f2 57 | 66 35 13 51 57 73 7e 2e 04 ef 9c 6b 6a 74 c3 ed | 6c 50 fd 6f e3 fe 73 b8 ea 77 1e 4d a5 de 24 4d | 1b aa d4 b3 43 d0 cf 19 97 0a 4e 0d 3c fc 07 c3 | a5 2b 79 a4 eb 1a 3c 07 5a 87 03 da 52 8a 05 53 | f2 50 34 cf 6c 84 2d 01 26 9a 09 75 5a 55 de 6f | a2 c8 b0 d8 66 0e 53 92 e9 ed e9 ea 11 80 25 e4 | 35 0d 93 a9 9f 0f 84 4c 2b e7 56 d6 eb b6 c5 72 | c8 af bd 47 1f df ad 67 95 4e 34 5a b5 c7 5a 8a | e9 1e 59 65 55 e4 99 8c d3 ec c7 c3 2e d6 09 4f | 3f 5c 0b 8d ba d9 c4 41 b5 92 f7 e6 ab 55 53 aa | 3f 60 7d 3b 0e 1c 74 cb ef 3c 8b f4 1c 3d 06 19 | a4 40 0c b2 58 62 9a ea 80 3d d0 b8 91 51 64 01 | 96 eb a0 1c 2d c2 e6 e7 39 36 ad 7f 3c ea 17 95 | 89 32 35 8a 31 e0 4c ff b6 8e 7a 77 03 e8 50 9f | 29 00 00 24 3a a4 83 09 fb 96 80 0b f0 98 a3 15 | 2c 5c b6 8e 70 1d 6a d0 b3 d7 c8 5b 6e 5b 96 68 | be 75 e9 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4a 1f b4 91 af 75 d1 f5 8e 85 ef 3d | a9 dd 3e b8 5c 85 02 39 00 00 00 1c 00 00 40 05 | 04 d1 64 71 cf 32 9f b9 ca ff 43 80 48 ad dc 55 | e6 08 81 4d | libevent_free: release ptr-libevent@0x7f498c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #258 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 bd a1 e3 2d 8a ba 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | 75 bd a1 e3 2d 8a ba 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.364429; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | libevent_free: release ptr-libevent@0x7f4990028328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #485 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.369712; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | libevent_free: release ptr-libevent@0x7f4998023608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #380 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.373034; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | 29 00 00 24 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a | 49 a4 f8 e5 f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd | 88 a9 b3 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 | 62 6f 96 2c 30 9b 35 42 00 00 00 1c 00 00 40 05 | e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | e8 0f 34 78 | libevent_free: release ptr-libevent@0x7f49bc046848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #493 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.385291; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00289 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f49bc046848 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #472 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.387603; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007208 exceeds limit? YES "road-eastnet-nonat-249" #249: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-249" #249: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #501 at 0x55564dae94f8 | State DB: adding IKEv2 state #501 in UNDEFINED | pstats #501 ikev2.ike started | Message ID: init #501: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #501: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #501; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-249" #501: initiating v2 parent SA to replace #249 | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 501 for state #501 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d53d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f49a401d1f8 size 128 | #501 spent 0.0918 milliseconds in ikev2_parent_outI1() | RESET processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 501 for state #501 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 501 | pstats #249 ikev2.ike failed too-many-retransmits | pstats #249 ikev2.ike deleted too-many-retransmits | #249 spent 2.63 milliseconds in total | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-249" #249: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #249: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #249 "road-eastnet-nonat-249" #249: deleting IKE SA for connection 'road-eastnet-nonat-249' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-249' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-249 | State DB: deleting IKEv2 state #249 in PARENT_I1 | parent state #249: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #249 from 192.1.2.23 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 501 time elapsed 0.000934 seconds | libevent_free: release ptr-libevent@0x7f49a40282d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | (#501) spent 0.94 milliseconds in crypto helper computing work-order 501: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 501 for state #501 to event queue | scheduling resume sending helper answer for #501 | in statetime_stop() and could not find #249 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7f49bc046748 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-249 which received a Delete/Notify but must remain up per local policy | crypto helper 0 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-249' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-249" | stop processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:349) | spent 0.0986 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 501 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #501 | **emit ISAKMP Message: | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | ikev2 g^x 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | ikev2 g^x 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | ikev2 g^x 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | ikev2 g^x 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | ikev2 g^x db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | ikev2 g^x e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | ikev2 g^x dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | ikev2 g^x 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | ikev2 g^x c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | ikev2 g^x d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | ikev2 g^x 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | ikev2 g^x 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | ikev2 g^x db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | ikev2 g^x a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | ikev2 g^x 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 76 88 4f 06 94 72 ce 77 34 ab c1 ce 30 0f 6c 6a | IKEv2 nonce 03 46 20 57 64 80 23 52 49 ec 2c 3c fa a3 3a a1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a0 ef f3 2e 84 7b 94 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f9 | natd_hash: port=500 | natd_hash: hash= dc f2 54 8e ce f6 a3 29 a3 3a 88 55 fe 0e 47 7d | natd_hash: hash= cd cf fb bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc f2 54 8e ce f6 a3 29 a3 3a 88 55 fe 0e 47 7d | Notify data cd cf fb bc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= a0 ef f3 2e 84 7b 94 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | natd_hash: hash= ed 7a 46 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | Notify data ed 7a 46 06 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #501 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #501: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #501 to 4294967295 after switching state | Message ID: IKE #501 skipping update_recv as MD is fake | Message ID: sent #501 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.249:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | 29 00 00 24 76 88 4f 06 94 72 ce 77 34 ab c1 ce | 30 0f 6c 6a 03 46 20 57 64 80 23 52 49 ec 2c 3c | fa a3 3a a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc f2 54 8e ce f6 a3 29 a3 3a 88 55 | fe 0e 47 7d cd cf fb bc 00 00 00 1c 00 00 40 05 | 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | ed 7a 46 06 | state #501 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49a401d1f8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564d9d53d8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f49a00495f8 size 128 | #501 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.38933 | resume sending helper answer for #501 suppresed complete_v2_state_transition() and stole MD | #501 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49bc046748 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bf708 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.391512; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f49bc046748 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | libevent_free: release ptr-libevent@0x7f499802df48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bf708 | #441 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.416852; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bf708 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #259 | libevent_malloc: new ptr-libevent@0x7f499802df48 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 25 e7 af 7d 37 8b 92 f1 4f af 8a de 09 26 e4 | 8d 26 12 94 17 ef 50 e0 93 ab d1 91 84 97 34 8b | 6f 0a c0 a0 65 2c 95 62 c6 d4 00 24 17 c9 6b 71 | 1a 23 bf 32 a2 a9 d6 f0 76 12 6a 16 e2 c9 ed cf | 0f 16 17 c1 74 c2 d6 3e ef 05 00 03 f9 8d 22 9c | ad 22 76 25 49 08 e0 3c fe 0d 41 23 e5 d7 83 65 | 23 08 a9 1d 8f 73 55 cf 84 f0 c9 1f a7 25 39 51 | 3a 0c fe 6a 38 22 0f a0 70 f8 9b 82 9e 2d 96 ad | 71 e1 5d df bb 5d 75 3f 43 0c 7b 53 95 81 48 c6 | 1a 52 3f b3 12 99 78 e2 74 46 65 b8 57 fc f6 e0 | 28 fc 38 7a b5 e6 cd 34 74 71 bf ce 35 78 98 fd | 4c 30 16 95 c3 c0 77 9f 35 1b f1 12 34 de a2 91 | 16 71 eb 52 fe fe 82 41 93 1f 25 2c e6 3d a7 1c | 01 30 1d 3b 4c 24 37 63 12 b1 26 f3 9c aa 2d be | 45 9f b7 67 f7 16 76 cc 42 f1 0e 2c 49 b7 52 d2 | 77 19 0e 12 16 28 9a 5c e2 03 86 79 a3 a1 7f ab | 29 00 00 24 33 23 7e c5 b4 f0 ce 2a 7e 6e 68 74 | 02 8b ee d9 71 e2 b6 b3 97 fa 19 9e 6f 37 19 44 | f6 3e 58 c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 f3 8e 8a 89 aa eb 13 d4 e9 eb 2e | e3 80 95 f5 86 40 ed d5 00 00 00 1c 00 00 40 05 | f6 78 62 e6 73 e5 78 fe be be aa e2 68 2f 22 09 | 54 f7 3e 03 | libevent_free: release ptr-libevent@0x7f499401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #259 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 3d 88 78 18 69 13 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | ed 3d 88 78 18 69 13 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.430151; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f499401d568 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | libevent_free: release ptr-libevent@0x7f4980038e68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #486 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.431434; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | libevent_free: release ptr-libevent@0x7f49b4035f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #381 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.438683; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f49b4035f78 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | 29 00 00 24 e3 a7 b9 77 10 76 d3 84 87 df 4c ec | eb ae fa 7e 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c | e5 88 d7 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 | 53 de b9 65 f0 23 59 01 00 00 00 1c 00 00 40 05 | c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | 60 31 b3 7b | libevent_free: release ptr-libevent@0x7f49b4046758 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #494 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.44301; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002459 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f49b4046758 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | libevent_free: release ptr-libevent@0x7f49a4043bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #473 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.452371; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f49a4043bd8 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | libevent_free: release ptr-libevent@0x7f49b4036078 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #442 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f7fa8 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.453644; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006879 exceeds limit? YES "road-eastnet-nonat-250" #250: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-250" #250: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #502 at 0x55564daeac08 | State DB: adding IKEv2 state #502 in UNDEFINED | pstats #502 ikev2.ike started | Message ID: init #502: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #502: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #502; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-250" #502: initiating v2 parent SA to replace #250 | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 502 for state #502 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564da68fc8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f49b4036078 size 128 | #502 spent 0.075 milliseconds in ikev2_parent_outI1() | RESET processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | crypto helper 2 starting work-order 502 for state #502 | pstats #250 ikev2.ike failed too-many-retransmits | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 502 | pstats #250 ikev2.ike deleted too-many-retransmits | #250 spent 2.51 milliseconds in total | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-250" #250: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #250: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #250 "road-eastnet-nonat-250" #250: deleting IKE SA for connection 'road-eastnet-nonat-250' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-250' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-250 | State DB: deleting IKEv2 state #250 in PARENT_I1 | parent state #250: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 502 time elapsed 0.000909 seconds | (#502) spent 0.895 milliseconds in crypto helper computing work-order 502: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 502 for state #502 to event queue | scheduling resume sending helper answer for #502 | libevent_malloc: new ptr-libevent@0x7f49b40469a8 size 128 | crypto helper 2 waiting (nothing to do) | stop processing: state #250 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x55564da5d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | in statetime_stop() and could not find #250 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-250 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-250' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-250" | stop processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:349) | spent 0.08 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 502 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #502 | **emit ISAKMP Message: | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | ikev2 g^x 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | ikev2 g^x 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | ikev2 g^x 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | ikev2 g^x 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ikev2 g^x ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | ikev2 g^x 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | ikev2 g^x 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | ikev2 g^x d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | ikev2 g^x 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | ikev2 g^x 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | ikev2 g^x da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | ikev2 g^x 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | ikev2 g^x 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | ikev2 g^x 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | ikev2 g^x c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 bc df d3 a5 ac 32 27 d9 78 ab 13 eb 9a fd dd | IKEv2 nonce ed d2 d9 da fd 94 93 9b 85 07 d1 0c 2e 23 4c d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f2 b7 79 3e 57 d1 d3 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fa | natd_hash: port=500 | natd_hash: hash= 91 a3 64 88 f7 8b c4 8e 31 66 88 18 ef 0b f6 ba | natd_hash: hash= 75 14 dd 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 a3 64 88 f7 8b c4 8e 31 66 88 18 ef 0b f6 ba | Notify data 75 14 dd 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= f2 b7 79 3e 57 d1 d3 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | natd_hash: hash= 8e 66 bf 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | Notify data 8e 66 bf 72 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #502 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #502: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #502 to 4294967295 after switching state | Message ID: IKE #502 skipping update_recv as MD is fake | Message ID: sent #502 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.250:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | 29 00 00 24 a4 bc df d3 a5 ac 32 27 d9 78 ab 13 | eb 9a fd dd ed d2 d9 da fd 94 93 9b 85 07 d1 0c | 2e 23 4c d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 a3 64 88 f7 8b c4 8e 31 66 88 18 | ef 0b f6 ba 75 14 dd 0a 00 00 00 1c 00 00 40 05 | f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | 8e 66 bf 72 | state #502 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49b4036078 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564da68fc8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f4994049828 size 128 | #502 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.455125 | resume sending helper answer for #502 suppresed complete_v2_state_transition() and stole MD | #502 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b40469a8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.484294; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004089 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f7fa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #260 | libevent_malloc: new ptr-libevent@0x7f49b40469a8 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e fd f9 f3 36 5d ed 0f 46 09 89 c3 74 d2 8d d3 | 14 cb 0e 35 2c 8c 23 46 24 88 0f f4 99 d8 86 82 | 65 d6 b8 cf 5b 64 bb ae ef 20 0c 91 d0 cf fd f3 | 31 41 b7 f9 bf 71 63 c1 f9 1b e0 54 55 9a ca c7 | 51 39 ec fe 99 85 67 3f 64 4c fd 63 0b df 59 6e | e9 0a f1 74 e7 b5 8a ed 61 bb a1 a2 b6 46 e7 6d | 39 9b 72 f6 16 c1 b9 23 8e 83 e0 e3 06 a3 b1 e9 | a4 f1 8b 29 c3 b4 3a 67 c9 9d a4 8a 02 9a 54 1f | 90 01 a7 06 c2 bd e2 6f d9 3a 72 5f 59 52 ef 3a | 18 42 2f 63 95 2a 4d 26 60 8a fa 3f 36 a1 0f 21 | bf 78 8a cb 66 b0 88 f9 3b fe dd 73 7e 72 c9 d4 | 52 9c cd 11 d1 10 57 1a db e8 f5 e5 91 33 90 9f | c6 ff f0 55 80 53 28 19 01 c3 81 63 d3 13 4f 6d | bd 33 1b 34 eb ad 34 b8 6a c8 fb 28 7b 48 9b b2 | 12 0f 69 12 aa f8 e8 2a 0b a1 3f 6e ae ca bf 20 | 84 f3 d3 28 a5 1c 46 07 95 64 cd e6 65 d6 06 7d | 29 00 00 24 a3 c8 e9 00 33 45 0c 93 6a 43 22 1f | bb 1b 4a 83 3a 94 5b cd 2d 4e 36 9a 99 6f fc dd | 48 12 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 4a 9e 4c 35 9f fc 62 95 3b d9 d9 | b0 e6 ad 0a c4 05 96 1f 00 00 00 1c 00 00 40 05 | ff 70 f7 54 75 91 fc 28 9b e3 e4 25 07 d4 d2 8a | 24 fc db 0c | libevent_free: release ptr-libevent@0x7f499c017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #260 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a9 ed b3 58 22 ab 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | 8e a9 ed b3 58 22 ab 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.49365; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #487 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.499987; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | 29 00 00 24 23 46 9e a2 d2 02 ad 06 61 c4 c1 de | 0f 9e 45 25 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 | 95 ce 52 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 | 29 e9 4b b6 9e 67 fa 0c 00 00 00 1c 00 00 40 05 | 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | 81 9a 48 25 | libevent_free: release ptr-libevent@0x7f49b80471b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #495 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.509277; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f49b80471b8 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #443 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.516597; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008208 exceeds limit? YES "road-eastnet-nonat-251" #251: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-251" #251: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #503 at 0x55564daec388 | State DB: adding IKEv2 state #503 in UNDEFINED | pstats #503 ikev2.ike started | Message ID: init #503: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #503: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #503; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-251" #503: initiating v2 parent SA to replace #251 | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 503 for state #503 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dad15e8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f49ac022e28 size 128 | #503 spent 0.104 milliseconds in ikev2_parent_outI1() | RESET processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #251 ikev2.ike failed too-many-retransmits | crypto helper 4 starting work-order 503 for state #503 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 503 | pstats #251 ikev2.ike deleted too-many-retransmits | #251 spent 2.58 milliseconds in total | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-251" #251: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #251: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #251 "road-eastnet-nonat-251" #251: deleting IKE SA for connection 'road-eastnet-nonat-251' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-251' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-251 | State DB: deleting IKEv2 state #251 in PARENT_I1 | parent state #251: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 503 time elapsed 0.000569 seconds | stop processing: state #251 from 192.1.2.23 (in delete_state() at state.c:1143) | (#503) spent 0.573 milliseconds in crypto helper computing work-order 503: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 503 for state #503 to event queue | libevent_free: release ptr-libevent@0x55564da5ed78 | scheduling resume sending helper answer for #503 | libevent_malloc: new ptr-libevent@0x7f49b80470b8 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | crypto helper 4 waiting (nothing to do) | in statetime_stop() and could not find #251 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-251 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-251' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-251" | stop processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:349) | spent 0.0617 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 503 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #503 | **emit ISAKMP Message: | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | ikev2 g^x b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | ikev2 g^x 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | ikev2 g^x 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | ikev2 g^x 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | ikev2 g^x 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | ikev2 g^x 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | ikev2 g^x 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | ikev2 g^x 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | ikev2 g^x 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | ikev2 g^x c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | ikev2 g^x 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | ikev2 g^x cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | ikev2 g^x 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | ikev2 g^x bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | ikev2 g^x 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6a df 41 aa 43 24 5d df 47 18 db 96 96 68 11 71 | IKEv2 nonce 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 53 6c a4 81 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e f4 80 43 38 b6 37 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fb | natd_hash: port=500 | natd_hash: hash= ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 b3 b3 b6 ff | natd_hash: hash= 76 34 ab 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 b3 b3 b6 ff | Notify data 76 34 ab 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 0e f4 80 43 38 b6 37 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | natd_hash: hash= 22 3f b9 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | Notify data 22 3f b9 17 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #503 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #503: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #503 to 4294967295 after switching state | Message ID: IKE #503 skipping update_recv as MD is fake | Message ID: sent #503 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.251:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | 29 00 00 24 6a df 41 aa 43 24 5d df 47 18 db 96 | 96 68 11 71 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 | 53 6c a4 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 | b3 b3 b6 ff 76 34 ab 12 00 00 00 1c 00 00 40 05 | 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | 22 3f b9 17 | state #503 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac022e28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dad15e8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f4998049598 size 128 | #503 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.517973 | resume sending helper answer for #503 suppresed complete_v2_state_transition() and stole MD | #503 spent 0.457 milliseconds in resume sending helper answer | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49b80470b8 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da92e98 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.521147; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f49b80470b8 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | libevent_free: release ptr-libevent@0x7f49b8036ad8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da92e98 | #382 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da30978 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.537413; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f49b8036ad8 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | libevent_free: release ptr-libevent@0x7f499401d668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da30978 | #474 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.547708; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da30978 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #261 | libevent_malloc: new ptr-libevent@0x7f499401d668 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 7c 67 f6 13 f1 f7 58 b7 2a 55 3d d4 65 27 0b | 48 16 94 27 97 11 06 4b b3 b4 97 75 1f 3a de 4b | 7b 16 17 94 48 7e b9 6b 8a 75 1e 9c 6e 23 d9 15 | 5b 68 3f d2 41 12 6d 89 1b 96 b0 75 9d d8 72 09 | 32 d3 99 65 95 a5 50 9e 80 c7 81 07 0f 03 9c b8 | d8 36 5d bc 79 cf fa 52 ae ed 69 47 5f 26 33 29 | 70 68 48 3f d9 e0 92 6f 91 ab ef 17 2d a8 53 92 | e0 f8 be 1f 95 95 ce b9 3e f9 b6 37 77 c7 74 be | 38 ef 2d 4d c3 e1 76 06 04 7e 3d d7 36 df 92 b8 | f9 ff 1b 4f da 7a 92 2e 6a 71 83 ab ac 4a 9c a1 | 19 d2 07 e6 6e fe 7b 9d dc b4 95 2d 82 96 90 b6 | 48 58 d1 41 ac 2f 30 fb ee 63 4a b9 95 af 16 ab | dc f1 8a 67 64 5b f1 c9 fc 4c 2f 78 6c 0f 29 50 | 25 f2 22 b2 2e 4d 77 6b d5 d6 bd 7a cb 4f aa c3 | 51 f2 02 9a 2a e1 fc d4 36 98 d5 ff 24 7e 57 1f | 24 df 05 21 f7 f3 98 40 49 99 a8 69 b7 2e 2f 39 | 29 00 00 24 a6 22 87 29 e1 69 24 01 01 23 34 09 | f2 80 7e b8 50 31 11 5f 10 2d 8b ba 06 9c dd 0b | 70 a9 a8 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 72 d1 44 9d 43 73 12 ae 65 49 03 | 90 04 a8 1f c8 de b8 6c 00 00 00 1c 00 00 40 05 | e5 49 90 50 c9 33 e2 c7 7a f4 7a b4 e0 a4 9c 6c | fe ff fa 7d | libevent_free: release ptr-libevent@0x7f499800cbe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #261 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d5 b1 bb 78 c7 31 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | ec d5 b1 bb 78 c7 31 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.556001; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | libevent_free: release ptr-libevent@0x7f4984022d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #488 spent 0.0934 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.564243; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | 29 00 00 24 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 | 8e 41 9a 8c 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 | 0d f1 36 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba d6 cc d8 42 54 a7 fe 61 5b ca f1 | 36 92 a6 77 db 6f 08 a3 00 00 00 1c 00 00 40 05 | d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | 92 7e bf ac | libevent_free: release ptr-libevent@0x7f49ac049558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #496 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daece78 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 8 | retransmits: current time 10656.576527; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007104 exceeds limit? YES "road-eastnet-nonat-252" #252: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-252" #252: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #504 at 0x55564daedb08 | State DB: adding IKEv2 state #504 in UNDEFINED | pstats #504 ikev2.ike started | Message ID: init #504: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #504: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #504; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-252" #504: initiating v2 parent SA to replace #252 | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 504 for state #504 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f49ac049558 size 128 | #504 spent 0.0817 milliseconds in ikev2_parent_outI1() | RESET processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:234) | pstats #252 ikev2.ike failed too-many-retransmits | pstats #252 ikev2.ike deleted too-many-retransmits | crypto helper 5 starting work-order 504 for state #504 | #252 spent 2.49 milliseconds in total | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 504 | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23 (in delete_state() at state.c:879) "road-eastnet-nonat-252" #252: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #252: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #252 "road-eastnet-nonat-252" #252: deleting IKE SA for connection 'road-eastnet-nonat-252' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-252' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-252 | State DB: deleting IKEv2 state #252 in PARENT_I1 | parent state #252: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 504 time elapsed 0.000965 seconds | (#504) spent 0.972 milliseconds in crypto helper computing work-order 504: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 504 for state #504 to event queue | scheduling resume sending helper answer for #504 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #252 from 192.1.2.23 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7f4994049628 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daece78 | in statetime_stop() and could not find #252 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-252 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-252' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-252" | stop processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:349) | spent 0.0597 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 504 | calling continuation function 0x55564bc36b50 | ikev2_parent_outI1_continue for #504 | **emit ISAKMP Message: | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | ikev2 g^x 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | ikev2 g^x 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | ikev2 g^x 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | ikev2 g^x 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | ikev2 g^x 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | ikev2 g^x 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | ikev2 g^x e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | ikev2 g^x 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | ikev2 g^x bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | ikev2 g^x 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | ikev2 g^x c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | ikev2 g^x bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ikev2 g^x ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | ikev2 g^x 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | ikev2 g^x e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0c da a4 86 c2 a1 85 08 e3 8c e5 ab 08 04 21 15 | IKEv2 nonce d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b 86 e6 76 0a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 10 8a f2 6c ec e1 aa 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fc | natd_hash: port=500 | natd_hash: hash= 2d 99 80 26 7e 80 26 83 7e e1 f2 65 5a 6f dd 9b | natd_hash: hash= e9 af 20 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 99 80 26 7e 80 26 83 7e e1 f2 65 5a 6f dd 9b | Notify data e9 af 20 64 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x55564bd0b800(20) | natd_hash: icookie= 10 8a f2 6c ec e1 aa 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | natd_hash: hash= b0 83 1b d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | Notify data b0 83 1b d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #504 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #504: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #504 to 4294967295 after switching state | Message ID: IKE #504 skipping update_recv as MD is fake | Message ID: sent #504 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.252:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | 29 00 00 24 0c da a4 86 c2 a1 85 08 e3 8c e5 ab | 08 04 21 15 d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b | 86 e6 76 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 99 80 26 7e 80 26 83 7e e1 f2 65 | 5a 6f dd 9b e9 af 20 64 00 00 00 1c 00 00 40 05 | af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | b0 83 1b d1 | state #504 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f49ac049558 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55564dabe828 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f498c049dc8 size 128 | #504 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10656.578115 | resume sending helper answer for #504 suppresed complete_v2_state_transition() and stole MD | #504 spent 0.353 milliseconds in resume sending helper answer | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f49ac004e48 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daad138 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.583291; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daece78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | libevent_free: release ptr-libevent@0x7f4980018dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daad138 | #444 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.608644; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daad138 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #262 | libevent_malloc: new ptr-libevent@0x7f4980018dc8 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 8a d5 c6 a7 a8 d9 c7 c2 7a 96 45 6f 47 09 d1 | 5f c9 20 cc 3d bb 50 17 8f 9d 81 7f 1f ad 66 1d | 2f 50 05 54 22 54 dc 34 c6 05 87 e7 fe 7b 85 fe | 43 da 26 cc ea 1a d5 cf b6 cf 1f 14 37 2d ce 10 | 46 14 90 9a 62 b8 68 de 95 23 93 21 02 68 5c 80 | 8b ef 34 ee a8 9f 4b c1 cc e4 b6 a4 cc 79 48 8c | 1c 67 7f 21 cd 8e 3b 8e 1f cd 5c d7 6e ae cf a6 | ff 41 7f da 64 ca 86 cf 44 39 b1 6e fd 1c 25 b8 | c3 20 4e 41 ef 6f 1f e3 3b 89 77 65 d2 47 a8 bb | b1 2d 6a a8 23 56 3b 4c 72 14 6e 33 8b a1 cc 94 | 59 39 66 c4 c0 eb 27 43 ca 47 c0 76 28 13 96 6b | 4b a5 9f 58 1a f8 5c e7 a7 b4 e5 c7 df 56 61 77 | bf 3d 1e f9 54 8e 06 01 53 7a 98 c4 6b 72 d8 e0 | 7c 39 0f 6c 1a 2a 1c 7a 50 e5 40 63 dd df ee 8a | af ca 0e 9b 9a 2c ee bf a4 69 f6 e6 a3 46 e6 2e | d1 00 49 5c 8a 18 73 51 ec bd 04 9d a8 ca 66 6a | 29 00 00 24 31 69 80 ba 60 f0 56 9e b1 21 27 22 | d5 26 45 c3 b2 09 62 f2 d7 b2 e8 3d 0d aa 76 3a | 64 25 db 61 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 2f 7e 07 48 15 6a 4e 66 a0 04 56 | 7b e4 4d 97 00 d1 76 b9 00 00 00 1c 00 00 40 05 | f3 82 c1 d5 af 18 cd d7 37 ba 8d 62 33 02 2f a6 | 90 11 ec fe | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #262 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 1a 10 27 02 c2 2a 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | bb 1a 10 27 02 c2 2a 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.615959; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | libevent_free: release ptr-libevent@0x7f49b0038ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #383 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.62256; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f49b0038ca8 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #489 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.628929; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | 29 00 00 24 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 | f6 5c 32 38 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e | b9 af 03 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 3b c4 a0 4e eb 77 67 fc cf 56 aa | bb 93 30 1b a3 4a 6f 76 00 00 00 1c 00 00 40 05 | fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | cf 50 46 7e | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #497 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.631327; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | libevent_free: release ptr-libevent@0x7f4994033678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #475 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc608 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.644715; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f4994033678 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | libevent_free: release ptr-libevent@0x7f499c03e798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc608 | #445 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0791 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.667487; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc608 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #263 | libevent_malloc: new ptr-libevent@0x7f499c03e798 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 fe 31 cd 9d 43 a4 a2 f2 48 3c 93 5d 2d 95 3c | e2 2c 43 69 9d 46 42 49 85 6d 04 02 be 93 e6 f2 | f0 49 e3 1f e0 93 09 b9 94 f0 54 2a f6 9d 3b 9d | 9f 4a 2f ab 09 d0 f4 6d 33 1a 66 0b ed 97 0a b8 | 03 7b e3 b5 b4 d4 a1 04 62 28 4d 6d a6 fd dc 80 | e7 1c 90 de fe b8 ca 07 db 6c f2 b8 a2 c2 96 9d | e2 6e 12 cc 45 03 f2 72 ab ac f6 0b 23 80 77 25 | ac d3 fa 60 22 73 a3 39 61 51 1c d1 2c ee dc 2c | 6f a9 f5 3f f1 50 02 3f da 4a 7d fe c8 f1 27 55 | 61 d7 cb 5b 7e b0 71 3d 0c d6 d8 74 06 a2 49 b6 | c7 17 15 f1 54 6a ce 01 0b 00 63 0d 79 66 8a 8e | 3e b3 64 ec c0 86 0a 66 26 ac 19 c8 5c 96 bc b0 | 08 a7 1e 29 b5 f6 55 a6 78 a5 bb c3 3e 0a 80 e2 | a8 0a cc 07 69 3e ed c7 5e d9 19 63 8f 8e c0 a7 | 03 13 6d 61 f5 26 af aa b1 eb c6 45 36 e9 fa 76 | 44 18 24 3f 43 9d 4e 88 9a ca b5 67 71 62 1c 89 | 29 00 00 24 a3 7c 13 e1 f1 00 a0 39 5f e8 24 d9 | 11 cc 25 1b 92 5b e4 ce 9a d3 33 11 c5 3a 80 fc | f8 44 fc f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 04 aa 00 77 a6 0b 71 f3 8f 0e 90 | 96 4f c1 b0 bd d8 6a 03 00 00 00 1c 00 00 40 05 | a8 d0 96 2d 30 06 20 1f 18 d8 3d bd 89 4e b4 b7 | b6 3a 52 fa | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #263 spent 0.493 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 50 85 13 22 31 a3 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | 89 50 85 13 22 31 a3 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.151 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.676652; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | libevent_free: release ptr-libevent@0x7f49a4038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #384 spent 0.467 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.686681; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f49a4038e28 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #490 spent 0.582 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.699739; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501265 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | 29 00 00 24 56 9e f4 16 12 f8 89 df 66 51 be 2a | 1b ac 38 dd 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 | 71 30 8c a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 | fa 1e 4e 52 6e 6a 7f 5c 00 00 00 1c 00 00 40 05 | a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | 94 aa f7 cb | libevent_free: release ptr-libevent@0x7f49a4049498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #498 spent 0.482 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e6958 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.702695; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f49a4049498 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | libevent_free: release ptr-libevent@0x7f49a003e4d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e6958 | #446 spent 0.408 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.725584; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e6958 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #264 | libevent_malloc: new ptr-libevent@0x7f49a003e4d8 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 1f bb 30 3d 34 80 7a 4c 0f d8 6f 84 01 7d 79 | 3d fe 50 da 93 a1 37 3b 92 63 71 9e b5 0f 8e b7 | d8 68 83 97 0d 22 2c a5 51 19 7b d1 34 e5 c2 d8 | 27 2d 8e e6 ee 68 f5 2f 8f 7e 7e e6 39 be b3 82 | 51 77 36 e5 c2 c2 6f e6 58 26 e6 b0 df 7d 1a 7b | 0f 5c bf 53 bc ec b3 3e 03 32 1e 11 17 9e 58 80 | 5b 02 47 a1 25 b5 43 b6 2a 53 f3 a6 69 b8 d5 78 | 47 91 8d 40 dc eb db 42 12 76 00 7e d0 90 9e fd | ed 30 31 99 3b 80 81 00 47 c5 43 0c 7b f4 d7 2e | f3 ca 21 a2 ae f8 3b 0e f2 4d ba a7 06 49 36 fe | c6 f5 f9 5b 22 1a 0d 34 81 70 9a 0a b5 15 71 10 | c5 05 d1 a7 24 32 b0 5b 75 96 12 36 1b 5c 55 ce | cf 9d 05 3f 6d ff 05 26 5b 0e c4 49 f2 87 af 8c | f5 b8 43 fb 14 f6 5d ef c0 c5 07 39 2d ca 83 da | 6b 74 f0 aa 4e 9a ef 76 f9 d7 28 2c b0 a2 6c 30 | c2 cd 31 77 8a d4 18 1a 5a 49 43 08 5f ea 9e 66 | 29 00 00 24 4a 76 bd e5 72 52 08 19 bd 8e 3e 0b | f8 da 14 4d 33 4a 67 a9 53 e9 e8 d2 e6 cd c6 ed | 49 ed fc a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 13 d2 41 ea d7 8e 59 44 aa 81 f6 | cd 0c c2 fc 51 c8 02 a8 00 00 00 1c 00 00 40 05 | 79 33 a0 b1 ae 41 6e 1e 24 ea da dd 8d 15 82 14 | 56 03 d5 6b | libevent_free: release ptr-libevent@0x7f499001d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #264 spent 0.411 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 0b 94 c7 6e d1 f4 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | f3 0b 94 c7 6e d1 f4 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.72947; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f499001d5b8 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #476 spent 0.577 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.744613; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #385 spent 0.542 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.747694; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002743 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | libevent_free: release ptr-libevent@0x7f499c01d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #491 spent 0.524 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.279 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.762673; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f499c01d3f8 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | libevent_free: release ptr-libevent@0x7f497403e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #447 spent 0.289 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.143 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daefde8 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.763194; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f497403e5d8 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | 29 00 00 24 a9 0b 28 38 2e de 26 e9 76 17 33 4c | 94 7b a2 b1 a4 23 3a 31 ea 41 71 23 a6 cd b8 69 | 1b a5 53 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 02 d6 6f ac 39 1a fb 71 6e 39 92 | 4b 5a 34 27 ea bd 0b d7 00 00 00 1c 00 00 40 05 | fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | 5a 51 13 ab | libevent_free: release ptr-libevent@0x7f49bc020028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daefde8 | #499 spent 0.249 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.786715; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daefde8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #265 | libevent_malloc: new ptr-libevent@0x7f49bc020028 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 e8 32 8a 9f 8a 9b 31 9b 87 2a 39 8b 8c 7a f0 | bd 41 bb 65 88 63 43 65 10 e7 a3 38 e5 62 39 39 | 77 82 e5 e4 97 b7 04 b6 77 8e 84 76 ab 68 6c 5b | 9f f0 28 89 6d 68 86 06 c0 0c 23 6c 8f ea 7c 1d | 04 d9 29 e1 a1 78 70 21 1f 9d 9f b7 d1 3a 9c b2 | 7a 44 c4 0c 1d 35 7a 72 a5 81 a1 e9 57 10 b6 ef | a0 24 77 f2 e2 2d 65 19 74 01 9b 91 69 5c db ae | 91 e2 e2 d0 d2 64 b9 20 d6 e6 f8 d7 fc 51 3d ef | c1 2f 11 f3 24 53 23 2a 83 40 3c bb a9 cb 23 fe | 4f c7 4c 77 52 0a cd 20 5f b3 50 f6 43 7e a1 02 | c1 42 9e ce 9d 90 ea d7 4f 26 12 af 67 b8 f8 4a | dc 19 c7 85 23 c1 57 69 df 13 67 17 5e 5e d1 a9 | 5a f9 91 78 08 87 c0 82 5c 28 60 db 31 5b 41 94 | f2 f5 66 cd 78 aa 6c db 4a 2b 78 c7 d9 22 a3 d1 | de 64 4d be e4 69 1f 7f d6 08 f8 7d 47 48 40 df | 14 c2 bf 66 b7 62 e9 e5 9c 87 f1 83 47 41 5d fe | 29 00 00 24 5b cf a7 06 0a c8 ed 64 b4 3b 62 7a | 85 bd e3 8d 6b 5e 02 50 b0 b5 fb 0e 40 d4 7c a3 | fa f0 f4 fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 54 bd 14 86 f5 5b ed d1 d3 e3 54 | 7b 6c d9 13 96 70 d3 10 00 00 00 1c 00 00 40 05 | c9 94 ab 92 57 ec a7 c8 b4 30 5d a0 64 b5 b1 00 | 64 db f8 55 | libevent_free: release ptr-libevent@0x7f49b0017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #265 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 53 fa 50 85 ae d0 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | ec 53 fa 50 85 ae d0 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.803265; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f49b0017cf8 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | libevent_free: release ptr-libevent@0x7f49b401fd78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #386 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.808551; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | libevent_free: release ptr-libevent@0x7f498c033448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #492 spent 0.0935 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.823834; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #477 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.825094; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | libevent_free: release ptr-libevent@0x7f498003e6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #448 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ad8 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.826336; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f498003e6c8 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | 29 00 00 24 b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 | 27 bd ef b5 b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 | 78 29 16 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 | 78 19 5f 00 a2 d7 7a 84 00 00 00 1c 00 00 40 05 | 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | 5a fb e6 0b | libevent_free: release ptr-libevent@0x7f499c0496b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | #500 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.846636; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ad8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #266 | libevent_malloc: new ptr-libevent@0x7f499c0496b8 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8c 8b a4 38 06 17 67 99 47 2e c8 45 e6 ca e7 | 7a f4 9e 7a 42 0f 3c dc c9 1f 90 d5 ba 71 de 9f | ad 02 c4 8b e6 01 c3 2c e0 f0 19 0a 7d 5a ef 44 | 95 a0 6f 22 77 9f c9 b7 71 db 86 72 e6 d0 77 fd | 8e 65 ad d6 fc cd c0 91 e2 57 4a a8 c8 36 c4 4e | 96 5a c9 0b 8e 6d c3 4a b7 32 20 a2 1d da f1 0a | 79 fc 13 84 40 10 8d 31 de dc e1 aa cf d8 95 c6 | 82 bd f4 db 5a fd 11 53 64 7c 27 7f e7 e1 73 e1 | 36 e4 17 83 35 a9 a9 8e 8a 13 2f eb fa 35 98 24 | 49 e3 6e 7c 89 46 9d 5a fc 76 f5 9b f8 a1 bf ab | 0b d3 93 1a 85 62 29 bf c2 07 82 48 92 8a 60 3e | fa 55 28 66 31 6c 83 82 7e 6a de be f3 78 a5 2e | d8 66 44 ef f2 38 a8 d4 f3 c7 a2 dc 64 88 ff 54 | c5 e6 b2 a8 76 9e 13 30 ae ff fd 7d 74 c2 a5 f8 | 83 46 5e c7 3e 78 f9 b1 ac a3 d6 91 ac 21 dd 97 | c5 d0 cb a1 c9 e3 48 b2 b1 fd 52 46 80 2c dc 2b | 29 00 00 24 32 12 8c 66 a2 93 a6 e0 bd 14 e8 1b | 07 26 07 90 82 2e c7 00 66 4d 44 88 7f 79 3a 31 | 9f 36 ff 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 16 6c 53 6e ec 12 c8 fb e1 c6 50 | cc 3f 69 15 7c 02 f6 34 00 00 00 1c 00 00 40 05 | 4f 09 d0 ff a7 1c dc 14 85 5b 5f 18 82 4d 05 60 | 03 2f 72 54 | libevent_free: release ptr-libevent@0x7f498801d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #266 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 98 14 2a ed e5 87 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 2d 98 14 2a ed e5 87 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.860944; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002862 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f498801d3f8 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | libevent_free: release ptr-libevent@0x7f497402de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #387 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.874283; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | 29 00 00 24 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a | 49 a4 f8 e5 f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd | 88 a9 b3 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 | 62 6f 96 2c 30 9b 35 42 00 00 00 1c 00 00 40 05 | e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | e8 0f 34 78 | libevent_free: release ptr-libevent@0x7f4998023608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #493 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.885569; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | libevent_free: release ptr-libevent@0x7f496c03e738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #449 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0941 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.890937; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f496c03e738 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | 29 00 00 24 76 88 4f 06 94 72 ce 77 34 ab c1 ce | 30 0f 6c 6a 03 46 20 57 64 80 23 52 49 ec 2c 3c | fa a3 3a a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc f2 54 8e ce f6 a3 29 a3 3a 88 55 | fe 0e 47 7d cd cf fb bc 00 00 00 1c 00 00 40 05 | 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | ed 7a 46 06 | libevent_free: release ptr-libevent@0x7f49a00495f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #501 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4418 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.897209; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f49a00495f8 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | libevent_free: release ptr-libevent@0x7f49900333f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4418 | #478 spent 0.096 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.904458; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4418 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #267 | libevent_malloc: new ptr-libevent@0x7f49900333f8 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 65 a5 25 28 d3 24 70 a8 ba 85 34 ae 6c 10 78 | 6d 5e d6 eb 8f 8d 50 61 49 d9 29 7e 75 4c 77 31 | 66 2e 31 a0 92 eb 7a f8 f4 e7 7b cd ce 3d 2e da | 2d 1a c0 d1 45 04 86 ca 83 db 55 12 39 a3 0a ba | 8b a6 f4 f6 3e 76 78 02 58 f3 33 d9 51 61 c6 a2 | bf c0 de 5c 94 63 72 18 36 78 66 57 a8 9d 99 fa | 21 c9 9d f7 df 21 82 92 c3 0a 8e 88 ed 7f 99 75 | 65 21 9e 23 ef 8e 3b ea 07 1f 6c 86 30 9e 73 ce | b3 a1 01 a7 b4 98 de cd bc ef c8 f6 d9 a3 f8 1f | 4e 41 26 b1 e3 01 cb 82 9e e0 b7 85 35 d9 b2 1e | cb 70 ab da a1 c5 e7 7d 5e 4e 9e d2 a0 f0 52 c1 | f0 07 d4 59 84 8b 7a 13 cc e6 ae 51 d5 67 30 ce | 71 7f 91 f3 a8 fa 43 d6 04 f6 0d 1e a1 33 e6 97 | cb 5b 4f c0 f9 67 17 e9 f9 6d 48 8e a7 e1 39 bd | d0 ea 05 81 5e 97 87 17 17 40 4a 0b 6b bd ac ba | cd b4 3e 2a 02 ab 7e 0e 24 e8 93 6f ad 5c 61 29 | 29 00 00 24 94 80 92 d3 bb 64 09 bb 75 28 41 ed | 17 89 3c b7 33 b6 c9 98 88 55 a7 2a a9 d4 c5 97 | 36 e1 b6 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c d4 56 b2 06 c1 c7 a9 8a cb d5 36 | d8 dd 69 b0 dc 4b d2 08 00 00 00 1c 00 00 40 05 | 44 90 05 99 7d c7 8e b8 74 21 2f 2c b5 c8 80 87 | de 2c 0a f4 | libevent_free: release ptr-libevent@0x7f496c022cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #267 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 d1 0c 8d 23 87 7c 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | c3 d1 0c 8d 23 87 7c 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.923803; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f496c022cc8 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | libevent_free: release ptr-libevent@0x7f499c0285d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #388 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10656.93911; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f499c0285d8 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | 29 00 00 24 e3 a7 b9 77 10 76 d3 84 87 df 4c ec | eb ae fa 7e 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c | e5 88 d7 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 | 53 de b9 65 f0 23 59 01 00 00 00 1c 00 00 40 05 | c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | 60 31 b3 7b | libevent_free: release ptr-libevent@0x7f49b4035f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #494 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10656.947466; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f49b4035f78 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | libevent_free: release ptr-libevent@0x7f49bc040fd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #450 spent 0.0958 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68fc8 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10656.955749; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f49bc040fd8 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | 29 00 00 24 a4 bc df d3 a5 ac 32 27 d9 78 ab 13 | eb 9a fd dd ed d2 d9 da fd 94 93 9b 85 07 d1 0c | 2e 23 4c d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 a3 64 88 f7 8b c4 8e 31 66 88 18 | ef 0b f6 ba 75 14 dd 0a 00 00 00 1c 00 00 40 05 | f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | 8e 66 bf 72 | libevent_free: release ptr-libevent@0x7f4994049828 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68fc8 | #502 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10656.96502; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003967 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68fc8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #268 | libevent_malloc: new ptr-libevent@0x7f4994049828 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 6d 3d a7 43 f9 27 d1 b8 f9 f4 12 1a 13 35 6f | e4 17 c1 e7 d0 fd 6e 06 ea 58 41 98 43 ac 76 cb | 1c ea bf 7d fa 71 94 9d 5f 4f ea bd 88 8f 4e db | 0a a6 97 fa 1d 5e 23 25 4e 05 e6 15 35 79 68 bc | 51 aa 78 d3 c2 03 4d 5c 30 0c 7c 74 d7 d5 d9 1f | c8 cb 5a 8c f3 ce bf df 5f 52 31 31 30 70 15 84 | d9 c6 9d 7e 75 57 8c 73 99 27 f6 bb fe a5 98 3d | 2d 9d fb b2 cc 11 42 c8 1e 4e 56 9c fc e4 d2 b9 | ce 2e cf a6 f9 e1 bf 96 05 00 0f 28 11 0e f5 be | ce 5f d4 1f 4e 6a 4c f0 dd ef 8d 1d fd a8 90 90 | 22 03 09 5d ad 01 68 eb 9b b4 f8 92 bb 51 40 e6 | e2 16 a9 63 03 8d 2b 7e 6d 7c cd ab d8 4d b0 fc | 53 0e 8c 8d c9 d6 30 56 0c 3c 52 b4 93 0f 35 33 | c4 be 54 b9 e9 6d 1f b5 ce 10 42 02 76 d4 7f 79 | 18 06 36 9b e4 3d 51 32 2d 3a d4 00 ff 2b 81 f2 | 61 f0 73 9f 27 97 6b 62 d0 43 40 82 5a 95 c0 1d | 29 00 00 24 4b 28 b2 f8 cb ca 26 2d cb 52 fe 99 | 10 b9 44 75 07 4f 29 89 5f 6e eb 34 9a 76 56 e0 | cd e2 4a 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 43 ff 95 10 ed a2 e0 be 55 a9 62 | b7 3e 58 21 14 55 ef 7c 00 00 00 1c 00 00 40 05 | 7c 25 b2 b3 34 7a 27 f5 37 c7 23 40 26 c7 eb a6 | 02 ce dd 1a | libevent_free: release ptr-libevent@0x7f49bc0256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | #268 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 27 27 5f 45 bb 64 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | d2 27 27 5f 45 bb 64 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10656.9683; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002247 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f49bc0256e8 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | libevent_free: release ptr-libevent@0x7f4984033488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | #479 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10656.985591; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f4984033488 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #389 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.001844; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | 29 00 00 24 23 46 9e a2 d2 02 ad 06 61 c4 c1 de | 0f 9e 45 25 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 | 95 ce 52 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 | 29 e9 4b b6 9e 67 fa 0c 00 00 00 1c 00 00 40 05 | 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | 81 9a 48 25 | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #495 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.010135; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | libevent_free: release ptr-libevent@0x7f49ac02dd98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #451 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad15e8 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10657.018412; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | 29 00 00 24 6a df 41 aa 43 24 5d df 47 18 db 96 | 96 68 11 71 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 | 53 6c a4 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 | b3 b3 b6 ff 76 34 ab 12 00 00 00 1c 00 00 40 05 | 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | 22 3f b9 17 | libevent_free: release ptr-libevent@0x7f4998049598 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad15e8 | #503 spent 0.0879 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.033768; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad15e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #269 | libevent_malloc: new ptr-libevent@0x7f4998049598 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b fe a6 0c 07 e5 e4 be c6 de 88 7a 05 6c 59 7f | 2c e8 73 12 df bb ef 75 1f 69 f3 04 1f e6 be bd | 0b 84 19 dc 92 e5 de 2e 51 39 1e f4 2f 6b c2 e0 | 91 51 64 7b 68 64 2f 97 71 8a 69 13 ff 46 e5 4e | 7a 4c 7d e6 9a f5 f3 bc 0b 62 56 f6 f6 a6 13 96 | 18 1c b9 5d 34 0f 52 c2 42 b3 30 26 fc 72 ba 3e | 7b f1 cb 74 b3 47 a5 54 f2 40 c5 87 6e 1d de ac | 29 a4 92 98 4c 53 19 47 39 8e 9a f2 e3 2d d2 23 | d4 ea 31 a9 c0 bb cf 18 23 70 00 ad e5 47 67 86 | 58 22 be da 23 74 b7 bb 92 0c 1a 62 3b 92 1f fc | e1 6a 1a 91 66 8a 34 85 06 98 d9 df ba 96 04 2e | ac 57 37 55 69 a7 3d 63 77 80 0a c7 e1 fa 2d 18 | f9 68 18 ce a0 14 23 2e c2 35 77 8e 95 19 7a f8 | ca 61 02 c3 56 5e 5a e3 c3 b7 65 b5 8e fb 7d 8b | 16 3c 71 55 be 6b 1a 05 a8 c7 d7 92 3a 1e 43 90 | 1c dd 7d 0a 00 41 67 c8 54 5e e2 d1 5e 3d c0 77 | 29 00 00 24 07 c3 4f b8 08 78 7c 9c f3 2e c7 8e | 0d 6d 46 1a 48 e3 03 93 87 fa ea 50 da 88 cd 9e | ac f3 5b 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 33 cc df 94 ba 53 62 55 0d 32 46 | af 1c d7 c9 3d 37 8e 07 00 00 00 1c 00 00 40 05 | 58 c4 d5 21 2c a0 bb d5 82 39 50 30 1a 1d c9 d9 | ed e3 d5 c4 | libevent_free: release ptr-libevent@0x7f4994028648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #269 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 7a da bb 3d 3e 84 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | c2 7a da bb 3d 3e 84 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.038056; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f4994028648 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #480 spent 0.0828 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.06549; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | 29 00 00 24 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 | 8e 41 9a 8c 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 | 0d f1 36 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba d6 cc d8 42 54 a7 fe 61 5b ca f1 | 36 92 a6 77 db 6f 08 a3 00 00 00 1c 00 00 40 05 | d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | 92 7e bf ac | libevent_free: release ptr-libevent@0x7f4984022d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #496 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.066922; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | libevent_free: release ptr-libevent@0x7f49bc030908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #452 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.074 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.069475; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f49bc030908 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | libevent_free: release ptr-libevent@0x7f498c038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #390 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0837 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 1 | retransmits: current time 10657.078954; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500839 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f498c038bb8 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | 29 00 00 24 0c da a4 86 c2 a1 85 08 e3 8c e5 ab | 08 04 21 15 d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b | 86 e6 76 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 99 80 26 7e 80 26 83 7e e1 f2 65 | 5a 6f dd 9b e9 af 20 64 00 00 00 1c 00 00 40 05 | af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | b0 83 1b d1 | libevent_free: release ptr-libevent@0x7f498c049dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #504 spent 0.323 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.146 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2da88 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.101635; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f498c049dc8 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | libevent_free: release ptr-libevent@0x7f4994017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2da88 | #481 spent 0.28 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.116 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.106202; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006889 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2da88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #270 | libevent_malloc: new ptr-libevent@0x7f4994017cf8 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da fa 49 42 3a fd 83 3c d2 2d 16 14 49 b3 8c 55 | 34 46 07 b9 2d 32 7a 45 af 67 16 fc 13 f0 94 f3 | f2 c4 e9 89 aa 4c 18 b6 9f 90 bd ff 86 5b 7d e7 | 9d d8 0c c3 d9 17 5a 3f 71 4f d7 dc 82 00 eb 89 | 50 65 07 c2 5e ed af fc 8e 48 5e 3d 2f 89 94 66 | 3c f4 c3 ff 6f 31 e0 66 98 bf d0 7d a4 29 c6 74 | 6a b6 ab 85 53 bd 47 2b ae b8 34 13 fb 54 3c 76 | 40 73 12 33 df 31 e3 29 74 50 3b 03 9c 8f 30 e1 | 91 cf 6f df 09 5d 1c 39 e9 92 76 62 05 4b d8 6a | aa bb 15 39 2e 6f 10 5a d0 64 ce 47 8d 1c 55 14 | 89 95 b2 ff 62 fc d4 c8 e7 79 a0 af ee fc a0 a7 | d6 42 ba 11 dd 6d 8c c7 bd 80 b4 69 25 99 7f 5f | b9 25 86 54 a9 0f 5f b8 48 4d 36 c2 7c eb 53 81 | c5 64 4a 1c 68 95 46 b4 40 bb 54 f7 eb c2 b8 0d | 86 6c 17 2e 57 18 4a a1 8a 25 c1 5e f1 cd d9 27 | 13 7c 52 db 6c 38 60 01 59 7e 80 64 db 45 6e fb | 29 00 00 24 bd 53 ba a6 47 64 38 9f b5 99 d4 af | 8d 26 c8 48 07 cf 59 c8 f1 fa f2 81 c1 0d 86 7b | 7b 90 f4 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a 6f 17 76 60 d3 c5 07 f8 bf c6 26 | 2d 4c c3 8f c3 6a ee da 00 00 00 1c 00 00 40 05 | 57 31 db 9a 2e 6c 5a 1e a3 50 50 39 28 dc 54 92 | 36 bf ea b9 | libevent_free: release ptr-libevent@0x7f497801d998 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #270 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 86 13 d2 eb 1e d5 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 27 86 13 d2 eb 1e d5 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0801 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.127627; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f497801d998 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | libevent_free: release ptr-libevent@0x7f49b4030608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #453 spent 0.195 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0891 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.130127; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f49b4030608 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | 29 00 00 24 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 | f6 5c 32 38 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e | b9 af 03 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 3b c4 a0 4e eb 77 67 fc cf 56 aa | bb 93 30 1b a3 4a 6f 76 00 00 00 1c 00 00 40 05 | fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | cf 50 46 7e | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #497 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0829 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.137554; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | libevent_free: release ptr-libevent@0x7f4990038f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #391 spent 0.239 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5d588 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.162151; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f4990038f08 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | libevent_free: release ptr-libevent@0x7f49b8041948 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5d588 | #482 spent 0.429 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.223 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.172035; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5d588 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #271 | libevent_malloc: new ptr-libevent@0x7f49b8041948 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 ea b9 42 26 ef cb 9f 78 4d 16 71 27 aa 5c 1d | 30 b8 7c f4 b5 7a ee b2 65 6a cd 5e 5a dc cf e6 | e8 0f c9 ac 58 53 ab e7 64 85 81 06 1b e6 01 ab | 9d d5 22 af 60 03 53 93 65 bf 99 f4 d7 93 fd 7e | 3f c4 a2 cf 9f 1d c6 00 67 b6 fa 10 2e 9d 69 52 | e4 0b 4a 13 e9 37 f3 5e 2e ed 73 80 55 26 7e 7a | 27 a7 02 03 93 e8 11 20 67 b9 07 98 39 fe 9e bd | fb 5e 41 c5 32 48 fc a0 d1 64 c7 74 47 ce df 7a | 25 87 6c 83 e1 1c a1 fc 81 f2 61 17 f5 2e 12 e7 | ef f8 8b 37 88 d0 69 63 b7 4e 2b f8 29 f2 4f 6a | 56 b9 31 35 1b 7c da 69 e7 9f d2 0f a0 97 bb 4b | 4d fe 6a a0 ec 08 e0 c2 da 86 5b d7 2e 23 bc 96 | c0 43 b9 c0 b6 bc 17 46 8e 5d a6 5d 20 14 e4 b6 | be d5 cf 66 5b 4a af 65 39 ca 32 e8 4a d1 45 8a | de b6 ea 46 8c 64 f4 0a 0e 7f b6 c9 6c 6e 7b 4b | 2c 16 d2 16 bd 23 d9 b8 e0 29 68 b2 b9 93 21 59 | 29 00 00 24 1d 82 f2 57 7d 36 be 04 65 dc 9f fc | 41 65 5d 4f c4 c2 58 9f 58 ed 90 2b 72 40 37 96 | 94 20 00 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 2c 32 15 02 25 73 b4 74 70 51 | cb f2 a0 71 ae 4c c4 3c 00 00 00 1c 00 00 40 05 | 35 92 aa 5f 24 13 19 56 4e 96 99 7d ce 8f ed e9 | d6 b9 64 a5 | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #271 spent 0.392 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e a0 a7 e4 45 46 e2 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 9e a0 a7 e4 45 46 e2 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.186912; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #454 spent 0.394 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.199781; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003715 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | libevent_free: release ptr-libevent@0x7f4984038c38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #392 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.200471; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f4984038c38 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | 29 00 00 24 56 9e f4 16 12 f8 89 df 66 51 be 2a | 1b ac 38 dd 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 | 71 30 8c a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 | fa 1e 4e 52 6e 6a 7f 5c 00 00 00 1c 00 00 40 05 | a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | 94 aa f7 cb | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #498 spent 0.33 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a418 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.234273; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003397 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | libevent_free: release ptr-libevent@0x7f4998028438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a418 | #483 spent 0.433 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.238152; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a418 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #272 | libevent_malloc: new ptr-libevent@0x7f4998028438 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 32 7f 36 5d 5c 18 61 3a 9f df 2a b5 2b 21 88 | 66 9c f0 b5 9c 21 61 73 43 5c c0 91 53 38 23 32 | 8b 54 5f 34 e4 41 71 97 f1 38 86 9d 28 2a 5f 22 | ef e9 da 7a a9 dd 42 15 61 9f 92 01 e7 87 c4 ad | c3 d9 39 9f 47 cc ba d7 3d 0b 83 1f fa 4e 5f ed | 28 9c 43 ab f1 6c 18 89 07 3a a3 9e cd a1 64 db | 1e 4c 1b aa c2 ec 5b 02 35 5a 9d 26 62 b6 27 cb | 34 aa 0a 9a 6a f0 43 67 21 5a 71 0a 15 5c a0 bb | b0 4c 52 1c 81 f8 52 f0 05 0c ab ee 50 08 7a 6e | 22 bf 9f 71 ee 63 04 8e c8 71 42 83 9a 7e 6d 1e | 16 97 13 f1 d1 5e 5a e1 20 a5 3f 50 c8 e6 1c 34 | a7 e4 7a 9b 4f 16 e9 7f 92 6c ba 1c d6 e1 f1 70 | 3d ca 9e c5 76 8c 3b 03 20 b9 7d 0b 4e 2b 62 80 | a5 8d 6a 39 7d 67 1b dc 93 86 8a 9f a2 e6 f2 8d | a7 f2 f6 ec 67 34 db 13 19 8f 03 3e d8 81 27 f1 | da f8 21 df 54 a8 ed a2 27 25 4a 2b 25 1f 15 61 | 29 00 00 24 df 8f 0c ef fc ef e5 68 63 2e 88 2a | da d7 47 75 ca 56 c9 5e 13 38 42 1f df fa af 21 | 4f e7 ba a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 8c c7 5c 6b 63 63 08 c4 23 1b 9b | 9f 11 c7 c3 5f b4 5d 5b 00 00 00 1c 00 00 40 05 | cf 2b 6b 9a 91 90 7f e0 71 75 f7 5c 3e 18 4a 2a | 49 5c 0a 4e | libevent_free: release ptr-libevent@0x7f498c0283d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #272 spent 0.407 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 91 88 5c a6 f3 f3 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | 92 91 88 5c a6 f3 f3 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.265008; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f498c0283d8 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | 29 00 00 24 a9 0b 28 38 2e de 26 e9 76 17 33 4c | 94 7b a2 b1 a4 23 3a 31 ea 41 71 23 a6 cd b8 69 | 1b a5 53 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 02 d6 6f ac 39 1a fb 71 6e 39 92 | 4b 5a 34 27 ea bd 0b d7 00 00 00 1c 00 00 40 05 | fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | 5a 51 13 ab | libevent_free: release ptr-libevent@0x7f497403e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #499 spent 0.434 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.271948; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f497403e5d8 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | libevent_free: release ptr-libevent@0x7f49a8038f48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | #393 spent 0.405 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.274874; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f49a8038f48 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #455 spent 0.507 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.301803; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | libevent_free: release ptr-libevent@0x7f4994012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #484 spent 0.526 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6bd78 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.327804; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | 29 00 00 24 b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 | 27 bd ef b5 b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 | 78 29 16 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 | 78 19 5f 00 a2 d7 7a 84 00 00 00 1c 00 00 40 05 | 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | 5a fb e6 0b | libevent_free: release ptr-libevent@0x7f498003e6c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6bd78 | #500 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.331645; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6bd78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #273 | libevent_malloc: new ptr-libevent@0x7f498003e6c8 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 38 1f 25 f6 ec c0 8f 7f 6a ca 77 ab fc 5d 3e | a4 47 38 94 31 5d ce 15 84 bb 11 f0 f4 1c 8b 9b | 0d 5d d1 cc e4 09 6a 5d 77 63 22 7f 75 91 d3 79 | 3c eb 15 86 fb d8 c3 d0 56 4d de 8f 14 4c 5d 2a | 96 5a 46 ff 46 c6 65 0d dc e9 60 2c b4 cf 23 3d | 5d 4f e1 58 76 81 f1 1e 2b 86 3f c0 e2 4e 6d 8a | 55 bb 2f 70 a2 3f 2a f1 92 63 ef 1d ec 7c 05 65 | f6 7e f6 f9 99 ec 2d 60 84 82 c6 c9 00 23 3e a7 | a7 74 5e 2a ee f9 a3 b5 21 9d 2f 39 f5 b8 86 0c | 8e 4c e2 0f d8 c6 ba 85 d5 fe 86 cb 79 73 fb c8 | 27 bf 77 26 fc 9d 71 a5 c3 2f 63 b3 57 88 ce 6c | 0c ac e4 3e 51 65 cc 3e b7 0b 45 d9 1b 8c 06 2f | 1e cc 95 01 bb c8 fd 52 18 48 1e ec da 7e f2 19 | ef 25 0d 02 c9 3e fa b6 33 37 18 8c 8b 85 08 cf | 7a 4f 13 bc a7 6c 45 b6 d2 22 55 5c 29 70 71 dc | 47 f5 8f af 99 a8 83 54 06 33 f5 1e e0 23 b3 37 | 29 00 00 24 fc 4c 31 23 03 ae e4 bb d8 d9 9f c1 | be 7f 0e df 53 2a 38 86 ee 30 d8 17 c6 b3 42 8a | 38 95 ab 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3e b0 da 39 48 5f 7c 3f b5 e0 e8 | 1f 1b ad 60 55 8b 8a ba 00 00 00 1c 00 00 40 05 | 77 fe 98 f1 73 96 3c 96 15 96 7f ee 5d 9c 18 40 | 94 f3 89 ff | libevent_free: release ptr-libevent@0x7f49b402aea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #273 spent 0.324 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a c7 dc da 6d d4 42 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | 7a c7 dc da 6d d4 42 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.334306; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f49b402aea8 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #456 spent 0.292 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.338002; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #394 spent 0.211 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb928 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.365455; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | libevent_free: release ptr-libevent@0x7f498c0123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb928 | #485 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.390794; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb928 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #274 | libevent_malloc: new ptr-libevent@0x7f498c0123d8 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 b8 16 fc fe b6 b2 0e c3 7a d9 30 1c 0e 7e 0e | 08 e8 23 98 83 6b 93 f2 cf 14 56 22 f8 3e ab 15 | 74 53 c2 c8 59 9f 0c f2 72 4c 7d 6a b3 20 68 a9 | 3f 6d 2e df b4 a7 26 db 17 23 42 74 89 b8 50 c4 | 80 10 31 59 f4 37 62 df 7f 8d 25 c2 c8 81 13 a1 | aa 75 33 09 11 ae a8 c4 ba 69 05 67 fc 8a 5b c2 | 75 25 e8 91 16 58 08 be 4e 69 4d db 4a 01 15 3d | e0 5a a8 30 44 70 a9 f3 c1 91 b4 5a 27 f2 35 26 | f7 e8 66 f2 a3 b9 ee 0e 38 19 8e c1 c5 08 5d c5 | 02 53 03 93 43 30 77 1a e0 2d 22 9c 5f c0 b8 1d | bf f2 04 b3 b0 74 8e 02 8b 92 01 fb a9 ea 0b 2d | 0a 44 8b 9f 57 a7 19 3b 3f 7a 5c bd cc 19 62 a7 | e0 53 a5 38 23 31 44 03 1c 09 61 8a 08 7c 2d c8 | 83 ad 6e 4d ff 38 70 49 7e 23 9b 39 21 d2 88 8f | 2e c1 45 81 77 4a 23 74 c3 e2 9e 10 75 47 f1 02 | d0 74 b6 fa cd 90 7c 04 25 d0 74 65 c6 a7 e5 c4 | 29 00 00 24 50 8c 31 2a 23 8d 81 8c a1 22 08 e3 | cc 05 26 86 0b 8c ec 22 a0 b9 3b 35 85 2a e9 00 | 67 18 4b 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 50 3b 16 e8 47 16 0d f7 6c ef 43 | a3 32 b4 88 ab 9a 44 d5 00 00 00 1c 00 00 40 05 | b1 8f 12 ad dd c5 af 4a e8 0c ef bf ef 97 ac e0 | d2 f5 f7 56 | libevent_free: release ptr-libevent@0x7f49880283d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #274 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 2e 48 4e b1 1f 83 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | fe 2e 48 4e b1 1f 83 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.392084; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f49880283d8 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | 29 00 00 24 76 88 4f 06 94 72 ce 77 34 ab c1 ce | 30 0f 6c 6a 03 46 20 57 64 80 23 52 49 ec 2c 3c | fa a3 3a a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc f2 54 8e ce f6 a3 29 a3 3a 88 55 | fe 0e 47 7d cd cf fb bc 00 00 00 1c 00 00 40 05 | 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | ed 7a 46 06 | libevent_free: release ptr-libevent@0x7f496c03e738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #501 spent 0.0819 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.393318; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f496c03e738 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #395 spent 0.0807 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.394552; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | libevent_free: release ptr-libevent@0x7f497c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #457 spent 0.0805 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae5ab8 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.431838; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003924 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | libevent_free: release ptr-libevent@0x7f499401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae5ab8 | #486 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da51d68 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.452105; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae5ab8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #275 | libevent_malloc: new ptr-libevent@0x7f499401d568 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f e5 57 be ee 6d ee 85 bb e4 36 ba 55 56 e1 36 | a4 bd dd 99 e2 cb 21 32 46 a8 99 7e a1 45 ad 1f | e9 d3 14 41 9a 65 72 6d 27 f2 e7 2f 85 d3 a9 f3 | 91 be a1 17 7b 3d b2 41 fd c0 eb 8f ee cb 40 55 | 5c 1c 9e 09 3a 5e c4 59 86 57 08 d7 8a ff 1c c2 | 44 1a 2d 8d f7 a1 41 42 d9 b3 27 89 88 2b e0 25 | 9d 25 84 84 8c b6 6b 13 c4 c0 21 a7 8c b8 5f ce | 86 e0 a7 2d 09 50 56 55 55 3d 33 08 e1 04 bb ef | 17 b0 f9 ef 8b 6b f7 7b 17 30 cd 19 12 5d 17 bc | f4 1a 63 7c ad 07 79 00 35 8b aa 9b a9 7a 8a 6b | d8 fc 14 06 35 0d 41 f4 82 2f de 6d 8c aa 0f b5 | 49 5d aa 03 4a 8f e7 a7 01 b6 77 20 3b 6e 04 89 | f4 e6 0d 58 cc 04 36 84 8f 5f 94 e8 90 af 94 12 | 70 6f 2c d9 f5 b7 df 8f 1d fb 9c a0 15 31 56 7c | ae 65 6c ea 80 15 82 2f 68 0b 33 a9 b4 93 0b 24 | 16 12 a2 74 bb 13 49 bb 47 71 3e 43 ab fd a0 de | 29 00 00 24 53 d9 fe d9 ba 86 88 66 91 42 26 3e | d4 7c 0f f5 ff ae ed a4 a4 cd 8b 44 15 73 8d 00 | 79 e3 f1 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 3c 07 d2 9a 46 00 89 54 50 1f 8c | 01 39 86 a5 6f 1f 63 27 00 00 00 1c 00 00 40 05 | 4e 08 ef a4 61 cc 4f 63 34 21 9a 97 2f f1 14 8f | 77 c1 73 69 | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da51d68 | #275 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 41 41 a6 ec 22 a7 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | a7 41 41 a6 ec 22 a7 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.454493; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | libevent_free: release ptr-libevent@0x7f4974038f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #396 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.456873; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f4974038f28 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | 29 00 00 24 a4 bc df d3 a5 ac 32 27 d9 78 ab 13 | eb 9a fd dd ed d2 d9 da fd 94 93 9b 85 07 d1 0c | 2e 23 4c d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 a3 64 88 f7 8b c4 8e 31 66 88 18 | ef 0b f6 ba 75 14 dd 0a 00 00 00 1c 00 00 40 05 | f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | 8e 66 bf 72 | libevent_free: release ptr-libevent@0x7f49bc040fd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #502 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.456968; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003987 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f49bc040fd8 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #458 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4d708 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.494252; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | libevent_free: release ptr-libevent@0x7f499c017a98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4d708 | #487 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.509576; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4d708 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #276 | libevent_malloc: new ptr-libevent@0x7f499c017a98 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 47 fe b0 20 49 c6 5c 77 70 13 b6 da e6 34 57 | 6a 84 08 85 72 71 93 fe 5a 60 03 a9 6a 88 3a 2a | f4 58 67 31 4c 8e 5a 15 5b b7 f1 dd 07 4b f7 06 | e5 e2 27 80 5b 01 81 d8 ec 1a ce b6 fc b8 cc c8 | 5f e5 04 6c ff 63 19 1f d5 f4 7c 66 f3 c3 97 12 | 9c 27 0c 9c 3a 27 a2 61 b2 b6 40 e5 cb a9 a9 ad | 05 fa bb 4c 1e 06 d3 67 ef 61 3a 5a 56 af f7 42 | d2 b7 27 a2 4b e4 15 e7 db d9 28 58 89 24 60 d8 | c6 6a bb 8f 38 54 02 f8 2d 71 0d b4 90 ca cf 18 | fe c4 e9 66 a4 35 9f 8c a6 7b 48 27 ef 27 5e da | cc 8a c3 b4 88 8d 65 86 c2 2d d8 b7 b4 7c 96 fd | 35 49 9b 3c 65 e4 66 98 f9 43 bd 93 33 f6 49 ef | 47 5b 07 f9 fd f7 28 f5 65 bc 19 c3 e1 4f ff bc | 06 ea fb c7 4e 9c ae 13 9e 5a 2e 59 02 00 11 15 | 96 6b 8f fd a0 ee 40 20 3e 3f 23 bb c0 5b 0d a2 | 4e 9f 21 d0 88 ac a9 d8 ad 35 52 b0 6f 88 3c c6 | 29 00 00 24 6b e6 2f 28 e9 32 99 c0 41 53 d5 c9 | 2c 8d 72 da 2b b5 b1 a7 f8 dc 69 bd 93 20 55 7c | 61 f0 59 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 97 92 ac 06 ec 76 c7 aa 71 ac a4 | 1c cb 5d b5 73 ef e0 fe 00 00 00 1c 00 00 40 05 | 65 05 44 fe ef 6a 42 cf ed e8 cf db 72 82 a2 86 | b1 31 34 7b | libevent_free: release ptr-libevent@0x7f49b002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #276 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 9d b8 28 b5 93 65 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | a6 9d b8 28 b5 93 65 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0876 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.517988; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f49b002dc88 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | libevent_free: release ptr-libevent@0x7f499c02de48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | #459 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.518181; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00532 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | libevent_free: release ptr-libevent@0x7f4978038e98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #397 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.083 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.519581; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f4978038e98 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | 29 00 00 24 6a df 41 aa 43 24 5d df 47 18 db 96 | 96 68 11 71 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 | 53 6c a4 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 | b3 b3 b6 ff 76 34 ab 12 00 00 00 1c 00 00 40 05 | 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | 22 3f b9 17 | libevent_free: release ptr-libevent@0x7f49ac02dd98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #503 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0798 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6ae8 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.557914; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | libevent_free: release ptr-libevent@0x7f499800cbe8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | #488 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.56518; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6ae8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #277 | libevent_malloc: new ptr-libevent@0x7f499800cbe8 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 6f 7a bf 35 65 fd 90 d9 c3 de b8 03 48 76 c2 | e7 0d 02 8d 61 a4 8d 74 53 07 e6 10 20 e9 09 c1 | 86 2a d9 ec f3 b0 45 f5 f7 51 36 e7 3c 53 75 95 | cb 43 a4 24 ea 01 ec dc b9 cd 82 f1 0e 03 9b cb | ed c2 a8 fc c9 f8 e0 45 e2 1e 4d 3c a1 68 c6 25 | 77 86 4f 18 87 6e fe c8 b8 f3 c1 c9 59 2d b2 88 | a2 dc 18 4e 43 12 20 86 40 0a de 04 6a 98 19 ad | 91 79 08 47 3e 5e 57 f5 73 d7 34 a6 90 f7 1a eb | fc 16 fb 98 98 7a 77 07 19 72 10 b1 f7 4c 55 10 | 40 23 d6 b5 4c 58 50 ef fa 61 21 fe 9c b7 c8 ce | e1 41 e5 2a af 0d 3e 02 b6 f9 bc 0a d4 b2 92 d5 | 3b ca 33 b8 75 61 80 1e 3f b8 13 95 86 c3 b4 f8 | c7 8b 97 30 69 11 27 f9 6f 99 47 ca 56 e0 22 a6 | d6 c3 5d 95 75 f8 98 aa 2a 1e c8 94 07 cc f2 3f | 04 03 9d 89 9e 58 51 59 2f aa 1b 92 5e a2 d8 bc | 74 b1 63 62 df c4 73 fb 4a 89 0c 4f 29 c8 95 1e | 29 00 00 24 d8 e3 86 74 a3 bd 1d 6e 1c b2 c6 a6 | 5e d8 4b f2 17 7b 11 51 ec 3f 4d af 3a 62 e2 2f | b2 b6 96 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 9b c5 93 19 89 ce 3e 0a e9 5b 81 | 91 76 be 81 26 2e b8 2b 00 00 00 1c 00 00 40 05 | 94 ac 0a e5 9d ad b1 5a b2 1f 78 90 ff 06 3b 7b | a7 05 c8 b9 | libevent_free: release ptr-libevent@0x7f49b4014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #277 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c f5 c0 80 77 39 5b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | 8c f5 c0 80 77 39 5b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.57746; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f49b4014f58 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | libevent_free: release ptr-libevent@0x7f496c038fd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #398 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.578734; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003747 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f496c038fd8 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | libevent_free: release ptr-libevent@0x7f49a00333f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #460 spent 0.086 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 2 | retransmits: current time 10657.579959; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f49a00333f8 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | 29 00 00 24 0c da a4 86 c2 a1 85 08 e3 8c e5 ab | 08 04 21 15 d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b | 86 e6 76 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 99 80 26 7e 80 26 83 7e e1 f2 65 | 5a 6f dd 9b e9 af 20 64 00 00 00 1c 00 00 40 05 | af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | b0 83 1b d1 | libevent_free: release ptr-libevent@0x7f498c038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #504 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.624195; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f498c038bb8 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | libevent_free: release ptr-libevent@0x7f49b0038ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #489 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.63556; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f49b0038ca8 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | libevent_free: release ptr-libevent@0x7f498402dcc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #399 spent 0.0986 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3ba8 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.640806; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f498402dcc8 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | libevent_free: release ptr-libevent@0x7f49a003e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | #461 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0525 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.642124; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3ba8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #278 | libevent_malloc: new ptr-libevent@0x7f49a003e5d8 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f d8 dd eb eb 47 89 ab db 90 a1 dd 3d 17 68 cb | e9 1b fc 34 55 d0 7a 09 15 69 23 d7 a5 0d 05 02 | fc b9 47 05 36 70 76 89 61 fe 6d 57 09 25 c1 0f | 45 e3 75 0e 96 6a 66 a4 4f f3 18 53 80 1f f8 10 | 3d b5 f2 05 3e 66 4b a4 14 79 64 25 16 2e 16 3f | e3 1d a5 37 1b ff 78 1b 0b 91 8f ee 41 8a 2a 82 | 66 ec d9 10 c9 db 3b 19 b9 b4 30 10 d7 07 87 e6 | cd 19 a7 bd 8a 4f 65 37 e5 63 eb 03 af c5 48 10 | 5b cb 12 ec 83 1d 8c 2d 98 c5 34 5d 03 d6 31 86 | cb dc 04 9b 3f a7 db b8 57 64 22 29 7c d9 c3 de | 69 fd 6a 1f a9 6f 32 02 35 15 ab b6 f2 8b 5d 2e | 8e 94 07 88 7c 1e ef 6a 01 67 8f 40 d7 49 cd 8d | 4e 6f 3a c1 0a 36 2d 53 08 5a 69 f3 99 33 e2 13 | 23 4d ec d9 4e ab c8 5e dc 3b 6e e2 f6 5e 1e 6a | 0f c0 cf cf d5 4d 40 4a 95 5d 3b 5d e5 03 42 c4 | 4f 09 b1 18 0a ef 4f 3d 31 41 10 42 7e 99 76 0a | 29 00 00 24 38 80 2b d2 a4 50 a1 28 57 bd 46 78 | f0 f6 9b 83 ac 4d bf e8 d8 e0 9e 87 e7 17 93 ab | 5b 0e ab d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 07 0e f4 a8 8d e3 87 d6 ab 7f 9c 1b | bd f0 5c 81 5d 84 7e a6 00 00 00 1c 00 00 40 05 | c1 25 92 36 96 1e 6f af 82 9a 03 b4 34 53 b2 59 | a7 66 e1 f9 | libevent_free: release ptr-libevent@0x7f4978028508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #278 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 c6 c9 47 29 bd cb 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 78 c6 c9 47 29 bd cb 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.687383; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f4978028508 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | libevent_free: release ptr-libevent@0x7f49a4038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #490 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da818d8 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.698651; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f49a4038e28 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | libevent_free: release ptr-libevent@0x7f4994038ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da818d8 | #462 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.699942; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da818d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #279 | libevent_malloc: new ptr-libevent@0x7f4994038ed8 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 da ec 4a 0d 77 ae 8b fa c7 b8 48 1f 9e ff f9 | 24 d9 4d ac d9 c5 19 55 70 b7 53 68 b9 d4 4d 10 | 94 26 bf 0a cb 6b b4 4d 59 01 0a d5 77 9c f9 82 | 50 31 8b 9d 84 38 d4 a6 eb 88 9f 48 45 c1 06 ed | 96 fe a7 76 be f8 60 79 05 2f 21 21 43 3a 01 da | 3f 79 c4 e7 ca 1b 79 4b 60 63 d0 9a d1 5d be 02 | 46 2e a8 94 a7 ef 81 bb dc 34 ad f6 2f 40 55 af | 26 cc a6 f9 43 7c 71 2a 79 40 e5 be 8d 95 26 30 | 03 df b8 b5 1d c4 30 8d 19 93 81 ab 66 d1 dd db | f0 f9 06 94 e1 93 e5 40 6b ad 73 24 30 19 74 24 | 21 05 e9 59 26 5b 89 43 57 75 c2 84 13 e1 a7 34 | 4e 88 ee 70 e3 16 60 f5 1c 9d e4 7d 8a 58 63 a0 | c2 3f db 9a f4 a2 20 7a e4 23 dd 89 32 f2 27 b8 | 58 40 3c 3e 2d 88 85 1e 10 94 cc 05 a1 a4 a4 8a | f0 f6 5e b6 1a af 8c 2b 44 06 af 31 4c b0 99 8a | ff 3e 53 bb 80 4a bb 12 df 3a 83 17 5c 8e 33 03 | 29 00 00 24 88 c5 cd ef b0 ff e1 84 f3 84 ad 94 | 5c 07 b0 26 f8 d4 b9 0a 34 68 7e 23 b2 b3 06 3e | e9 ce 79 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 b4 99 0d 4c 8b a8 11 80 68 0d f7 | 15 1f d5 c0 1a f2 80 7f 00 00 00 1c 00 00 40 05 | bc 15 7a 55 f3 48 d3 12 de d9 df 44 e4 cf 0f fb | e3 65 73 47 | libevent_free: release ptr-libevent@0x7f496c028638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #279 spent 0.0849 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 76 ca eb 85 17 4e c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | 6d 76 ca eb 85 17 4e c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.707205; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f496c028638 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | libevent_free: release ptr-libevent@0x7f49bc01ff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #400 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.748501; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #491 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada278 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.755818; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | libevent_free: release ptr-libevent@0x7f4998043c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada278 | #463 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.760058; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada278 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #280 | libevent_malloc: new ptr-libevent@0x7f4998043c28 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 54 c4 d9 27 9d f3 8d 7f 4f 3b 7d 5b c6 d6 bb | a8 dd 9f 23 c3 3e b0 56 7d f0 8d b5 dd ba 8f 9a | 3f 5f 6a 78 2f 6f 0a 7f a4 da 46 90 f6 d7 00 27 | 6a 56 2b 49 77 24 ad 8f 44 7a 09 0b 40 ea b7 52 | 66 b4 b7 dd 7e c9 bb 60 2d 2c 99 d3 a3 e7 bb 2f | 72 ba 85 fa 4f e2 73 2d 82 4a f0 b4 0c 7b 24 6a | 49 f0 b3 63 48 2d 84 72 d8 18 01 57 dd 80 29 e5 | 7a 0b a0 e2 e7 87 22 d5 af 69 f1 3b d9 91 97 b0 | 0f 45 f7 3d 2d d0 a3 2e 7a 44 12 f7 bf ea 6c cb | 92 30 7b 03 72 1c 49 7e 69 88 cd 5d 4b 68 92 47 | b5 1f e0 be 70 9d f5 9b f5 4f 93 3e b5 05 a2 9e | 52 3c 65 58 8b 48 b1 50 9b 53 b2 9a ea f5 82 c2 | 52 d3 e8 5e 75 88 f5 12 22 fd 81 83 4c 99 3d 85 | fe 41 16 57 4c 51 e7 ba 22 79 14 de 1e f1 fb 76 | d0 51 94 98 40 09 8f f9 91 2e 5f 99 7f ff 08 99 | a6 87 3a cb 3e 21 b4 62 d6 c7 18 aa 41 06 6c 3e | 29 00 00 24 d8 6d e1 46 e3 9a a3 9c 66 6e 28 63 | 56 ac 80 43 1d 82 8f 2e 67 e0 87 e8 01 5f 51 5b | 25 9a ee a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ca 5e 4f 2e 37 4d 54 74 57 42 12 | 35 ea dc 5c 6a f4 eb 96 00 00 00 1c 00 00 40 05 | af 38 7d 6b e8 91 32 2a 7f 3e 27 a2 5b 39 34 90 | ac 3c 94 88 | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #280 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 97 ba 91 39 2b 36 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | 78 97 ba 91 39 2b 36 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.777303; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | libevent_free: release ptr-libevent@0x7f49b803c198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #401 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.809606; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f49b803c198 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | libevent_free: release ptr-libevent@0x7f49b401fd78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #492 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.832876; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | libevent_free: release ptr-libevent@0x7f49ac03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #402 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dada198 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.83815; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f49ac03e538 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | libevent_free: release ptr-libevent@0x7f4994022ed8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dada198 | #464 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.838302; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dada198 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #281 | libevent_malloc: new ptr-libevent@0x7f4994022ed8 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 f2 eb b5 68 c7 6a d2 33 6d 4e 14 35 de 02 35 | 6f f4 c6 cd 3d a4 43 d2 f6 01 d9 e4 2d 2e 85 06 | 4a 00 78 c1 1b c4 eb 83 31 18 4a 48 f7 f3 ff 23 | 06 82 75 81 c5 98 18 da ce e0 9f a9 ab c8 f6 dd | 10 83 0c 0b a7 79 97 67 ec b6 36 38 80 30 06 65 | 9f e9 ea ec eb c8 b3 34 12 aa 4e 36 e7 7c e5 50 | 2d 7a 1a 9b 42 5d a2 a1 64 0a 43 8a c2 df 3a 51 | f3 87 28 4e 29 98 67 84 fb 14 05 7a ce 38 79 8c | 1d a9 0f d0 b3 42 72 ce 77 36 73 a5 f5 73 cb 86 | 95 d6 c3 41 f3 da f4 32 b9 b1 71 1d bb 8d 0f d6 | 3b 14 36 a4 a7 a9 be 65 7a c8 eb cb 09 83 2a 9b | ca 48 b5 28 b1 72 94 82 47 e5 e9 0d 72 cb f0 3d | c6 93 0a 04 f3 69 5e a2 19 3c 30 58 fa ad d7 a7 | c2 bc 8d 14 42 f8 fa f8 3e d5 e0 cc 71 d9 6b f8 | 9e 64 b6 e5 73 cb 6c 29 27 d7 4f 7c 3a dc b2 6f | 90 8e dd 2b 0d d6 e6 25 68 99 64 ad 32 d2 41 6b | 29 00 00 24 df 74 56 fc 6e 72 8b 42 e2 64 0d a4 | 10 5f 7c d5 a3 83 44 35 cd e4 32 ec 45 4c 79 08 | d2 02 92 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de c2 0e 76 7b 1b b6 ab 12 ab ad eb | 5c d8 9b ea 2f 96 98 1e 00 00 00 1c 00 00 40 05 | d0 03 e2 1e c1 e4 81 01 d6 c5 89 95 9e 45 10 d6 | f0 d8 cc ed | libevent_free: release ptr-libevent@0x7f4984017d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #281 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd ca 1a 56 9b 45 8b 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | cd ca 1a 56 9b 45 8b 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.875562; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002435 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f4984017d48 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | 29 00 00 24 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a | 49 a4 f8 e5 f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd | 88 a9 b3 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 | 62 6f 96 2c 30 9b 35 42 00 00 00 1c 00 00 40 05 | e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | e8 0f 34 78 | libevent_free: release ptr-libevent@0x7f497402de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #493 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab2de8 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.895898; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004683 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | libevent_free: release ptr-libevent@0x7f49b003e468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab2de8 | #403 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.915264; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006188 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab2de8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #282 | libevent_malloc: new ptr-libevent@0x7f49b003e468 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 94 bf 5d 21 a6 58 f6 93 17 c0 46 c7 a2 d0 2a | 31 37 21 67 fb 4a ae dd f6 4f 6e fc 84 db 4e 66 | aa d0 8e 27 97 d6 6b 05 09 9e 3d 0b 18 15 8a be | 7b e0 b1 6f bd 2e a3 e1 6d d6 df c0 f0 ec 42 74 | 06 16 b4 1a b0 96 d3 f8 75 7e 30 f0 89 90 07 d2 | 85 2e 73 0f fe 8e fd 21 f2 05 f2 9d 22 df c3 13 | be 79 38 14 86 5d 9f 01 5f 65 58 98 ed fd 8a 6d | d1 75 3a 13 97 3b 8c 26 cf e8 61 30 36 52 d7 ab | f7 12 39 69 60 f9 d7 91 02 78 b3 19 0b 94 6c e4 | 14 04 74 be 90 bc 25 57 64 10 0b 67 83 19 95 0d | 7f c7 77 b9 e6 95 59 a0 5e 2c 13 66 8a 6c 1d 79 | 03 a4 b8 10 c4 ba 25 fc e5 56 37 63 09 78 11 5a | 4d 51 34 d5 4b 62 11 41 da d4 6d c1 8d da da 31 | 7d f0 ea 47 c3 74 71 8b 62 87 c2 53 c6 c9 35 b7 | 0b 82 d5 1a fe 83 91 92 fa 27 d3 b1 55 e5 2b d0 | 51 fc b9 25 64 e8 c5 09 25 e8 f6 06 8d 56 af 05 | 29 00 00 24 27 94 59 18 91 32 0e 12 28 18 de 65 | 02 e1 55 f6 24 a5 9a 5c 57 06 69 4d 8b 1d c8 17 | 3f d0 f7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d ef e6 34 60 a6 f0 55 91 12 62 65 | b2 d7 c4 73 73 2e 38 3f 00 00 00 1c 00 00 40 05 | e2 25 ba 45 4a 3d d9 fc 29 26 47 67 81 63 0b 2a | 38 f6 e9 b2 | libevent_free: release ptr-libevent@0x7f498c022c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #282 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 79 1c 1c bb 31 c1 27 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 41 79 1c 1c bb 31 c1 27 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10657.932651; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f498c022c78 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | libevent_free: release ptr-libevent@0x7f4984043c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #465 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10657.94092; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f4984043c18 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | 29 00 00 24 e3 a7 b9 77 10 76 d3 84 87 df 4c ec | eb ae fa 7e 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c | e5 88 d7 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 | 53 de b9 65 f0 23 59 01 00 00 00 1c 00 00 40 05 | c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | 60 31 b3 7b | libevent_free: release ptr-libevent@0x7f499c0285d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #494 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da731b8 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10657.959217; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f499c0285d8 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | libevent_free: release ptr-libevent@0x7f49a403ee58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da731b8 | #404 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10657.986512; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da731b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #283 | libevent_malloc: new ptr-libevent@0x7f49a403ee58 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e c9 8f 45 0b 4b 18 05 cf 63 4e d2 b7 05 b4 eb | ef 73 4b 77 8d f0 34 d8 e5 7e 68 75 5f d1 62 13 | b1 00 ae 5b 99 4f 39 b9 60 3e 4f 0b 96 97 d3 0e | 06 ec e2 ee 51 ee e2 7a fe ef 28 83 a3 c9 62 b8 | b5 aa 33 5d 91 14 f2 74 17 9d 69 b0 77 6b d4 96 | 07 fb 4e 02 f6 5b ea 3e cf ab 69 1b 5b 11 03 18 | cf 10 a6 51 58 e6 37 6d 97 5f cf 46 fe 55 3c 00 | 32 5f 9f e1 16 a9 44 ce 21 a6 47 5f e6 dd 70 df | 34 36 1b 54 82 4d 1f df 17 9c f5 9c f7 d3 a4 bd | 10 88 75 55 12 d5 0e 29 21 79 56 0e 4f 8f 69 d0 | 0f 8e 08 37 a3 c0 a8 64 dd e1 2c 8a a7 3e 30 b0 | 78 24 3a a7 76 2c 95 6d e6 5e 19 3d ed f2 86 35 | ab 1b ad 25 49 16 d0 97 35 d0 d6 be cf 93 79 bf | 37 a2 4d de 26 a8 91 22 0e 20 17 39 bd de 14 bc | 6a 2e 91 7a d2 cc a8 28 64 77 d8 7a 6c 4e b5 2b | 69 4b 2f dc 68 6f b9 43 af 84 9d 76 be bf 3e b1 | 29 00 00 24 2c 3b ff a1 c4 3c 42 cb e6 03 b7 05 | f4 49 44 c6 9f 6d 4f ea 85 d8 95 2a 8e 7b f0 0e | 80 ee 2c c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 72 4d 74 c6 b5 61 b8 03 f6 8b 3b | 36 9b 14 f7 e6 a8 f2 0e 00 00 00 1c 00 00 40 05 | 9b e4 de 65 ad 48 1c d6 d1 17 8f ae d4 4d e0 a5 | be 9b 3c 57 | libevent_free: release ptr-libevent@0x7f4990022bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #283 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 30 c5 c3 a6 f6 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | ac 30 c5 c3 a6 f6 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.003937; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00456 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f4990022bb8 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | 29 00 00 24 23 46 9e a2 d2 02 ad 06 61 c4 c1 de | 0f 9e 45 25 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 | 95 ce 52 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 | 29 e9 4b b6 9e 67 fa 0c 00 00 00 1c 00 00 40 05 | 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | 81 9a 48 25 | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #495 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.019323; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | libevent_free: release ptr-libevent@0x7f49a403f768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #405 spent 0.0972 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da021d8 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.022688; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f49a403f768 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | libevent_free: release ptr-libevent@0x7f4988033608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da021d8 | #466 spent 0.0882 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.057014; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da021d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #284 | libevent_malloc: new ptr-libevent@0x7f4988033608 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d a3 51 88 47 b7 6a 8f 0b 0e a8 ad a6 f4 f4 cf | ce 2b 98 b2 68 ac d5 4f 82 b2 94 d9 99 14 76 ee | 41 30 b7 e3 08 7b b7 6a 02 21 40 f5 dd 79 42 a5 | 52 4c 04 2a e9 b3 72 93 1d 91 97 2e 4b ce 27 ed | 54 bd 72 72 e1 20 71 c2 fb c7 66 35 f0 80 c5 73 | 3a b0 39 5e aa 2c 7e 23 8e 60 dd a8 31 4e fa 11 | 5b 2c cf 44 8c f7 54 a5 38 82 07 52 cd 2e 85 0e | 8b 67 d7 43 e7 c4 fc b2 da c8 b0 13 f7 c6 3d 71 | f4 a6 57 df 23 e0 9d 83 f5 91 8a d4 5d 76 48 51 | e3 e5 10 d9 bb 0d 36 8c 07 4c ab 75 50 3f 74 89 | b7 92 27 97 6d d8 44 f4 37 96 dc b9 3f 31 f9 22 | cc 58 82 bc 09 25 bd 81 a5 92 89 36 54 c4 ee 76 | 55 dd 36 53 de 43 56 ae 32 52 1e d7 6e 11 58 97 | 87 31 5e 49 e2 03 9e 07 f1 18 50 26 64 f5 f8 39 | a9 30 85 7d ba fe b7 68 5d 39 80 b5 78 1d 67 50 | af 5d 47 f1 5d ee 8d 84 5d 5f d2 e5 e0 da a9 fd | 29 00 00 24 41 52 1a 0d 1b 46 bf ce b3 5f 14 3b | 60 f5 ce 95 03 d4 97 e0 3d 5d 22 8c a4 32 ec ee | fd 14 3e 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 21 db 8b 72 5c b5 2c 3e 0e 91 de | 47 8a 25 4f 0d 8b e5 1b 00 00 00 1c 00 00 40 05 | 23 33 56 24 67 8c 43 91 95 a3 19 44 1a 4f 1f 27 | 54 2b 2d 06 | libevent_free: release ptr-libevent@0x7f49b002db88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #284 spent 0.234 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 50 55 b1 d6 70 de 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 58 50 55 b1 d6 70 de 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.066607; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f49b002db88 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | 29 00 00 24 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 | 8e 41 9a 8c 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 | 0d f1 36 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba d6 cc d8 42 54 a7 fe 61 5b ca f1 | 36 92 a6 77 db 6f 08 a3 00 00 00 1c 00 00 40 05 | d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | 92 7e bf ac | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #496 spent 0.373 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.165 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.074397; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | libevent_free: release ptr-libevent@0x7f49a803e5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #406 spent 0.338 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.176 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.078193; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f49a803e5b8 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #467 spent 0.344 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.161 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49840058b8 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.131965; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | 29 00 00 24 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 | f6 5c 32 38 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e | b9 af 03 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 3b c4 a0 4e eb 77 67 fc cf 56 aa | bb 93 30 1b a3 4a 6f 76 00 00 00 1c 00 00 40 05 | fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | cf 50 46 7e | libevent_free: release ptr-libevent@0x7f49b4030608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49840058b8 | #497 spent 0.591 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.132598; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49840058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #285 | libevent_malloc: new ptr-libevent@0x7f49b4030608 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 71 f5 81 7a 35 00 f2 42 f2 26 4c 27 d3 5d e1 | 7a 17 e7 9b d1 79 9b e9 37 20 6d 78 94 b7 76 44 | fe c7 27 56 eb 9d a5 8a 3d fc 38 35 1f ff b8 a5 | c8 e2 ff 73 04 35 43 e6 68 27 11 ac 64 54 df c9 | 30 24 c0 ff 24 e3 de 9b 6b 3e 21 49 da 3e ed 78 | b4 9f 8a 67 b4 4e 47 3a b3 a5 3e d6 ff f2 ff 0f | da 35 c2 68 f6 5d 96 90 58 92 65 76 b4 83 3a 62 | 5d a6 93 42 33 51 bd 12 1d e1 97 9e ba 24 7f f4 | fb f7 8e 4c 55 1c 18 48 f6 74 bb 95 63 e2 1b 55 | a8 94 97 05 2a c0 bb 8a a2 fc 51 9a 1b c2 16 19 | 6d 5e 17 cf b7 70 67 cb 9f 25 31 2c e6 0b fb 25 | 70 68 23 1c 4f 82 d9 11 a3 19 d6 d0 13 96 6b cc | df 5e 3d d0 b0 98 d1 42 06 6e fa f6 92 e4 7f 1f | 4c 42 d8 ac 9f 41 f5 7b fa f9 34 ad 88 02 2e 7e | 42 9c fc 23 c0 d7 53 7b ef 7a 15 f8 ce b2 ec eb | 6a 28 cc c6 fc 21 73 d4 ba 83 bf 03 7a ed 0a 79 | 29 00 00 24 c8 d0 02 e7 d9 12 fe bd fd 2e c8 13 | e9 be c6 ce e1 cc da 03 7e 76 1e 7b e3 a6 29 fd | b1 a7 26 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 5a b4 00 ec ea 55 ed 2c 75 c7 67 | 23 f3 d1 6b 49 c2 f1 5e 00 00 00 1c 00 00 40 05 | 0a 74 24 ff fe 83 a9 ab 40 04 b3 ac b6 ac 5c c8 | d1 f1 ae 56 | libevent_free: release ptr-libevent@0x7f49a802de28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #285 spent 0.354 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 5b 94 59 97 f1 29 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 57 5b 94 59 97 f1 29 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.239 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.1427; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f49a802de28 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | libevent_free: release ptr-libevent@0x7f4980044f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #468 spent 0.422 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.143151; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f4980044f08 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #407 spent 0.284 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.195 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.188 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.200003; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | libevent_free: release ptr-libevent@0x7f4974043f48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #469 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1da78 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.201348; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f4974043f48 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | 29 00 00 24 56 9e f4 16 12 f8 89 df 66 51 be 2a | 1b ac 38 dd 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 | 71 30 8c a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 | fa 1e 4e 52 6e 6a 7f 5c 00 00 00 1c 00 00 40 05 | a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | 94 aa f7 cb | libevent_free: release ptr-libevent@0x7f4984038c38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1da78 | #498 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.201475; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1da78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #286 | libevent_malloc: new ptr-libevent@0x7f4984038c38 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 8d 4e d0 db aa 8b d0 9a ba a1 a1 2a da a7 08 | d8 05 41 ac 8b e8 30 35 24 98 ae 9e 9c af 90 72 | 20 5e b2 52 54 ff bb 8a 7f c3 e0 00 f1 33 3f d0 | 67 df 8d 01 d2 d1 12 67 44 87 d6 fd 34 57 db dc | a0 2a 41 e2 c2 71 08 79 63 1c 1f 17 66 15 ca 3a | 78 fc b3 8c 2c 32 71 2f c5 b5 fb 6a 78 b2 18 4a | 5b 3c 90 a2 d2 29 3d 59 7a 51 cb 1b 14 67 90 d4 | e1 7a 10 cb 10 dd e6 4e 46 ee 8e 37 8c 87 88 e6 | 8f 31 d1 2e 8b ae 83 63 0b a5 86 70 ce 34 94 2a | f9 80 93 f5 03 aa bc 84 18 34 aa 50 05 08 9c a9 | 9a cc 55 07 b9 a7 9b d3 e1 fe 31 e4 ca 19 a9 c0 | 47 e2 80 32 57 80 8b 42 b0 55 49 03 5c 8e 13 0c | f0 3e 4d 5a 7b 0e 2f 89 2c 57 2e 76 f0 8a 60 81 | 3c 4a a5 35 e9 ab 40 81 82 7b 0a 5f da 8a bd 01 | 30 ae 6c 62 62 cc f3 f7 f5 5b e6 33 8d c6 65 bb | f5 ab d3 26 fa cc 05 54 65 69 c8 5f bb 89 6a e6 | 29 00 00 24 1c 25 98 b9 34 6a f9 dc 87 7b 5d 2e | 6d 35 d0 8b 30 45 07 4e 7f 4d a0 af c9 61 67 e6 | d3 b2 39 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 95 25 8f 91 52 c0 2f 36 63 8a 9d | d7 79 3d 13 55 95 7a 40 00 00 00 1c 00 00 40 05 | e4 51 77 1d f0 36 e7 e3 13 70 a9 d7 97 cc e6 91 | 0f 50 74 c6 | libevent_free: release ptr-libevent@0x7f497c02de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #286 spent 0.0727 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d d4 cd 54 e9 60 76 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | 5d d4 cd 54 e9 60 76 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db018 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.210761; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f497c02de08 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | libevent_free: release ptr-libevent@0x7f499403e748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db018 | #408 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.262119; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db018 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #287 | libevent_malloc: new ptr-libevent@0x7f499403e748 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 41 cc f6 5c 21 a1 f3 0d bb 79 57 24 2c 74 4a | 45 a5 e1 fe ae 3e 11 46 db 0f 35 b8 89 6b a5 fb | 18 ec 12 78 a4 40 ae a9 b5 f4 88 96 d1 b9 f4 9b | 07 40 e1 e7 a5 15 ee 65 39 b5 67 87 a3 b4 cb 93 | 5b 78 46 2c a0 d5 8a ba a2 85 d4 d8 4b 0b 58 25 | 11 2c 43 bb 4b 43 d4 f0 55 94 68 1b 27 b3 8f bc | d5 4e 5f 29 93 4a 0a 12 40 4b ce c4 a0 8f 7e 98 | 88 e6 a5 6c b9 4a d1 83 f1 70 ac de 00 44 03 70 | f2 4c 20 c4 b5 17 64 c5 c7 66 a3 57 2a 40 3d cf | 0e 99 2a 45 cd 3c 58 ac ec 0c 7f 3a 27 34 76 a6 | 6d 7d 94 6f fc ab 1e 05 f2 ab 4a 4f 29 10 71 4d | 97 99 b6 38 d9 41 7b c7 8c 17 81 dc ab 7b 87 92 | 67 45 37 f0 43 83 83 e7 dd 90 5f 05 7b aa e5 59 | 9b c3 59 e4 dd 59 c0 cd 48 f9 63 0f 7d 95 2a 13 | 3c 19 e7 4a a7 92 a7 06 eb 9b 30 42 35 b0 0f b8 | 77 b8 5b 9f a8 9b 67 05 8f c9 7b 26 70 5e 2d 33 | 29 00 00 24 23 65 e2 a8 03 f9 e1 8c 31 e5 fb c7 | 26 ec 55 3a d1 c5 5b b1 96 b4 6b a7 b5 77 32 21 | 23 24 17 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 9a 50 c0 5c a2 76 89 f0 c3 cd 04 | e1 9d 10 9b 76 f5 aa e5 00 00 00 1c 00 00 40 05 | e0 0a ce 41 30 06 c1 75 e9 4d fc 8b cc 3f 65 c9 | 8d c2 03 21 | libevent_free: release ptr-libevent@0x7f498002dd38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #287 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 00 bc c0 d7 71 e6 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 1b 00 bc c0 d7 71 e6 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.263515; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f498002dd38 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | libevent_free: release ptr-libevent@0x7f49a8049798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #470 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.266823; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f49a8049798 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | 29 00 00 24 a9 0b 28 38 2e de 26 e9 76 17 33 4c | 94 7b a2 b1 a4 23 3a 31 ea 41 71 23 a6 cd b8 69 | 1b a5 53 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 02 d6 6f ac 39 1a fb 71 6e 39 92 | 4b 5a 34 27 ea bd 0b d7 00 00 00 1c 00 00 40 05 | fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | 5a 51 13 ab | libevent_free: release ptr-libevent@0x7f498c0283d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #499 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.270193; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.001799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f498c0283d8 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | libevent_free: release ptr-libevent@0x7f4994038dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #409 spent 0.098 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.323481; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | libevent_free: release ptr-libevent@0x7f496c033718 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #471 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b28 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.328782; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f496c033718 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | 29 00 00 24 b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 | 27 bd ef b5 b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 | 78 29 16 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 | 78 19 5f 00 a2 d7 7a 84 00 00 00 1c 00 00 40 05 | 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | 5a fb e6 0b | libevent_free: release ptr-libevent@0x7f4994012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b28 | #500 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.328911; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008715 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #288 | libevent_malloc: new ptr-libevent@0x7f4994012388 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd d3 dd 9d 4b d1 70 27 ea 9d 43 98 c3 58 29 11 | 0b ae da c3 a4 1e f6 03 06 34 53 0f 42 a9 cc 51 | 01 00 3b 77 25 48 1b b5 ef fb 37 63 6d 18 28 01 | 37 f6 68 7c 36 6b 96 db 00 81 91 74 4f 62 9f c7 | 5d 11 c0 a8 1a 10 0a 6a 30 ac 71 6c ea 5e ae f3 | 74 e9 72 23 d3 5c fd 0d 7d bd 31 86 60 14 22 1c | 8b 8f ab 75 20 15 fb f2 3e 97 fd a8 e3 76 8d 90 | df d0 e1 77 60 67 99 a4 2c d5 85 69 04 3a 9b 70 | 8e 55 89 2a 84 0d 16 84 fb 30 ec d1 76 56 7d 81 | 9b 6b 80 36 6a ee da 7b 80 6d 9a 50 a6 ed 1a 31 | f3 23 15 29 a1 05 b4 f3 1b c5 00 2f ea cf 36 09 | 39 21 09 05 f7 09 56 27 f3 72 87 a2 d6 2a 7f 49 | 7f 53 b8 27 86 be b1 c9 93 bc a9 ba ec 83 fa 53 | 06 c1 7c f4 b9 fc 30 9b 12 d6 cf 73 39 41 b2 7e | e2 97 af 61 6d be dc 40 0e af cf 23 be ff 6a e4 | c5 f7 a8 fb 17 4c 12 a4 95 4f c1 21 95 4d 40 32 | 29 00 00 24 4d e1 46 0a 30 be 90 20 43 0a ba de | 17 c9 94 3b c4 26 a6 12 cf 9c 8b ce e4 f5 22 32 | e1 cb 12 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 bc 7a 12 ab 31 c3 f9 f6 c2 a1 03 | 3b 0a 58 ee ee 91 0d f1 00 00 00 1c 00 00 40 05 | 44 cb 35 4c 74 c0 1c 35 d9 80 0b e0 86 b5 bb c4 | d5 cf 72 14 | libevent_free: release ptr-libevent@0x7f499402deb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #288 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 4d 2d 62 c1 fa 7b 81 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | 02 4d 2d 62 c1 fa 7b 81 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.330229; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004631 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f499402deb8 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #410 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.386531; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | libevent_free: release ptr-libevent@0x7f49bc046848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #472 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da365a8 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.3878; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f49bc046848 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | libevent_free: release ptr-libevent@0x7f498c03e428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da365a8 | #411 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.387967; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da365a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #289 | libevent_malloc: new ptr-libevent@0x7f498c03e428 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 ab 6b f5 04 4c 70 3c e4 5e e3 3a d6 29 2b e8 | 73 d3 11 20 dc b2 c2 c9 81 3e 49 b1 3a 75 74 65 | e8 ce 11 db 71 dd e9 e7 99 07 47 ca a5 d3 03 ab | 41 c2 98 c3 ed 2c a9 a6 91 94 5c 23 8d 34 26 3c | 1e 0a 0c a6 34 a4 d0 e5 c3 53 0d ec 43 48 61 81 | ac 2c e3 96 cf 0f 05 ca 3b 75 59 60 b2 d3 36 27 | ff 1a be da 07 0d f8 8d 18 28 6b c1 26 f3 f4 f2 | e9 01 b7 ba fd 43 64 a8 0f cf 79 f3 86 a2 b6 a1 | 4c a1 4f c1 4f 8c eb ef d3 8a ef b4 e5 6d be 39 | 7a bf b6 56 ef a5 1f 71 4f 0a 77 59 65 04 3b 2e | 2c ec fb 54 53 e1 30 96 f9 ec c2 99 56 06 52 70 | 46 cf 74 75 6c 22 3b c1 8d c6 83 1e 2e 1d e8 c0 | 2e 60 23 82 44 4d 8f 93 aa 0f dc ed 3e 8f c8 af | f0 74 69 98 52 e0 98 17 80 4d 6e 44 7a 95 3f 01 | a8 54 a0 55 37 9a 68 86 ee 19 78 67 1f 01 c0 b6 | 89 97 a9 61 cf 95 ea cf ab 42 3a a4 52 17 2b f8 | 29 00 00 24 ab 3a df 10 1b 1e 59 c7 47 0b 22 ed | 38 6d b5 b5 aa 3e a8 5a 28 6b 3e 42 c0 e9 c3 0b | f8 c9 d2 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a 57 78 1a 63 50 35 9f 01 10 15 82 | 38 f3 e2 a3 df c3 7e 81 00 00 00 1c 00 00 40 05 | 0e 7f 0e 82 f4 9e 35 73 4a d2 bf 79 13 a6 c3 ad | 04 ae 87 26 | libevent_free: release ptr-libevent@0x7f498c022b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #289 spent 0.0958 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 a8 2b c3 e3 19 dc ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 24 a8 2b c3 e3 19 dc ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.393218; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003888 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f498c022b78 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | 29 00 00 24 76 88 4f 06 94 72 ce 77 34 ab c1 ce | 30 0f 6c 6a 03 46 20 57 64 80 23 52 49 ec 2c 3c | fa a3 3a a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc f2 54 8e ce f6 a3 29 a3 3a 88 55 | fe 0e 47 7d cd cf fb bc 00 00 00 1c 00 00 40 05 | 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | ed 7a 46 06 | libevent_free: release ptr-libevent@0x7f49880283d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #501 spent 0.0878 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da41e38 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.444479; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f49880283d8 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | libevent_free: release ptr-libevent@0x7f49b4046758 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da41e38 | #473 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.446792; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da41e38 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #290 | libevent_malloc: new ptr-libevent@0x7f49b4046758 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 83 c0 13 f9 ef bb ef 83 2f 25 80 8e a7 28 67 | f7 02 4c 89 24 5b 13 79 ea 7b 6a 4f 2c fc 37 ae | 9e a8 27 92 a4 47 46 22 af 01 e0 79 1e 70 21 cb | 21 17 ee 6d 9a 12 87 24 52 a0 58 7d ac 3d e5 f5 | aa a9 8a 1f 3c 0b 9c a3 ad 44 24 fd 60 fa 3d 82 | 1d 0e 15 c4 c7 98 6a 17 ee 2c 67 e0 e7 31 ea 51 | c1 be d6 c0 ec fd 56 4a a0 22 5b 91 b5 fa f6 84 | 9d 86 8e 23 ea 27 f2 d3 7f a8 96 50 55 27 65 00 | 79 d0 ec da da ca 59 a9 20 55 63 32 91 c2 03 26 | b0 86 58 e5 52 f1 06 d5 5f 45 ab fd 51 99 b4 43 | fc a6 c3 91 42 dc 66 ae 09 75 c0 a5 0c 7c ed 77 | 8b 21 7b 49 1d ff e8 ad 49 74 76 c7 74 24 a1 0a | 20 ab 0a 16 1e aa b6 36 50 b9 b2 26 79 21 04 41 | 8a 34 98 ab cb 8a aa 00 d6 75 36 5e e3 10 92 ff | c8 dd 0b d4 b8 b6 6f 2e ea 5c 92 a0 9b c8 2f e9 | e2 04 7b 47 86 67 b4 da 7c 30 5e ef 67 eb d9 34 | 29 00 00 24 3d 44 bb d9 4d ef 1f 55 76 35 7a b3 | 43 76 97 b9 2c b9 dd 6e 51 2b df da 81 8b a4 77 | 31 b0 47 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 42 bf b0 f9 89 02 85 76 8b 04 09 | 88 53 03 39 47 e7 c2 24 00 00 00 1c 00 00 40 05 | ef c2 f7 15 bb c8 43 a3 c1 96 3a fb dc 13 cb de | fc 2f 4f 5f | libevent_free: release ptr-libevent@0x7f496c02dea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #290 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a 1f 06 92 7e 97 d2 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | 2a 1f 06 92 7e 97 d2 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.451015; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f496c02dea8 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | libevent_free: release ptr-libevent@0x7f498c02db98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #412 spent 0.0832 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da23878 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.457252; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f498c02db98 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | 29 00 00 24 a4 bc df d3 a5 ac 32 27 d9 78 ab 13 | eb 9a fd dd ed d2 d9 da fd 94 93 9b 85 07 d1 0c | 2e 23 4c d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 a3 64 88 f7 8b c4 8e 31 66 88 18 | ef 0b f6 ba 75 14 dd 0a 00 00 00 1c 00 00 40 05 | f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | 8e 66 bf 72 | libevent_free: release ptr-libevent@0x7f4974038f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da23878 | #502 spent 0.0868 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.510495; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da23878 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #291 | libevent_malloc: new ptr-libevent@0x7f4974038f28 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 e3 f2 05 84 74 8d 0c 98 4e 2c 9a 6d d5 93 e9 | 59 26 05 20 49 8f 0c a0 51 b1 51 2d 97 94 e7 8a | 94 8f 57 32 bd bd c0 6c eb ae 71 62 58 a6 7b 87 | d6 b9 4a 66 61 cf cb ae 36 85 bf d3 39 b9 67 3e | ec 76 f5 63 c8 a0 f0 ef 03 1f c4 54 4d 17 ec 27 | 37 4a 03 3e 52 0d 3b 08 45 24 b0 cb 3d 1e b7 0b | e0 e3 42 6b 5f 92 24 01 d7 93 32 08 1a b1 4c 6c | 68 a1 a7 ab b5 3c b3 f2 b7 de be 44 ae 51 a1 9a | 06 e0 9e 10 22 3c f0 45 75 bf 38 78 8f 84 87 70 | b0 5f 8d de ce 63 e5 b5 71 20 40 4f e1 53 35 6b | f5 16 a5 42 3f c8 71 18 75 bd f6 fb ce 51 eb e1 | dd 99 57 a5 de 3c 7b 06 8c 8c 29 e7 ea c8 9a 87 | bd c9 5a d6 23 a1 e4 54 f1 45 c3 2e 9a 50 5d 07 | 3e bc 0b 8d 7a d7 19 00 17 23 86 63 89 a3 29 39 | 24 86 21 ff c9 f4 92 05 ab c2 07 0a de 7b dc 58 | df 9b 43 68 5e 79 b5 c5 50 09 f0 2b 87 43 c8 d6 | 29 00 00 24 22 03 2c a0 05 c3 f6 6c b2 12 6a f6 | de 10 70 5e 0b 81 d7 fe e4 1e 91 b6 6c f6 b4 99 | 43 f6 b0 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 7f 29 03 e0 cf 5b b7 3e 9f f8 93 | 9f a7 42 92 26 e8 77 b2 00 00 00 1c 00 00 40 05 | 56 b4 b1 a0 0b ad b6 a1 ff 02 f7 b7 81 49 f5 0e | 5b 35 8d 52 | libevent_free: release ptr-libevent@0x7f498c02dc98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #291 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 2e 30 10 47 3b 09 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 43 2e 30 10 47 3b 09 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.520846; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f498c02dc98 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | 29 00 00 24 6a df 41 aa 43 24 5d df 47 18 db 96 | 96 68 11 71 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 | 53 6c a4 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 | b3 b3 b6 ff 76 34 ab 12 00 00 00 1c 00 00 40 05 | 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | 22 3f b9 17 | libevent_free: release ptr-libevent@0x7f4978038e98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #503 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.529207; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f4978038e98 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | libevent_free: release ptr-libevent@0x7f49a803e6b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #413 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da92e98 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.538471; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003429 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f49a803e6b8 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | libevent_free: release ptr-libevent@0x7f49b8036ad8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da92e98 | #474 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.572819; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da92e98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #292 | libevent_malloc: new ptr-libevent@0x7f49b8036ad8 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 99 c7 f7 41 58 1e 8b d5 0c ed c6 a0 26 93 70 | 4a 09 4b d4 32 93 7b 44 0a db bc aa df 1e 05 a3 | 67 26 a5 41 24 0d 7d 4f 1e 69 24 c0 9c 3c 02 4e | cb 05 be 88 35 3e 63 e9 45 2a fe 79 37 83 54 db | f0 4b d4 9d 9f f3 01 55 6e d0 93 03 46 c1 29 4a | 0c f6 8c a1 03 4b bc 01 0f 77 dd bc 7a 26 03 10 | 42 78 36 97 d7 f9 a6 3f 5d 23 06 a9 f8 be cf 07 | 23 43 b1 a6 12 0b 67 a8 46 f4 6d b9 ea f0 22 e7 | c8 30 f0 52 de 94 b6 11 cb 29 03 c8 98 cd 0a 3c | 89 a0 82 fc 02 61 b9 52 d7 6e fa 8f 21 3f d0 55 | 63 40 77 aa 21 e9 ca 57 c6 7e 84 60 d1 b2 90 e9 | 3a c5 a1 61 23 6d 42 3b a4 61 50 69 05 8d 83 e6 | b6 a0 82 20 7f 35 4e b7 06 a3 bd 84 0a 58 6a c0 | e5 2d cc 8e 97 6e 99 d9 84 95 e8 3a ac da 09 0d | 69 e8 96 79 35 61 22 cc c4 50 ec b4 f1 19 76 12 | 77 fe 30 5b 62 20 23 08 8a 8f 55 05 21 ac 90 30 | 29 00 00 24 24 05 6c a3 9d 66 9b bb d0 27 48 c9 | 4d fd 69 c8 98 5a eb cf db b6 61 9e 0b 79 d4 7e | 4c a7 da 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd e5 ae ce c1 cc 1a ce 1e 9c 35 c1 | 50 5e b6 fd 80 64 d7 d1 00 00 00 1c 00 00 40 05 | f2 8a e1 44 fb d8 1c 05 ae ab e1 b2 aa dc 2a 4d | 08 39 4e 8a | libevent_free: release ptr-libevent@0x7f498402dbc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #292 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 5c 9b c2 ce c3 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | bc 30 5c 9b c2 ce c3 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 3 | retransmits: current time 10658.581212; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f498402dbc8 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | 29 00 00 24 0c da a4 86 c2 a1 85 08 e3 8c e5 ab | 08 04 21 15 d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b | 86 e6 76 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 99 80 26 7e 80 26 83 7e e1 f2 65 | 5a 6f dd 9b e9 af 20 64 00 00 00 1c 00 00 40 05 | af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | b0 83 1b d1 | libevent_free: release ptr-libevent@0x7f49a00333f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #504 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.590542; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f49a00333f8 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #414 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0878 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da649b8 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.632931; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | libevent_free: release ptr-libevent@0x7f49b8025858 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da649b8 | #475 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.635222; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da649b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #293 | libevent_malloc: new ptr-libevent@0x7f49b8025858 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 e2 86 8c c5 d5 1b 1c 88 b8 ee 0f 54 53 d3 24 | 59 a9 f7 fb 89 5c 41 36 c7 64 13 8c a7 6a 87 49 | db 2e b4 6c e0 6d 41 f0 6d 2c da 80 0a 44 9d 70 | 53 c5 94 65 f6 8d 47 fa 42 15 0c aa ca c5 6b d6 | 97 4e eb 05 ca a0 89 7d 97 a8 33 a2 64 fb e7 e9 | c0 4c e8 ea 38 18 d4 a3 8f 84 08 a5 4b 77 90 e8 | 0a 70 67 be 4a fd 2c 0f d7 df 38 fa ee 3d 2e 6f | 8c a1 5a b2 67 0f f1 04 36 94 ce a7 7a 9c 86 95 | 94 4d 11 eb e2 9a 9b 9d 9e 80 ca 75 b6 e8 1f 9c | 78 06 0a ec dc c0 01 af 88 11 a3 78 40 be f8 3f | d4 b0 c9 1d 8c 30 4b 98 89 c1 e6 b9 43 af 1e df | fd dd ac 0c 61 b7 bc 02 d5 75 c2 46 ee af 4f 2a | 8e 88 d3 7a 5e a5 ff 9c 1a ca 63 d0 31 fa d4 7e | 6d 93 ed a8 a6 f8 7e ab 22 5a a3 55 04 12 c6 6d | 18 b9 a5 95 93 51 d6 1c af 8a 37 e4 1f d8 1b 73 | 4e ca f9 28 a1 82 0e b4 ed 0c 5e c9 7e 1f da 2f | 29 00 00 24 3b af 16 8c 1b b1 6f 00 27 b7 9c d9 | 17 7f 2f 85 f4 5a 7c f8 f0 18 40 ad e1 e2 ba 35 | ec 32 66 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a f1 5d 0d 04 9c f4 06 1e a1 e4 d1 | 78 e3 65 fc ee b0 c2 cc 00 00 00 1c 00 00 40 05 | 16 1c f8 94 03 ee ca b8 41 97 2f b6 26 8a 69 9e | c6 e3 f0 be | libevent_free: release ptr-libevent@0x7f49ac01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #293 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 0a 05 68 37 88 9e d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 66 0a 05 68 37 88 9e d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa2e78 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.650607; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005249 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | libevent_free: release ptr-libevent@0x7f49bc03b678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa2e78 | #415 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.70692; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006988 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa2e78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #294 | libevent_malloc: new ptr-libevent@0x7f49bc03b678 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 e4 7b 38 a1 56 51 ec 09 f2 67 06 01 ce 85 09 | ed e7 70 f3 df be 0d 33 fd 14 d9 0b a0 f5 ae 01 | 7c d2 77 a8 f0 28 b9 08 c8 1d 62 15 9d 00 83 f3 | b0 fc ca 2c 09 65 7e 9b 25 22 a2 d6 45 e0 11 8f | 4e af 94 42 05 25 df 53 f1 c9 82 a6 ea c2 ec 54 | 09 c0 66 3c 14 bb 1b 0f 7f 3e 05 b9 a7 d6 ac ce | 93 1d 26 ac 2f c8 ba 3a 3a 0b 6d 99 c3 45 e7 04 | 9d a4 c9 d5 29 eb a1 06 3e 80 f9 fc e9 fc 46 08 | 7f 7a d0 98 cd 8d 45 c7 9e 3a 7d 61 88 c7 9a c0 | 59 82 b4 8c 71 49 95 28 9a fb e0 af 32 a3 75 97 | da be d3 d9 9d 9d a9 35 34 ad b4 58 b4 1c 7f 34 | b6 27 49 a6 c0 31 3d 51 20 9e 5e 44 f6 f8 65 a1 | 35 df ea 28 d7 5c c9 eb 03 59 12 56 28 03 7e f7 | f2 6f 2d 53 16 6e c0 d9 35 82 99 b8 d5 a8 46 43 | cf 55 ff 18 da e2 d5 78 e3 e0 b6 51 7b 02 c5 16 | 4c 64 b2 e1 05 d8 0a c9 ee f8 04 b0 96 a3 63 8f | 29 00 00 24 43 34 fb 07 7e 7a 62 77 3a ad 3a 05 | e4 ea 82 12 99 ea d9 86 2b 9f 6c 7a 56 f1 37 93 | 60 b0 b4 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a bd 60 78 e8 cf b6 8b 4a c6 d3 17 | 1e 3b 4c f6 f7 69 b4 d4 00 00 00 1c 00 00 40 05 | 3e 37 d5 5e e0 ef a3 7b 27 d6 41 83 78 33 0d b8 | dd c4 ac df | libevent_free: release ptr-libevent@0x7f497c02df08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | #294 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 78 3f 6c 17 14 61 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | d0 78 3f 6c 17 14 61 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.711238; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f497c02df08 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | libevent_free: release ptr-libevent@0x7f49b403b638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #416 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a40058b8 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.730525; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f49b403b638 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | libevent_free: release ptr-libevent@0x7f499001d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a40058b8 | #476 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0774 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.75994; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005801 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a40058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #295 | libevent_malloc: new ptr-libevent@0x7f499001d5b8 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf ab 39 db ee 2d 4f 44 77 2d 5a 39 3b 6c 53 ab | 71 6e d2 44 5c 9a 4d f2 a1 09 a2 1a 9f a0 38 92 | 83 1e a0 c1 db 0a d0 55 d6 5b 0b 38 c2 6e c0 88 | ad 55 27 c4 49 29 89 92 d0 de 8f 33 9a 11 ce 09 | 29 6a ab b3 6a b4 7d 28 54 0c 74 c3 6b c3 79 34 | 79 bf ef a7 f1 26 16 e9 a0 7c 23 a8 ef 07 cc 74 | 81 fb f7 b1 c1 06 fb b7 87 9c 87 85 71 bb 5d 0a | ea fd 01 c5 8a 5c 35 77 a8 b8 8e 2d 71 bd 5f 0a | 1d 07 7f 26 67 07 3e ec 79 60 1c 2e bd 48 0f 69 | e0 54 a9 0c aa ab f8 f0 9c 4b 8d 59 99 cf 6e 74 | 89 39 60 29 9d 39 9e 08 16 61 27 ab d3 88 fe 83 | 21 8e 58 0d be 82 44 38 28 51 1e f6 47 ac 2d d2 | 80 0b a9 2d 56 e0 81 dd 6f 0e 18 02 ad 4d 06 e2 | ba 66 cb 31 18 f5 9b 43 41 4a a5 b4 63 da 1f f9 | 94 a4 dc 61 7c 56 00 fc e5 de 02 e0 04 84 19 ec | fa 01 36 2d b4 96 26 f6 3e 4a f9 7e 06 18 4b 4f | 29 00 00 24 93 0f 46 49 f4 67 05 24 20 76 5f cc | 1b 44 ff bd 3b 7e 01 3e 25 a6 a3 7f 95 5e 1d 27 | 11 59 d0 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5f 17 01 37 9b 71 bd c6 da 1e 53 | 77 06 db a6 9b 9d ec 63 00 00 00 1c 00 00 40 05 | a7 08 80 c1 93 aa 74 bb 31 38 9a 2c 44 d8 50 8b | 24 0c 42 81 | libevent_free: release ptr-libevent@0x7f49b00283c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #295 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c de bf bd ca 9f ab 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 5c de bf bd ca 9f ab 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1f1f8 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.773335; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f49b00283c8 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | libevent_free: release ptr-libevent@0x7f49b803c298 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1f1f8 | #417 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0518 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.822753; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1f1f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #296 | libevent_malloc: new ptr-libevent@0x7f49b803c298 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 2d 4a 3d 0a d5 52 6f 00 fe 89 92 81 20 92 7c | f9 22 d8 10 0b 07 65 84 39 d0 6a 03 90 66 30 dd | e2 d4 71 f7 e7 3d 22 52 80 de 36 d6 4f 83 9b 9f | a2 94 fc 99 c4 73 68 d3 6c 8b 18 8c 59 14 9d 2a | 6e 4a c4 ec b5 b1 01 66 2e 82 82 88 5d 10 40 19 | f7 60 5a c8 fe cc 94 cc 66 a4 65 a7 0a 52 0f 7d | b3 73 7b 04 10 f3 10 d0 3a e4 d2 66 53 d4 1a 8c | d3 7e 00 7b 7b f4 58 6a ef c3 a8 5e 66 55 63 d2 | 04 2a 38 59 da 42 04 a9 7a b2 59 76 f6 a1 e6 79 | fe 93 10 7e 04 b6 5a 01 26 32 fe 33 8c 83 22 e5 | 75 86 3c 78 30 68 62 61 90 6e 4d 82 e1 8b 7f 38 | ba 78 98 ae b2 96 95 6e b8 b5 17 87 80 1b 19 cb | de ea 60 40 0e a6 7b e9 ca ae e3 e7 15 06 5a 88 | 3b 16 ad f3 83 a4 d2 06 82 7c 0a a8 bb 1a 65 84 | d2 03 77 03 3b 67 3b 6c f0 07 c6 89 01 61 ad 4b | a5 03 ea 71 72 3d 27 bc e7 93 dc 16 93 b5 d8 21 | 29 00 00 24 cb 0b f0 07 02 af c4 51 28 6f f2 38 | f2 fb 42 4d 3d 65 75 af fa 14 81 a9 09 e1 85 03 | f7 f2 13 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5a 19 f8 59 32 55 99 73 94 9c ad b2 | 3c 92 3a e2 42 b5 d2 8f 00 00 00 1c 00 00 40 05 | 45 00 c3 06 80 9b f2 d4 40 64 5e 0c 8b 63 95 7c | a1 f4 0b c4 | libevent_free: release ptr-libevent@0x7f49a8028668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #296 spent 0.237 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 c6 1b ce 58 75 9a 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | e4 c6 1b ce 58 75 9a 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.825317; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f49a8028668 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | libevent_free: release ptr-libevent@0x7f498c033448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #477 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.099 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da11f58 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.841864; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005888 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | libevent_free: release ptr-libevent@0x7f497c038c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da11f58 | #418 spent 0.366 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.162 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.883656; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da11f58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #297 | libevent_malloc: new ptr-libevent@0x7f497c038c68 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 4d 7f 12 5b 66 04 e7 63 af 89 03 82 87 69 4c | 58 2f 74 ef 9d b2 d8 9b a7 ae 05 9e 43 b8 8d 3d | 0d 46 51 27 34 6d 60 3a c7 52 6d f9 95 bb 44 6e | ce 03 b2 fb 13 58 c1 b1 8f 64 73 ba c7 ca 10 c2 | a9 e0 91 43 98 d3 f0 74 59 40 f7 9d 17 0d 8d eb | 2d 18 60 63 27 20 7d ce bb e6 de 18 75 3f 05 60 | e7 16 ea 1d 0b ce 2c f7 83 26 06 6a db 16 9c ae | af 28 3f 48 7d 16 c5 7f 6b 35 c9 f9 22 66 e1 b3 | 75 55 d5 b2 6a 0d 73 7f 29 ce e6 45 d3 75 a5 20 | 94 09 d7 0a 22 cd a7 51 8d ef 3c 25 e3 d3 72 5f | 6b 0d a1 03 67 f5 d8 c8 6e 93 3d ad 35 04 05 18 | d2 35 9c 81 ff 43 b0 d0 e3 5d 8e 1c f4 ef e3 c7 | 90 24 c7 56 cf 78 dd 35 12 10 b9 ff f2 0f 4d a3 | ed ec e0 e3 e8 cc 77 ff 2d 93 ef 7d 25 24 aa 67 | 16 03 4a 06 a9 d7 58 8d b9 ab 5a 3b a7 58 07 56 | fe ec c6 4e 22 ac f4 42 ab b9 d1 99 4a 5a 33 08 | 29 00 00 24 0b b5 84 46 d2 d8 31 2c ac 70 73 94 | a2 66 d3 61 94 b5 55 10 b8 ff 07 ad 94 e2 04 be | d8 31 08 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 83 64 99 09 04 51 3c 57 15 e2 55 | 47 a2 7d 5c 49 cb 86 07 00 00 00 1c 00 00 40 05 | d9 ec af b1 88 7e ab 42 0a fa 78 38 e9 2a 5f 61 | 88 fd 8c 48 | libevent_free: release ptr-libevent@0x7f499c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #297 spent 0.436 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 aa 35 be 02 51 fb cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | 38 aa 35 be 02 51 fb cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.89859; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f499c0284d8 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | libevent_free: release ptr-libevent@0x7f49a00495f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #478 spent 0.609 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.298 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2ac18 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.901712; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f49a00495f8 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | libevent_free: release ptr-libevent@0x7f497403e6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2ac18 | #419 spent 0.389 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.19 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10658.944425; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2ac18 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #298 | libevent_malloc: new ptr-libevent@0x7f497403e6d8 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 6b 29 2e 0a fe bb b5 4a 16 f8 ad 51 f7 59 18 | a1 98 c9 e8 87 30 33 73 bd 2d 36 04 07 b9 71 78 | f5 ab f7 91 e2 c0 1f a7 57 4f 98 4e af 86 2d 05 | d4 8b fb bb 5b 88 89 be 7c 74 fe 97 8d 18 5c 34 | df a4 2d e6 55 1d db f0 8e f6 76 15 c7 b3 76 72 | ab bb 48 6a de 9c 8d 03 b3 42 fe 8f 70 3b a3 aa | 20 b8 a2 63 ba a7 b8 9d c0 d2 7e 18 51 80 2d dd | 42 9e 28 c5 02 ce 16 2a a7 ce ad 31 d9 c6 de 5d | 73 cf ad 45 e0 e0 11 eb ea 61 bc 0f 3a 91 6b 55 | 12 98 70 b4 c2 97 8f 64 f9 e8 45 d4 be 44 31 55 | 63 61 c6 b0 5a a9 96 eb ac b2 09 d6 33 cd 59 de | e7 51 9e f5 da ce 06 e8 a0 09 ce 2c 0b fa cd bc | f6 16 2a 55 b9 74 bb 5f c8 55 4e 8c 2c 81 cf 42 | 1e a3 ca 87 75 92 0b 7c 4e 46 bd fb 5b a2 d4 ab | a5 dd 95 9a 76 78 3c cc 5a 4e 6e 99 e7 52 5c a4 | 50 7d a9 0c cf b7 3c 29 72 91 74 0b a5 8b d3 e5 | 29 00 00 24 78 8a bf dc 08 d8 4a db 6b e6 12 b6 | 49 eb ef cf d1 3b 57 76 a5 5f 25 0e 0d 5c 51 06 | 6e 21 3f b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 73 16 b1 a1 da e1 96 24 2a c1 ee | 6d 7b 2c 56 80 19 8a 60 00 00 00 1c 00 00 40 05 | 26 19 24 6a d8 21 72 9d 4f 14 2d ef 01 8b ba ea | 89 ad f5 c8 | libevent_free: release ptr-libevent@0x7f49a0028418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #298 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 03 1d 08 be 5c f5 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | 85 03 1d 08 be 5c f5 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10658.961753; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f49a0028418 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #420 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d408 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10658.969053; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | libevent_free: release ptr-libevent@0x7f49bc0256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d408 | #479 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.00239; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006249 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d408 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #299 | libevent_malloc: new ptr-libevent@0x7f49bc0256e8 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab c6 36 ba 6d 36 df 64 c1 25 d6 49 30 93 af 61 | 70 22 6e 70 87 c9 7a a2 2c f9 d1 d1 47 a6 5b 45 | a0 3b e0 68 83 6c 26 05 a6 c4 b8 eb 56 d3 24 a2 | 65 4a 89 70 c2 d2 b8 31 70 ba 86 3c 80 ab 90 1a | c6 77 ff 14 04 d5 eb 6a 1b ce b0 f7 51 a6 c3 26 | d3 24 13 af d1 20 6b fa bc 6b 1c 2c 46 ea 05 d0 | fd a7 65 44 75 1c 93 89 64 34 f0 ba 4e f4 ea a1 | 94 b5 df 29 52 37 69 27 f0 ed c0 b6 33 db 2d 6f | 5a e5 c4 ad 94 32 6c 9a 52 3b b3 8e b7 9d 8b cd | 60 d9 48 db b2 1f 7f 47 13 64 b5 b1 d8 b9 c3 57 | 2f 6b 84 7c 9a cf b0 b7 99 57 4b 8e 76 05 15 2a | 8e d2 1e 94 70 c0 91 cc 11 b5 60 13 d2 74 24 68 | 9e c7 1b 9d 6b 97 8d 5c ba 31 c7 db 9b dc ec f0 | 28 c1 91 bb 0a 37 fb d8 85 a1 50 16 a2 2a 94 64 | cf 50 c5 82 57 22 1a 92 52 79 aa f5 77 60 42 1d | 43 4b 2b aa cc 47 1b eb e4 57 64 ca 68 54 f5 60 | 29 00 00 24 54 91 f5 50 43 29 00 21 76 ab 4d 2f | 36 61 26 d2 e6 23 8a 8d 3a d1 ae 8f 69 06 75 88 | 59 c1 f3 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab bf b9 32 d3 64 34 a0 13 04 c9 ec | 58 91 8f c8 89 71 64 ae 00 00 00 1c 00 00 40 05 | 8e 34 47 a0 62 05 49 94 56 39 48 07 76 a6 d2 61 | 57 68 09 bf | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #299 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 a9 cc 4e e4 e8 81 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 37 a9 cc 4e e4 e8 81 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.038714; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | libevent_free: release ptr-libevent@0x7f49b4040f98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #421 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0684 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da67858 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.039027; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f49b4040f98 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | libevent_free: release ptr-libevent@0x7f4994028648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da67858 | #480 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.063327; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da67858 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #300 | libevent_malloc: new ptr-libevent@0x7f4994028648 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 5b 94 43 c8 a2 31 dc 3b f4 86 b9 7e c2 65 22 | 3f 2c 24 69 97 c5 9a e0 43 a3 82 b5 8f 4d 5b 6e | 57 4c ef 09 55 76 09 33 1b c6 08 67 68 9d a7 1c | 25 80 69 43 f3 18 5e 1c 3e c6 c1 3f 32 3f d3 ee | b0 db 39 26 62 d7 cc b3 c9 30 e0 f0 88 d2 4a f7 | 63 4d da b5 29 66 aa f0 a2 d9 de b1 2d 57 fb 0c | cf 19 47 c4 4b d6 55 50 d6 7a 36 d0 5a 81 6b 8f | 4f 13 12 ce d5 bf 4c 92 03 65 89 24 64 67 d8 55 | 78 ad de be 99 47 f6 ab c4 bb 01 a3 6a cb 5f 67 | d8 2b 6e a9 7b 4a f7 ec 55 2e 52 01 a8 2a 62 cf | 12 26 43 8f 29 99 0e eb e2 37 49 0b 93 f4 4e 08 | 27 76 c5 62 62 d3 10 c3 89 d3 26 43 b1 d1 d0 d5 | e7 21 4d c6 4f fb 90 d3 e3 ff 80 69 4c 8b a0 72 | 7f 4b f8 04 9f 9a cb 5b 9f e0 50 46 8c 18 e6 63 | ad a8 ae 0f 35 3f f6 cc 3c cb 7f be 73 ac e2 40 | 49 74 e1 ee 00 2c 95 d9 4a 6b 49 32 2e d5 c3 cc | 29 00 00 24 4d bf 5a a6 26 af 8e 4e 86 62 dc 83 | bd b0 f9 66 5f 73 26 ae 94 5c 6f 22 91 96 db 52 | 2f e8 14 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb c6 e1 1e d6 3c 98 23 b2 16 d2 1e | 4d a6 4d 77 f8 55 3a d3 00 00 00 1c 00 00 40 05 | 5f b6 4e 38 e7 7d 59 9e 49 19 c5 17 f2 9b ec 79 | da 91 42 60 | libevent_free: release ptr-libevent@0x7f497401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #300 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 e5 44 69 66 43 67 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 72 e5 44 69 66 43 67 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.102603; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f497401d568 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | libevent_free: release ptr-libevent@0x7f498c049dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #481 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0765 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f97b8 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.113982; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f498c049dc8 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | libevent_free: release ptr-libevent@0x7f49bc0410d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f97b8 | #422 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.123293; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f97b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #301 | libevent_malloc: new ptr-libevent@0x7f49bc0410d8 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 75 16 5d de 1f 3a 8c 0e fe fc 44 db fd c2 28 | f6 17 38 11 6b 6d 7e 9c 8a 9f 3f 4a d6 60 8e ff | b2 fa b1 2d 9c 02 8a 0b 2f fc df 4a 61 12 46 9c | 29 fd 49 7d 78 db f1 6a 0d a1 d1 6f b2 18 1b 61 | 54 a3 fe f2 f1 f0 bf 27 02 af de 9a 40 22 cb 2c | f5 ca ae 5e bb 05 8d d9 c8 a3 fc 29 fa 7b 46 7f | 32 8b 46 ac f2 09 b6 5f c3 99 8e 55 c4 66 c9 f0 | 45 88 46 4a e7 5b 66 ba 4c c5 7e fc db dc f5 12 | ca 26 fd 1e dd 35 43 fc ad 6d c5 f9 94 b4 46 1f | 05 b9 76 2e 1c 04 43 31 b8 11 7e 7a 68 15 c2 59 | 1d e1 11 72 fc 83 28 7b e6 38 f6 f1 d2 1b 80 7c | 0f cd c1 10 82 0a a3 b9 4e 6a 4f 0b 65 2d bc 6f | fe d8 dc bf 24 3f 95 9f 63 81 bb f8 46 e0 94 f0 | c3 52 db e7 12 8d b3 79 1e 47 4c 76 34 a3 10 84 | ea 42 a9 c7 25 0c 31 db 84 5b 48 01 e3 c7 e4 43 | 25 b7 8e ae 94 9c 35 97 9e 47 17 fa e8 eb 12 9f | 29 00 00 24 ea b2 03 bd ce 94 f5 eb c9 1d bd c8 | 1f 82 42 57 3a 7e 48 72 b3 57 c7 44 12 ba fa f6 | b7 1a 27 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 5d d9 66 7a dc a2 54 cf c2 19 95 | a4 ad 53 bb e5 e3 a2 c2 00 00 00 1c 00 00 40 05 | 4d 46 df 04 d0 10 4f 42 2e d4 f1 bc 0b 3f d5 9a | eb b1 6e 04 | libevent_free: release ptr-libevent@0x7f4998028538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #301 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5e 2c cf f7 76 29 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | bf 5e 2c cf f7 76 29 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.163606; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f4998028538 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | libevent_free: release ptr-libevent@0x7f4990038f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #482 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0761 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da27da8 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.181997; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f4990038f08 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | libevent_free: release ptr-libevent@0x7f49b8031268 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da27da8 | #423 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.185284; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da27da8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #302 | libevent_malloc: new ptr-libevent@0x7f49b8031268 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 33 59 ca 45 be 4b 66 27 c3 ac ea fa cb 56 4e | cf 1f 05 12 34 24 3b 48 0e ed f4 50 03 e4 d4 b1 | 82 3a 81 43 c3 f0 e7 02 ed 93 5f e8 52 5b 9e 5b | c5 fe f1 bf 1c cf 9b 5a c4 a9 86 a9 c5 e3 34 fe | cc ce 2a ea 92 43 1a 10 8e 7b 0d b6 45 ac f9 8b | 97 6b bc 1c 5d 7f ff a8 95 d6 79 0d 01 1e ed a1 | 3e 80 08 af af e3 48 4f 86 5d 0f 44 d0 11 76 a7 | c0 61 d4 f2 15 b1 f7 d6 ed 58 3a b3 c0 67 01 d6 | 96 b4 d8 3f 71 88 c3 0a fb 22 58 09 12 ec f6 24 | b8 19 e9 c0 ab 63 0b 3b 33 d2 a8 2d 6b 00 ce b0 | 7d c2 72 80 0b dc 33 0e db d8 22 38 e2 04 fa f6 | 5e e7 d9 22 1c ae e9 5d 75 74 00 b7 dd 5e 60 2a | c0 e0 28 cd 9f 64 7d 0f 0e ce 7b 52 9c c2 b2 b7 | cd 84 91 4f 76 7c dd 24 a0 5a be d5 0d d5 91 3a | 88 4c 73 31 e0 b3 5c b9 43 8c e2 3b 5b 27 0d 31 | e9 3c bc f2 7e 6d 1b e9 d6 d2 0e e0 da cc 71 db | 29 00 00 24 3d bd 5a a7 af 23 49 39 1e 80 99 9f | b0 dd 15 49 c6 ac bb 61 23 7e 3f 7d 80 16 e4 5d | 28 dc f6 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c f8 e3 b6 5f 33 75 b8 de a9 c6 94 | 58 b7 26 72 70 dd 8a cd 00 00 00 1c 00 00 40 05 | 12 d4 39 10 f9 ef b6 0d f2 f8 23 10 74 54 66 0c | 06 43 b6 9d | libevent_free: release ptr-libevent@0x7f498c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #302 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e c1 38 66 a7 a7 2c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 7e c1 38 66 a7 a7 2c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da974e8 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.235634; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f498c0284d8 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | libevent_free: release ptr-libevent@0x7f499001d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da974e8 | #483 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.242992; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da974e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #303 | libevent_malloc: new ptr-libevent@0x7f499001d4b8 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 7e cd 7e bf cd d8 d0 93 76 4c 1c fc 64 b1 f6 | cd 36 9e 3e a5 55 16 0b c1 80 97 51 11 b5 33 fd | 64 f2 14 40 6c bf e8 8a cc e6 57 d6 f8 0a 0d 01 | 4e ff 1a 3d 9c ff 15 94 f2 47 9b 7c 91 7d 19 74 | 69 c3 07 b5 07 e0 1c a3 ed 25 3e 6d 46 16 89 6b | da 36 6f 20 89 12 bb c8 6f 50 f7 d8 12 ee 99 cb | e1 ea 64 77 99 ba 5a 1b cc f5 08 37 30 a7 0d 27 | 09 1b c2 81 c7 5b be 9d e7 4e 99 d4 ba 5a ed b6 | e8 cd 20 f3 7d 10 f3 dd dd eb 27 ef 97 e7 67 dd | b9 9e cb a3 bf 40 79 fc e9 df a2 18 c5 6b 64 9a | 9c 2b 2b 42 3c 2f 36 5f 72 67 9e 0c 47 2b ac 47 | cc 53 71 28 ea ac e2 54 bb fd db e7 34 28 83 19 | 08 69 b4 d3 fe 0b 61 d1 0d fb fc ad e3 31 e7 90 | 33 f9 9d 1c dd 4d 24 90 b9 28 3e 6a 1a 09 11 6b | d5 4a 25 e7 c6 ff 60 2b 16 af 66 0c f6 a9 75 b2 | 73 a8 01 7a 83 36 f4 ec 0f 44 f2 fc 8d cb 06 53 | 29 00 00 24 01 da b4 a9 d0 3b f5 6b 4d 19 f3 3e | b5 82 ec 48 26 fa 61 c9 72 16 6e 3d 30 21 e8 89 | c5 0a 2d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3b 62 d6 59 09 55 c1 00 c8 5f 99 | c8 b3 c6 25 40 fd 69 26 00 00 00 1c 00 00 40 05 | d5 e3 63 0a c3 c7 21 7c 74 95 d4 47 30 dc 8d 34 | 5b ed 70 cb | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #303 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 6f f1 27 7f 2a 9e e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 1f 6f f1 27 7f 2a 9e e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.244289; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #424 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.302587; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #484 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4a898 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.30585; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | libevent_free: release ptr-libevent@0x7f49ac043e98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4a898 | #425 spent 0.0985 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564daa7488 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.305953; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4a898 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #304 | libevent_malloc: new ptr-libevent@0x7f49ac043e98 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 61 3d ef b2 92 e8 12 bc 5b 63 1b 40 10 5b 3b | 3e 28 14 ba 7b c2 ec f8 8e 5e d8 d4 19 7f 83 08 | 24 ed a7 89 17 95 7b cb 6f e9 b6 0d f7 fe a2 bf | 66 8b 9d dd ba 17 ea dc a8 41 e2 ca f9 f5 60 45 | 3a bb 1b 34 b8 96 67 26 a5 4a 54 02 72 2c 7f c1 | 34 f0 52 79 74 24 39 bd d1 e7 30 1c 4e 75 cf 8d | ed d9 33 e4 cc 86 50 63 63 02 b5 2a aa 4b 3a c9 | c4 f0 2d 6f 23 b3 ba 4c f8 2f 09 70 7e 24 9e 99 | 89 76 e7 2f 05 d4 43 2d 58 2a a1 b9 cd bd d2 b2 | 23 28 5f 4c 1d b2 08 42 e6 ed 85 d6 e6 fa cc c3 | 14 c7 2e 7a d3 08 99 e4 49 97 c7 ec 55 5d 78 63 | f0 81 80 81 fb 84 c2 c4 eb f2 c3 34 28 d7 06 2e | bf 26 f6 d5 c1 c5 03 fc 81 2b 3c 2a aa 35 a1 48 | 20 bb 3d a5 75 74 20 aa 31 27 bc f7 97 36 ac 77 | 36 36 25 4e ce 3f 1d d6 6e 56 74 59 0c 37 c8 1b | dc 72 7a bc 52 bb 95 be 87 70 9d 2a 1d 82 88 99 | 29 00 00 24 db 66 39 e7 81 6f 92 34 60 01 24 a1 | c0 4e c0 f8 cc b0 0e 8b e1 eb ed b6 60 0b 64 7a | e2 42 d4 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d b3 e4 d9 22 ff 3f c0 7f f6 6f f1 | bd 8c 45 70 e3 e2 6a eb 00 00 00 1c 00 00 40 05 | c2 17 96 f0 e0 17 ad 0f be a1 0c f2 cd 73 f8 22 | e9 93 c0 11 | libevent_free: release ptr-libevent@0x7f49b0033338 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa7488 | #304 spent 0.0679 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 b8 d9 84 9e 2e db 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | e1 b8 d9 84 9e 2e db 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7bcf8 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.365239; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa7488 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #305 | libevent_malloc: new ptr-libevent@0x7f49b0033338 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 a3 32 13 68 fb 8d 79 b5 e6 b8 c7 98 62 0c f9 | 27 b1 a6 b5 8e ec a1 c6 4d 31 f0 b0 0b b9 f9 8e | aa 53 ec e8 ed e3 4b 1e 64 65 23 f2 c2 93 ab dd | a2 da c4 94 1c c3 96 62 e9 81 b8 77 06 4d 8e 2b | 6a c1 ec 19 15 38 09 93 c7 e5 10 16 3e a3 00 b6 | fa 41 58 00 c0 10 4c 29 df 3b a9 47 ed c0 16 03 | 3d 14 e7 0d 64 eb 21 e8 a7 f0 7e 31 73 a5 99 3d | b7 bb bf 14 3a 07 50 ba 0d ab 69 82 26 0d 24 26 | 53 15 62 8a 08 b8 f1 cc c0 40 d1 85 f3 6c ee e8 | 1f 5b 40 20 94 18 34 9b 0a a0 a7 7c e9 d7 cd 22 | e2 b9 05 02 16 27 a0 69 60 48 da 02 77 69 f3 92 | c1 68 36 1d 35 f8 b6 34 49 3f 44 2c bf 2c 1e 3a | 4f fe 09 b0 8e 40 e4 fc 59 0a b2 e2 d3 66 80 2f | da f6 8b 78 fa 12 55 ec 3d 1a ae 1d b2 fb 8e c7 | a6 5b e2 dc 73 71 dc 0a 1a 0f 02 88 ab 76 64 47 | 2c 31 52 6a 2f a7 1b 71 ac a8 18 e8 cb af 55 fc | 29 00 00 24 9c ce db e8 a1 7e fa d3 67 24 39 06 | f1 54 af ee c0 b9 7b ec 38 6c 40 b2 3c 6d 86 46 | e7 cb 59 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 84 16 b9 20 35 7c e6 cc 0f 74 1a | 4e c3 62 a0 d4 17 75 ba 00 00 00 1c 00 00 40 05 | 9b 17 6d c6 89 eb da eb 5e 22 02 bc 44 00 68 c6 | 11 fc c3 a2 | libevent_free: release ptr-libevent@0x7f49a40336b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7bcf8 | #305 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 49 52 fa 0d da 38 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | a3 49 52 fa 0d da 38 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.366501; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f49a40336b8 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #485 spent 0.0868 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dad16c8 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.366606; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad16c8 | #426 spent 0.0694 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0378 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.424034; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007362 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | libevent_free: release ptr-libevent@0x7f49a4043cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #427 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac8aa8 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.43341; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f49a4043cd8 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | libevent_free: release ptr-libevent@0x7f497c01d5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac8aa8 | #486 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.455934; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac8aa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #306 | libevent_malloc: new ptr-libevent@0x7f497c01d5b8 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e a2 ad d2 5e 8f 93 6d 76 90 ab d4 e0 59 22 3c | 49 fb a4 bc 80 bc ea 9d 50 db 0d 90 8a 88 23 c4 | c5 64 0c bc 9d 4d f3 c6 71 50 4a 74 8a 08 e7 c8 | 11 1d 3e 13 d5 a6 aa e8 5c fe 20 f0 66 db b9 84 | 78 ee 3d 77 c2 93 23 1f 60 64 5c 7d 03 09 48 80 | 0d a4 f7 88 d0 7e 48 9a af 50 e4 2f 91 ee 15 fe | 22 49 70 b5 e8 5f ae bb 84 59 37 ac 7b 12 e1 33 | e6 cc 8b eb 0c 15 9c 23 57 39 73 6f 47 8f 51 54 | bd 38 df c9 ef f4 a6 62 8b c5 73 bc 94 57 39 0b | ec b7 dc 6e 5f 84 8f 94 92 d9 fb 2b dd 7d 9f 91 | 5b 8f fb 7f 27 43 e1 b2 1f 0f 64 ee 81 c6 ba ff | 42 4e 41 0d c4 4b e5 41 83 3a 76 01 87 61 12 43 | c2 7e 3d b2 83 20 92 83 09 9e fc d9 88 74 d8 c1 | 81 d2 8e 1d 23 f7 e9 7c 95 ef 46 1a 09 b9 1a 7f | 90 dc 0b 34 01 a4 20 60 2e c1 59 f6 a8 f2 c3 67 | c7 7b ed 24 aa 5a 7f 47 ae f3 b1 6e d9 03 d5 85 | 29 00 00 24 4f e1 fe 8b f9 e0 a5 1f ee 2d d8 c2 | 74 88 24 d4 f1 67 02 fd d2 c8 cd 8d 37 bd 74 68 | 0d d4 6e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 63 1e 52 0b 41 c1 68 3e 1f bf 43 02 | 99 5a b9 26 fa ed d6 25 00 00 00 1c 00 00 40 05 | 62 95 4a 43 1d 38 61 11 8d ad f9 c3 bc e0 51 06 | 83 d4 e2 ad | libevent_free: release ptr-libevent@0x7f4990022cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #306 spent 0.318 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b af 40 2a 19 b8 b0 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | 0b af 40 2a 19 b8 b0 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.15 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.482685; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | libevent_free: release ptr-libevent@0x7f49a8043f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #428 spent 0.617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.273 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9c48 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.495914; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f49a8043f28 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | libevent_free: release ptr-libevent@0x7f49a803e4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9c48 | #487 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.51685; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9c48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #307 | libevent_malloc: new ptr-libevent@0x7f49a803e4b8 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 4f 96 18 1a 5a fc 6f c0 ab bb b8 8b 9a c1 3e | 8d a8 6b bf 4d b0 a0 90 38 94 06 cc 82 16 d0 0a | 52 c3 f0 63 4b ea 19 a8 63 e8 90 96 b8 10 20 7a | 1b 81 e3 cb ed 5a 05 28 e5 af 7a fc 3c d7 26 20 | 6c 1a 9f 74 80 fe 84 60 62 00 73 6b 64 b1 bf 88 | 1d 3a a0 68 57 d8 a0 4a d1 ef e2 da 40 75 67 51 | 37 4f 89 1c 51 3f e4 e1 33 3a bf c8 5d 4a 82 90 | e9 da 23 04 1a 3d 9b 08 be 5f 16 9a 74 51 e5 6e | e7 00 35 ed 27 13 d3 c7 58 15 24 0e be bd 29 b2 | 65 a9 64 20 2e 61 9e ac 30 d8 8e 7e 95 f6 d1 43 | 1e 26 79 39 6c bb a4 a5 bf f1 92 11 82 c2 3a bd | f8 f2 9f 11 c9 6c 7c 26 ba 1c 8b e6 e4 22 e5 d7 | 05 2f c8 d4 65 7b ae 6f 93 b3 9f e3 c4 21 37 c5 | ce b4 75 80 18 ab ef b3 58 31 7c 32 5b 18 7c 0b | 92 bd b9 1f f4 04 9e 6b 5a 1a 7b 88 47 fd 8c fe | 6e 40 ca 72 c5 e0 27 f6 18 d7 ba 15 b8 dd 14 6e | 29 00 00 24 34 8d 39 46 aa 83 93 17 d2 f6 83 03 | 61 d9 8b f4 b8 27 fb ce 7e 78 34 16 05 69 c3 7b | f8 4c d7 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 a8 d6 3f 9b e3 47 85 bf f9 58 06 | 6e 83 be b7 3e 40 70 a3 00 00 00 1c 00 00 40 05 | 91 14 31 64 f5 96 79 79 9f 91 74 96 51 a5 41 b6 | 7a e8 af 6d | libevent_free: release ptr-libevent@0x7f49b40256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #307 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 c2 b9 a4 99 6f d9 9e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | e8 c2 b9 a4 99 6f d9 9e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.208 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.54574; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f49b40256e8 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | libevent_free: release ptr-libevent@0x7f499c043e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #429 spent 0.44 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49740058b8 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.55968; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f499c043e58 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | libevent_free: release ptr-libevent@0x7f49ac02dd98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49740058b8 | #488 spent 0.409 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.572516; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49740058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #308 | libevent_malloc: new ptr-libevent@0x7f49ac02dd98 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 26 f7 19 d3 2c 86 4d e6 57 84 5f fe 93 41 07 | 61 b1 8c 35 72 ac 13 f1 c4 63 81 73 e4 54 7f 60 | 33 df 46 32 d4 5f 48 15 8e c0 a0 81 9d 1b f0 d0 | 5c 6b c1 00 36 9c 49 7b d8 91 06 a7 d6 15 25 f8 | 60 3d 2b e6 1a ad df a7 c9 2e c1 3c db 1b 26 5a | c0 86 8e 0d ca be a2 35 c1 5d e8 44 f7 9a 9e 29 | 3a 3c 15 04 93 1e 14 6e b8 60 43 e8 4b 70 e3 6f | 78 83 d1 bd 7e 97 c1 53 c4 3e d6 0a 68 97 2f ee | 92 8a 3d fb 97 4a d4 26 6b a7 c9 06 7c 50 ef 25 | d6 72 57 15 1a 65 3d b0 b5 3d c2 6e 9f 51 5b 07 | 09 78 31 91 2a 38 c0 99 98 e9 f5 4a c0 d8 68 3e | 0d e8 d1 d5 eb 39 f0 7f c3 13 1a 80 cf e4 6b 34 | 0a 61 1a dd 20 79 9c ca c3 1f f0 bd 91 2d 5c 84 | 7f 5f 4b 17 2f dc 04 51 42 e2 0a 61 6d 8d 55 88 | 59 bf 68 d9 f6 96 a9 f2 de e2 ba 1a 21 dd 92 58 | 2e 95 2b 5c cf d9 68 26 3f 12 10 0a 1f 09 f4 e1 | 29 00 00 24 38 75 1c 5b ec 1d f2 17 6b 06 d7 fd | 8b 1e 86 9c 22 bf 3b 32 44 90 86 e6 d0 ef 29 35 | 4b b8 3b 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 8d 2f c1 db a2 b4 75 e0 a7 85 4f | 3e c5 b9 45 95 20 aa 55 00 00 00 1c 00 00 40 05 | bb ea 00 21 b7 c2 57 70 1d 22 f3 65 02 9d 8e 20 | 52 05 12 8a | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #308 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 24 ed 1c 59 63 68 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | c9 24 ed 1c 59 63 68 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0862 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1ab78 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.625906; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | libevent_free: release ptr-libevent@0x7f498c038bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1ab78 | #489 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.631207; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004295 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1ab78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #309 | libevent_malloc: new ptr-libevent@0x7f498c038bb8 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dc 26 fc 28 ea 51 1d 34 78 a2 76 23 47 28 de | 68 52 71 5b 73 1c 54 46 ff 29 87 b8 3b 17 d4 9b | de 76 6c 38 3b 79 59 30 c4 e9 1f a3 e4 73 5d f0 | 37 9c 2b d1 e8 49 6f 45 ac d1 2a 61 8b 87 4b 68 | 7d f6 3d 7e 69 2c 9a 46 84 9f d9 0e cd 52 16 c9 | 6a 12 27 5f d1 f2 30 88 13 8c be 23 26 4b c8 9c | 1f c7 6a 97 67 b8 92 39 72 8c 94 f9 4a 3c 2d 4e | 8d 29 db e5 c1 aa 35 cf 67 a4 44 9e b4 ea 1d 43 | ca 6b 9d e7 7c cb 44 b8 c7 5f 68 48 80 e2 db 35 | cb 40 15 a7 09 5a 58 cb aa fa 1e c4 b3 8c a7 b4 | 2f 95 b2 57 73 f0 de 6b 47 19 8d ff 01 10 c4 66 | da 00 79 c5 18 9d 8f 66 92 eb d4 9b 58 fc 8a 3e | c4 61 d3 fb b3 85 91 c1 44 12 73 d3 74 9a 97 bd | 47 8b 64 f6 2a c2 6f 68 70 a4 d5 f1 ce 45 22 bc | c4 cf c8 d2 a7 b0 07 9a bc 75 2e 36 60 a2 b5 b4 | 9b 66 94 ba b9 5d f5 54 b7 5b b8 94 4d 6d 9f c2 | 29 00 00 24 8a ba 5d 74 11 9a c8 db c1 cd 07 8c | be c9 4a 89 38 9e 72 16 2d 7f 7e 34 df c5 df 69 | a8 91 d3 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1d aa f4 b6 9f d2 03 eb ca 1f ff | 3e 94 d7 e2 da b8 c5 8b 00 00 00 1c 00 00 40 05 | 89 68 6a b2 3b ed 23 3f 13 2c 14 23 c8 3a ea e4 | 66 5c 15 f8 | libevent_free: release ptr-libevent@0x7f4994033778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #309 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 54 58 c3 09 30 2f 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 0e 54 58 c3 09 30 2f 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.636543; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007711 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f4994033778 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #430 spent 0.0951 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ce048 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.688855; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | libevent_free: release ptr-libevent@0x7f4978028508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ce048 | #490 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.719179; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ce048 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #310 | libevent_malloc: new ptr-libevent@0x7f4978028508 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea d5 be eb b5 12 b7 04 35 00 be a7 45 c7 93 5f | 0c c4 df dd 5d d4 59 ea f2 91 54 07 54 e5 69 7b | 27 79 2e b9 ff 5a a0 5f 40 b5 2b f5 a8 a2 88 bd | c8 16 f5 35 1d 90 86 e7 c1 ca a8 8d 53 30 66 80 | e2 08 22 04 d0 dc 05 e6 1f a8 6b 6a 67 bd 6f d3 | 00 8a b5 51 66 a5 73 21 e6 5b 55 77 11 32 d1 11 | 1b 4f c9 f5 58 86 88 e7 68 5e ee 3f a6 e8 ad 81 | 1d 02 31 81 3d b8 0e c0 41 6d 67 90 d6 ed 48 f5 | 8b a0 31 6e be e9 c1 69 7f 69 7a 4a 39 45 da e6 | 57 1d 9a 33 54 6f 8b bf ee 86 f8 5a ca c4 d9 bb | c6 67 af 87 04 ce 93 af 7e 1c 08 ef f4 3a 68 eb | 3c a4 b6 bb 28 11 f0 dc f4 6d 73 14 69 9d 80 83 | 17 c2 31 1e 51 b6 71 54 f9 84 07 f8 64 f3 08 13 | 92 ad f9 9c 2f b6 85 a7 b0 a9 d7 80 02 da b4 84 | d5 94 77 2f 1a 8c b3 1b 4a 51 3c 1c 5e f0 8a e0 | 43 4d 5e c4 a0 9a 1a eb ce 37 8c 7e 2f 4f 1a a4 | 29 00 00 24 6b c7 08 61 df 03 55 2f d8 c7 8b 78 | 07 89 80 d7 f3 d9 f7 46 20 4e e3 32 59 dc d1 2e | 4e e6 8c fd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 f0 64 86 06 1a df d9 a7 d7 3c 29 | 74 08 ce da 4f 51 88 16 00 00 00 1c 00 00 40 05 | 02 b1 47 0a 21 03 58 4d d8 3d 5f 8f 3d 77 3d 30 | ae 28 a4 b2 | libevent_free: release ptr-libevent@0x7f49780335d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #310 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 09 47 12 41 b0 45 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | d9 09 47 12 41 b0 45 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.724626; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f49780335d8 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | libevent_free: release ptr-libevent@0x7f498003e5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #431 spent 0.0891 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49bc002b78 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.750048; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f498003e5c8 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | libevent_free: release ptr-libevent@0x7f49bc01ff28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49bc002b78 | #491 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.806488; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49bc002b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #311 | libevent_malloc: new ptr-libevent@0x7f49bc01ff28 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 7a 76 f2 b5 62 fe 9f f6 84 1d 16 a4 50 e8 cf | f7 2b 48 1f 92 3e 6e 84 5f 39 9f 1c fe 2a 63 c8 | 6b 45 3d a7 65 cd ff a5 4f db 49 c6 49 59 6f 81 | 51 51 b6 1f 29 4c 3f fe c8 17 a1 21 3e e7 46 61 | a2 2e ca 72 9c dc e8 15 b4 ed 93 85 c6 e8 c0 1d | 9a 8b bc 12 0c 50 6e 60 e0 f4 4a 76 df c4 c1 74 | 7f 8a 8c ae e6 ca ae cb 21 65 75 03 0a 1c 8d 17 | 70 42 75 68 d5 c4 b7 f8 ef 00 69 25 6d 87 1f cb | 8b c8 e2 aa 8d 6b 52 ee 85 87 bb 85 bf 62 81 9a | 7b 98 06 a3 de d9 50 6a f6 ad a7 e8 14 f2 18 28 | 52 b4 4b f5 a3 6a 69 28 27 a2 1d 6c 8e a4 bf ac | 1d be 92 ae 4d c1 10 cb 79 cb 2b 15 cd 61 04 c7 | 66 09 2c db f7 58 57 e2 03 9d 06 e7 a8 57 94 30 | 68 f3 49 48 52 38 e6 4c 96 4b 6a 90 bd 86 92 5c | 26 ae 4b 76 e0 d7 26 ed 95 b1 77 5e cf d0 9b 85 | 19 44 3e bc 7a 88 31 7c c4 4b e4 f5 dc be 58 38 | 29 00 00 24 40 ad 65 f5 e4 e0 f4 94 5d 06 11 b8 | 8e c4 49 9c a3 01 07 39 8b fc be fe ea f8 1a a3 | d1 bb 39 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 6d 5b 4e 8c 26 e5 f3 17 aa 7b ae | a5 28 66 2f 23 b7 2b 3c 00 00 00 1c 00 00 40 05 | db c4 1b 7e c4 ac 11 7b c4 79 22 09 8c b2 d6 e8 | a7 36 2f ee | libevent_free: release ptr-libevent@0x7f498c033348 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #311 spent 0.288 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 18 61 1c 71 e1 c7 ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | a8 18 61 1c 71 e1 c7 ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.128 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.810157; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f498c033348 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | libevent_free: release ptr-libevent@0x7f49b803c198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #492 spent 0.338 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55564dadb918 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.810548; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f49b803c198 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | libevent_free: release ptr-libevent@0x7f498c043e98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dadb918 | #432 spent 0.331 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.159 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.14 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da875f8 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.863487; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dadb918 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #312 | libevent_malloc: new ptr-libevent@0x7f498c043e98 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 ee 0a 42 b9 31 5f 42 5b e2 86 14 7b 94 ee 05 | 31 43 13 1b 1a 44 e3 6e bc 32 46 23 c1 b3 7f aa | 01 7b f4 49 72 a1 5d 1e fc 88 98 c9 96 7b 32 27 | 98 38 ed 6c 15 0b 59 20 1e 0e c3 3a 8a b4 8e d4 | 0a e6 c7 ba e0 01 f0 e1 98 d6 7d a5 5c 5f e3 4b | 17 1e ea 9d a6 ae 6d 75 52 b3 11 00 8f 29 fb a5 | 7c 6c c7 3e 73 24 d8 d5 de 96 c4 cb e2 b4 55 51 | 0c bb a1 c2 fe 59 49 60 86 b8 81 d5 77 37 e1 6e | 56 01 7d e6 f0 fc 3a c9 38 46 6d e5 d1 dc df 0c | 87 04 db 7f 9a f1 ca bd 49 47 3b 2f 86 01 f4 32 | ee a1 5b ad c0 dd 73 1c 91 7d 2f 3d 08 ea aa bf | 51 d0 66 1e 38 b7 ad a3 b6 7d 9f 40 2e 05 88 45 | aa 9c 8a da 73 be d9 37 fc 8d a7 c3 92 34 91 cc | f5 b6 4c 65 53 51 64 09 b5 d2 1a cc f7 18 0d cb | 95 0f 5b b5 68 32 ce 80 4f 43 3b 57 1c a3 0c b0 | d7 9a d9 7d ce 60 0d 8b e1 ed 07 e4 6b d3 b4 eb | 29 00 00 24 a6 e0 e7 95 df 54 5c dc 2e 1a 28 6f | 50 97 5a b3 1e a7 37 a4 14 8e 00 1b a1 ab c2 a3 | 06 8b 0f 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 97 9e f5 20 f6 14 13 a9 44 a4 01 | 5c eb df cf bd 65 c7 72 00 00 00 1c 00 00 40 05 | 53 a2 45 ef c2 7b 1f eb 34 71 f5 d6 b8 53 f1 6f | 11 18 1a 2e | libevent_free: release ptr-libevent@0x7f49bc035f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da875f8 | #312 spent 0.511 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 7f 88 4b a6 59 bb 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 17 7f 88 4b a6 59 bb 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.178 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.872452; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003037 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f49bc035f08 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | libevent_free: release ptr-libevent@0x7f4990044548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #433 spent 0.463 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da136d8 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.876386; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f4990044548 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | 29 00 00 24 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a | 49 a4 f8 e5 f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd | 88 a9 b3 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 | 62 6f 96 2c 30 9b 35 42 00 00 00 1c 00 00 40 05 | e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | e8 0f 34 78 | libevent_free: release ptr-libevent@0x7f4984017d48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da136d8 | #493 spent 0.401 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10659.921422; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006113 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da136d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #313 | libevent_malloc: new ptr-libevent@0x7f4984017d48 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 16 6d c9 81 01 c2 8a 69 21 35 fd d0 9a db db | e4 ed 85 75 24 38 ea 45 2b e4 82 56 49 f0 aa 0a | 86 c7 95 c9 2e 2f 14 a5 b6 6d ed 9b 3f 5b 4b ef | 7b 2b 04 34 61 7c 27 0d 48 cb 95 33 8c 8b 1c 0c | 5c e6 c0 e0 3e 85 03 58 73 6c 3f d1 93 84 fa 7c | 72 75 08 8a da 57 07 34 6d 52 92 37 ae d1 8c 45 | fb 33 f8 af 80 cd 78 45 d8 9d 4a 32 01 1e 41 46 | 3e 53 1f ad bd 7b cb ae de 4c 28 8d 23 71 74 6c | b8 cb 45 70 eb 68 c7 1e 9b 69 91 9e 6b c4 cc f0 | 0e c7 dc 20 f4 05 24 ea a8 6f 4a 61 39 e8 d0 fb | 9a cc a5 0c aa b8 e3 9e d9 98 97 d0 19 1b 01 8b | 0f 33 52 a1 ec b4 16 05 33 86 23 5e 62 d0 59 e2 | 1e e4 89 4a d1 df 6f 16 f6 da 03 fc b0 dc 20 f2 | 2d 14 6b 79 74 c3 82 ea f8 b8 e0 57 14 9b 65 23 | 50 7b 6a 89 94 57 53 36 ab 05 90 b1 e2 af bf 7f | c5 6f 69 1e 00 07 9e 82 d7 e7 60 76 1d 0d 6d fa | 29 00 00 24 5d b5 15 2e 87 fc 17 b6 71 00 17 6f | 5b db 42 92 9f ea f3 79 a1 77 9d ea 8c 39 c8 18 | c0 59 28 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 aa b0 de 87 60 ca b4 6e a7 cc 0b | 98 bf fb 60 4e 76 b8 d9 00 00 00 1c 00 00 40 05 | 71 b7 d1 3a b8 3f c2 0c 1a dd b0 38 be 87 31 c6 | 13 d9 fd e0 | libevent_free: release ptr-libevent@0x7f4988033508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #313 spent 0.473 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 fc 4d 68 7b 7d 42 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 02 fc 4d 68 7b 7d 42 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.22 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.934442; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f4988033508 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | libevent_free: release ptr-libevent@0x7f49a0038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #434 spent 0.428 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.242 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10659.942387; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f49a0038d68 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | 29 00 00 24 e3 a7 b9 77 10 76 d3 84 87 df 4c ec | eb ae fa 7e 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c | e5 88 d7 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 | 53 de b9 65 f0 23 59 01 00 00 00 1c 00 00 40 05 | c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | 60 31 b3 7b | libevent_free: release ptr-libevent@0x7f4984043c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #494 spent 0.453 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10659.988369; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f4984043c18 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | libevent_free: release ptr-libevent@0x7f4974038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #435 spent 0.683 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.313 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad2d68 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.005638; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | 29 00 00 24 23 46 9e a2 d2 02 ad 06 61 c4 c1 de | 0f 9e 45 25 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 | 95 ce 52 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 | 29 e9 4b b6 9e 67 fa 0c 00 00 00 1c 00 00 40 05 | 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | 81 9a 48 25 | libevent_free: release ptr-libevent@0x7f4990022bb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad2d68 | #495 spent 0.459 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.223 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.014568; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad2d68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #314 | libevent_malloc: new ptr-libevent@0x7f4990022bb8 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e a0 f7 e1 f2 0b ed e4 a3 ab 0f 6e 20 4b be 29 | 80 50 3a 05 ba 0e a1 b9 f3 37 2b 54 dd 6f cc aa | bd 12 7b 4a 97 76 05 fc 4b 3f b2 62 f6 76 41 ed | 87 bb e7 e6 8a cc 7b a9 fd 98 6f cb 88 55 8f ef | f8 67 5e a2 bb 37 08 04 da d5 d5 c7 e0 70 e6 41 | 82 f9 5a db c5 ca e4 35 82 2d da bf 13 4d 2e 62 | 49 af d4 35 69 4b d0 56 65 14 3b e5 9a 1b 5d 79 | b9 0f d3 93 33 63 f5 49 ec 3c 36 62 7a 59 ba 7b | 79 33 ea ce 1e 39 81 13 ce 68 c7 74 3e db f3 22 | 07 7a 1c 83 2a f0 ac 01 13 6e 3c 87 b9 fc bd 2f | a6 6b 29 ec 41 6f 6e e4 fd c0 9d fe dd e5 19 74 | 67 d1 8b 36 07 b9 57 a1 3e b6 14 9d 5a 6f a1 22 | 05 d9 42 bb 0f 09 27 70 64 70 8b 7e ec 7e cc 6e | 16 01 69 a5 b5 ad ae 4b 2f b7 8e a2 37 27 bc 10 | b6 08 01 2e 79 5c b2 45 05 1c aa 6b 7b 20 64 ce | 95 b8 f3 39 6f 6b e2 af a2 f7 80 7b 84 97 3b 71 | 29 00 00 24 25 91 6f 49 44 90 4b 41 1e f4 07 67 | 9a ad 40 03 05 bb f0 01 85 4c ff 93 59 07 13 ed | b5 40 58 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ad 8b d7 e3 32 44 66 e7 e9 00 e7 | 7f 0a a2 5e 78 64 73 a6 00 00 00 1c 00 00 40 05 | ab af b7 1f 5f c4 f3 f1 55 56 c1 a5 51 dd 91 8f | 0b 70 d5 47 | libevent_free: release ptr-libevent@0x7f49b801a678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #314 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 a0 9a 34 36 df 88 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | e7 a0 9a 34 36 df 88 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0861 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.047994; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f49b801a678 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | libevent_free: release ptr-libevent@0x7f496c03e838 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #436 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0843 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68ee8 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.067451; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f496c03e838 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | 29 00 00 24 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 | 8e 41 9a 8c 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 | 0d f1 36 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba d6 cc d8 42 54 a7 fe 61 5b ca f1 | 36 92 a6 77 db 6f 08 a3 00 00 00 1c 00 00 40 05 | d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | 92 7e bf ac | libevent_free: release ptr-libevent@0x7f49b002db88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68ee8 | #496 spent 0.269 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.143 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.097047; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68ee8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #315 | libevent_malloc: new ptr-libevent@0x7f49b002db88 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 3c 92 c5 8a 16 7b 02 a0 e0 d0 d7 74 d1 0b a1 | 10 b2 44 c5 6a fc d3 4b 6e f7 a6 8f 4e 58 38 8d | 50 9b a7 c7 3b 58 26 a1 27 f9 99 dd 78 3b 52 50 | 7c 91 52 34 ef 5a 96 bd c5 c2 93 73 1a c7 06 f3 | 54 96 10 25 25 7d a5 7f 5a da ea 5c 76 3e 56 c2 | 0e d7 54 57 0e 6f 44 d6 41 d4 fb d1 c2 cb db 98 | 18 73 3a 2f 33 de fa 36 16 82 5b 6c ac 50 a7 9d | 8b 60 fd 2b da 5d ed 91 33 d4 21 cb 09 9f 72 f2 | 52 7c d2 0d ea 98 a0 30 52 1d 37 09 9e f6 dc f1 | f1 18 eb 8b 7e 5a 52 d2 b0 f5 2a ab 32 56 fb 50 | 89 d0 6f b3 2c 5b d6 45 f1 bd fa 5e 86 ee 06 e1 | 9b 26 dd 5a a7 61 74 82 72 11 55 fc 96 56 49 45 | 86 49 63 15 ce 06 a1 df ae d9 d9 66 be aa 92 02 | 2c bb 5b 21 be 2f f0 7d 03 ec 0e c7 dc e0 58 01 | 6d 66 3c 6a 06 c6 57 1f a8 9a e9 c5 57 43 81 b6 | 1e 2c a5 db 7a 06 a1 26 8d b9 36 86 51 85 82 d9 | 29 00 00 24 04 d6 d5 56 8f 92 b6 21 c3 0c 93 20 | e2 1a 42 88 cd dc b5 a4 d6 28 6e 07 2a ff 0e ff | 64 74 2b 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 b6 ec a3 c6 85 b3 b7 6b af 7c b4 | c3 e2 69 28 f2 55 d5 20 00 00 00 1c 00 00 40 05 | fb 41 a9 41 85 50 0b 6a 4a 05 2b 4b 77 1b 3d 71 | a7 3b a8 0a | libevent_free: release ptr-libevent@0x7f4988022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #315 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 0f a8 3a b3 e8 ad 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 79 0f a8 3a b3 e8 ad 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0825 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.105489; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | libevent_free: release ptr-libevent@0x7f498803e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #437 spent 0.193 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0da68 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.133945; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f498803e5d8 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | 29 00 00 24 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 | f6 5c 32 38 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e | b9 af 03 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 3b c4 a0 4e eb 77 67 fc cf 56 aa | bb 93 30 1b a3 4a 6f 76 00 00 00 1c 00 00 40 05 | fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | cf 50 46 7e | libevent_free: release ptr-libevent@0x7f497c01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0da68 | #497 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.165258; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0da68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #316 | libevent_malloc: new ptr-libevent@0x7f497c01d4b8 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e af d1 e8 05 c0 fe 55 ef 69 3c 32 50 1d d3 7d | 07 d3 b3 86 40 57 0f 7d ea 35 32 07 a2 7f b6 5d | 48 88 af 9f 54 32 cb ea f0 c0 e1 50 ce ab 8c a8 | c4 e7 46 04 31 f1 cc 23 01 87 2b e2 d0 a1 88 51 | 96 82 d4 d5 40 50 18 25 f4 25 32 80 29 7c d9 70 | a2 0b ae bb 49 73 17 37 4f 3a 85 a4 50 e8 89 10 | d6 86 47 0c 0a 3e ad 7d 67 a2 fc 85 73 cd 82 54 | 3f e6 b4 2b 86 2e be b3 05 21 bb 6c 94 e6 7b 0d | 62 e3 a3 b6 ae 5d bf 01 d7 4c 93 72 c9 f4 65 97 | c9 29 9d 37 38 f9 0a 7c 3b 80 b4 fe 9c 02 b3 02 | 12 97 d3 28 68 77 fe fa 4c 58 3f a9 62 14 a6 17 | a9 57 85 b1 b9 3c f2 92 00 e6 06 3e d9 b4 0a fb | c3 37 4c 3e d4 31 b3 b5 52 e4 a8 5a f1 5e 91 92 | d2 1b 81 8d bf 83 fa 09 45 3a a0 8f 1b 1c af 09 | 62 ef f9 c1 ab 5c 47 b9 1c b5 40 9a 59 a4 df 83 | 0e 83 25 d5 1d cf 01 7e 3a 78 8f e5 6a 78 e6 e2 | 29 00 00 24 13 93 42 44 90 80 6b 35 c2 5e 00 aa | 18 61 3c 94 23 16 f4 80 eb 14 77 76 13 a5 d2 f4 | 47 15 b8 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 af 50 0e 75 32 2c 30 6a 5d 77 15 | e7 d4 97 27 34 92 b0 ef 00 00 00 1c 00 00 40 05 | 8b 30 38 2d 43 32 0c ce 46 12 30 88 5a 16 6f 72 | b2 04 88 95 | libevent_free: release ptr-libevent@0x7f49a401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #316 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd c3 31 0a 53 0f cf 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | fd c3 31 0a 53 0f cf 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.179579; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | libevent_free: release ptr-libevent@0x7f497c03e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #438 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fdca8 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.201985; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f497c03e5d8 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | 29 00 00 24 56 9e f4 16 12 f8 89 df 66 51 be 2a | 1b ac 38 dd 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 | 71 30 8c a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 | fa 1e 4e 52 6e 6a 7f 5c 00 00 00 1c 00 00 40 05 | a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | 94 aa f7 cb | libevent_free: release ptr-libevent@0x7f4974043f48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fdca8 | #498 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.230272; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fdca8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #317 | libevent_malloc: new ptr-libevent@0x7f4974043f48 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 06 17 de 2e fe 6d bd 95 a3 09 19 fc 52 8e 75 | 38 3f 66 74 5a 0c ff 17 52 33 94 67 16 a2 1e c1 | 80 4c 04 56 20 dd 20 75 d9 9c 9d 98 f9 6a e5 48 | 5d c5 31 fb 88 d0 e9 d4 90 cf 7a e8 2f 95 33 72 | 40 86 dc f7 04 fe f0 83 b9 15 84 6c 0f 57 d6 36 | 5d 4f 55 e5 a5 26 e3 8a 8c 4a 47 90 43 0f 1f 3b | 80 97 a9 d3 8c 41 6f bb f0 76 e6 f7 b4 d9 bb c5 | 60 3d c2 20 9c 03 67 a7 9b e8 71 d9 6d a8 93 0c | 6a 5c 60 77 37 2f 44 87 29 99 34 97 0d a2 2b c7 | 0a 64 2f 23 6b 83 bf 47 bd 40 b8 82 a0 66 bd 68 | ae 7d fa 95 af 3a 52 0a 14 cd 2d f1 9c c0 77 de | 24 de ae 43 6a 1a 79 60 ee dc b6 b8 17 1f 60 74 | b1 ea ff 0b 99 2b 09 cf 22 06 8a 2a d0 d1 aa f5 | 0f 11 d1 fa e4 d8 eb 19 2f 0b 29 ef 0e b3 33 0a | 0d 03 0a 12 20 8d 9c e3 d8 04 d3 8a d2 95 60 a0 | 2c fe 68 a1 0a 6d 4c b0 2f f1 ce c5 ef 10 f3 d9 | 29 00 00 24 ce 2f c1 c5 04 83 4e 25 5f 5b 46 b1 | 09 d7 4e e9 f0 0d f0 bf 92 16 0c e0 4d f2 69 35 | 45 b1 37 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 b7 83 b3 5f f4 eb c7 fa c8 36 17 | 4e 44 78 06 9c 9c ee 34 00 00 00 1c 00 00 40 05 | 1f 40 ad 8c 21 30 19 10 c1 24 82 8e 2f b5 df d1 | 94 3d ab 83 | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #317 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 d9 4f c1 06 2c 9d b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 06 d9 4f c1 06 2c 9d b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.268579; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | 29 00 00 24 a9 0b 28 38 2e de 26 e9 76 17 33 4c | 94 7b a2 b1 a4 23 3a 31 ea 41 71 23 a6 cd b8 69 | 1b a5 53 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 02 d6 6f ac 39 1a fb 71 6e 39 92 | 4b 5a 34 27 ea bd 0b d7 00 00 00 1c 00 00 40 05 | fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | 5a 51 13 ab | libevent_free: release ptr-libevent@0x7f49a8049798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #499 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab0038 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.273874; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f49a8049798 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | libevent_free: release ptr-libevent@0x7f4978043cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab0038 | #439 spent 0.0882 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.288134; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab0038 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #318 | libevent_malloc: new ptr-libevent@0x7f4978043cb8 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 c0 ce b5 9c b5 88 57 e1 1f 55 aa 00 59 10 f5 | c2 5a 4d cd b5 cc ee 23 ae 01 e3 11 ba 83 a6 1e | 68 58 db 81 1e 70 6b 67 fc c2 02 9d f0 ef 29 31 | b8 61 bd 87 8b 57 77 e6 d2 97 63 58 44 04 5d f2 | d7 31 41 f9 9f 02 e9 5b b3 a3 24 29 31 c9 df 3d | e4 ad a7 b0 0a c4 9a ad 7f d2 ad e1 29 7f 76 cd | 93 a6 c7 b8 18 e5 c3 0c e4 be 4a b9 a2 b4 cd 6b | 7a 14 60 2c c9 a6 80 97 54 31 f6 59 d7 6b 69 b4 | 5a 54 16 55 51 0e 98 92 19 ec 4f 18 e3 f2 8f 87 | a3 af 4d 81 1d ee 64 69 f8 b6 40 3e 13 ef 75 d2 | 80 d0 91 7f f9 ae a6 9d 3b 3f 94 7d ba 68 37 f0 | 8d 92 fe 0b be a2 9f df bc 11 c0 d7 4e e4 9c 51 | 70 e0 ab 54 7e 0b 06 02 e6 c8 7f 1e 25 b8 51 fa | 4a a0 18 50 2d 10 bb 49 fc e8 70 75 57 40 6c 46 | be 7f 79 f5 0b 2a 15 6d f8 ad 52 45 e6 05 cd 44 | 99 91 ca 55 4f 2b 98 8f ec 61 40 c1 53 f0 53 35 | 29 00 00 24 65 b9 45 73 df d3 2e d0 66 22 4a ac | 3f 0f b4 09 10 bb 0a 29 b2 9c 13 ef 77 09 60 fb | 73 4f a6 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 15 c0 0e cc 3c 2e 0c d7 4f ce 97 | eb 5b 31 b0 c5 89 e5 ac 00 00 00 1c 00 00 40 05 | e8 a1 6e 56 ec 73 2e 23 d4 68 1d 6b 1e 7c 33 e7 | 42 94 26 88 | libevent_free: release ptr-libevent@0x7f49780334d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #318 spent 0.098 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a d0 ca cd d3 5f 41 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | 1a d0 ca cd d3 5f 41 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.329413; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f49780334d8 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | 29 00 00 24 b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 | 27 bd ef b5 b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 | 78 29 16 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 | 78 19 5f 00 a2 d7 7a 84 00 00 00 1c 00 00 40 05 | 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | 5a fb e6 0b | libevent_free: release ptr-libevent@0x7f496c033718 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #500 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d2548 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.335641; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f496c033718 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | libevent_free: release ptr-libevent@0x7f496c043df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d2548 | #440 spent 0.089 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.343876; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d2548 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #319 | libevent_malloc: new ptr-libevent@0x7f496c043df8 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 d1 52 05 b9 88 91 50 62 d1 66 c9 a5 ad 2c ae | 9f f4 14 f5 65 80 1d be d7 42 1f 0a 51 5d 76 49 | 3d 5c c0 65 95 28 fa 66 1d f8 8a 27 7f cd e8 39 | 5e a7 5e 7a 25 76 f6 51 ba bd 4f ca e6 5e 1e 58 | 50 10 50 d9 0a 54 97 ab ad b4 a7 4b 95 57 28 ce | bd c9 04 96 30 2a ae b4 e1 1b 24 f9 74 58 62 0e | 9a 71 d6 44 4b 9e 3c 28 d9 fb b8 be 40 92 da 43 | 24 50 dc 55 ac 7c f2 ea b4 e2 d9 ac 65 83 84 e2 | bc 1a 2e 4e 92 64 c3 1f eb dc ac 94 0c 85 07 4d | 5a 80 e1 20 97 5e a1 eb 24 a3 75 ad 46 d0 64 d4 | 49 78 65 f1 0a b2 46 65 34 d0 fb 87 55 88 fd 4d | 7d d9 35 32 eb 49 9c 93 14 1b 15 50 50 56 e5 ee | d1 e6 4b f3 01 d3 8a 0d d7 15 b0 80 55 41 ca 8f | 9c bf 09 20 72 75 a3 db ed 71 a0 1f 24 63 dc 38 | ad b8 da 10 25 4f d4 47 27 c3 9c 7b c5 68 f7 dd | 0c d6 f6 69 55 05 81 c3 bd 82 0c f9 f1 a0 1f 01 | 29 00 00 24 5b 0e fe 71 de ba 9a a0 b0 b3 e5 4c | 72 54 86 26 3d e7 c1 53 f5 9b 40 a3 9b 70 62 bb | 89 83 d8 d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 07 48 cb 29 10 06 76 d4 be 74 e9 | 7a 22 65 d8 bd 1e d3 ce 00 00 00 1c 00 00 40 05 | 58 84 a4 0c 8e e0 77 ce 78 3b 73 c0 b0 b0 86 12 | d4 35 5a 53 | libevent_free: release ptr-libevent@0x7f496c033618 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #319 spent 0.084 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 27 75 17 f4 c9 a9 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 1a 27 75 17 f4 c9 a9 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.392126; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f496c033618 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | libevent_free: release ptr-libevent@0x7f49bc046748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #441 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade738 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.394385; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f49bc046748 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | 29 00 00 24 76 88 4f 06 94 72 ce 77 34 ab c1 ce | 30 0f 6c 6a 03 46 20 57 64 80 23 52 49 ec 2c 3c | fa a3 3a a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc f2 54 8e ce f6 a3 29 a3 3a 88 55 | fe 0e 47 7d cd cf fb bc 00 00 00 1c 00 00 40 05 | 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | ed 7a 46 06 | libevent_free: release ptr-libevent@0x7f498c022b78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade738 | #501 spent 0.0845 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.408736; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade738 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #320 | libevent_malloc: new ptr-libevent@0x7f498c022b78 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 18 c8 25 93 5f f7 86 dc e9 1a 06 48 b6 7a b6 | 3f e3 e6 db f1 c0 53 07 79 62 c0 fe 0f b0 7e 25 | 91 2a ad 06 ad e8 71 2c 54 8e ee 4f 04 25 a4 35 | b8 56 99 5c fa 3a ad 11 18 31 13 74 90 f1 8a db | db 90 52 23 c0 48 3a a5 f4 c9 54 9c 05 f1 70 b0 | 1d f1 0d 91 75 85 51 b8 49 a5 be 2a 44 d3 e7 10 | 0c 13 f0 82 b2 ef d9 54 46 6f 42 60 19 d6 b6 f0 | dc f7 4d 93 b6 5f c8 c2 4d 3a 25 ba c0 91 64 7e | bd 91 23 96 97 cc 4b d1 36 f7 70 19 7f 16 4e c0 | 1f 01 3a 97 1a 28 f5 85 9e bc c2 3d 8d b0 b6 e9 | f0 9a 80 ab 67 db 84 f1 20 dd 94 f3 d7 53 92 1c | 8a d6 5d 1e 78 cc e1 5e f0 eb 6e a8 1e 9f e2 ce | 64 75 d2 fe c3 d5 77 d1 14 6f a1 94 a3 40 8f 9c | 24 90 b5 7f e4 7e 44 d6 ea 0d ec a3 71 26 c4 70 | 78 97 6b a9 33 98 a6 98 50 65 d3 9c b9 23 89 8f | f3 2a bb 21 41 1e ec bb a9 d3 29 10 c4 70 c6 a2 | 29 00 00 24 8f ec e9 8f 2c e3 56 73 7b 85 ce 96 | 62 34 37 cb 01 14 8c 97 c9 e3 45 d0 6d 1c 25 75 | 64 0c a4 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 76 0e fe 55 3d 5d 3b e1 a2 09 68 | 5b 05 7f 11 4b 2f 85 77 00 00 00 1c 00 00 40 05 | 5a 27 4e 7c 7f 28 ed bc 6c 53 bc 67 86 d4 1d 69 | cc 55 b0 69 | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #320 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 cf 3a fc 3d 3e 91 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | 20 cf 3a fc 3d 3e 91 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.453071; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | libevent_free: release ptr-libevent@0x7f49a4043bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #442 spent 0.211 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0951 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6a78 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.458549; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f49a4043bd8 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | 29 00 00 24 a4 bc df d3 a5 ac 32 27 d9 78 ab 13 | eb 9a fd dd ed d2 d9 da fd 94 93 9b 85 07 d1 0c | 2e 23 4c d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 a3 64 88 f7 8b c4 8e 31 66 88 18 | ef 0b f6 ba 75 14 dd 0a 00 00 00 1c 00 00 40 05 | f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | 8e 66 bf 72 | libevent_free: release ptr-libevent@0x7f498c02db98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6a78 | #502 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.464905; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006839 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6a78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #321 | libevent_malloc: new ptr-libevent@0x7f498c02db98 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 5a a2 82 40 6a 55 6f 65 99 52 cb 7b d7 55 bb | d5 d1 7a 54 45 da 79 4b ff 33 e7 7e fe 4d 19 d5 | 36 47 ce e5 9e 85 f4 7d 6b 03 f3 50 1b 67 d1 7d | 2a e3 ad 44 ae 8a 28 2e 2b 1f 34 18 00 c0 5b 8e | 33 44 cc b3 f3 b8 27 b1 97 79 64 7b 73 3d a2 0a | 05 9f cf e9 3d 7d 97 ca ca 3f eb ef b6 5b 5f 8d | 87 af 7c 56 b3 6f 9c 2e 74 11 27 e1 4f c9 49 87 | ef 80 cf b0 84 7f c7 ae 19 22 36 11 c5 0e 57 0f | 80 75 9a 05 e7 8a 8b 81 04 00 f6 60 e4 1b 71 25 | 9f b4 2c f0 37 eb 58 9f b7 45 7c 39 36 24 a0 c9 | 2c 42 fe 64 e8 2f c1 a8 8a 47 1b 45 51 2e dd d5 | 9d f2 b4 2f bb 2d 8c 77 fa 25 7c 97 71 1c 5c 1d | 1f 99 a1 dc f2 34 94 3b 99 4d 8b f1 d8 32 4f 4c | f0 82 2c 05 a6 58 06 55 7d c6 73 7c c1 1d 22 8d | a9 38 67 e0 67 3d c9 3e 39 14 e6 e7 b1 18 24 54 | ad f4 df bf c6 3e ce ac 77 e0 86 a4 2c 3c d4 de | 29 00 00 24 d2 dd 3d 33 29 a1 cd 99 14 0d fe 3c | b9 10 80 98 a3 5b 3e d4 f2 78 22 34 c7 00 5a ef | aa c3 63 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 ad 7e 00 21 ec f9 d8 93 40 a5 a0 | 20 ce 13 c7 6e ea bf 24 00 00 00 1c 00 00 40 05 | a8 9c c1 76 f9 f6 7a 46 69 f4 f1 ac 46 e0 ec fd | a8 3f 28 28 | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #321 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa 1e 45 d0 d6 bc c6 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | fa 1e 45 d0 d6 bc c6 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0832 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.510446; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | libevent_free: release ptr-libevent@0x7f49b80471b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #443 spent 0.652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.281 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8eab8 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.522687; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f49b80471b8 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | 29 00 00 24 6a df 41 aa 43 24 5d df 47 18 db 96 | 96 68 11 71 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 | 53 6c a4 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 | b3 b3 b6 ff 76 34 ab 12 00 00 00 1c 00 00 40 05 | 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | 22 3f b9 17 | libevent_free: release ptr-libevent@0x7f498c02dc98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8eab8 | #503 spent 0.614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.29 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.528907; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006517 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8eab8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #322 | libevent_malloc: new ptr-libevent@0x7f498c02dc98 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bc ef c5 4c 78 51 df d3 ef d8 0b 86 fb b0 d9 | 64 9e 9b 19 65 28 03 24 bb c4 5e 3d 39 a2 03 be | 91 6b 6d e9 d9 c7 57 84 a3 56 72 71 1b 37 41 75 | ea c6 5f 87 3d 39 3c d5 71 4c 35 2a a3 cc 09 0b | 3d 81 f2 b2 64 c6 36 f6 e0 12 24 55 df 37 40 7f | ec c0 ee a7 a1 d5 9f a8 c4 78 05 e3 5f 2e 53 33 | 84 93 59 d5 a4 86 e1 70 33 1c 1c 70 43 51 45 40 | 88 19 80 f1 a4 91 7d 81 d3 67 c4 52 8f ac 7a 4c | 50 a3 43 a3 12 37 4a 86 20 8b 2f 51 bd 8a 07 bf | 4c b6 cc 84 3d 4c 0b 20 ef 18 d0 cd 2b 71 d7 5d | a6 ce cf 92 17 65 36 bf 52 30 0c 71 36 48 f7 41 | 0d 50 b1 be 67 a7 ad d3 f3 e9 aa 31 61 de 91 d5 | 04 81 d4 79 ea 79 ae 6a f7 98 75 46 3a 26 d2 b5 | 1a af 5f cc 60 45 58 b8 1d 63 3c a7 8f 8b 7c c5 | 8e ea 1a 26 5b bc 45 57 c4 4e 01 fb 7d fa f1 29 | 8e a3 5a b2 4c a3 b6 49 78 28 d1 2b c7 66 7e 78 | 29 00 00 24 ea 82 62 53 46 1f 85 0f 71 b9 78 41 | e8 77 9f 5a ff aa 43 11 58 d2 95 af b4 93 dc 8d | bc 49 aa 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 79 0a dd 3a 44 7c f2 60 47 19 e5 | 57 c3 c4 fb 7e 64 73 39 00 00 00 1c 00 00 40 05 | 61 40 7a 70 c7 d2 18 7f 07 6e 73 56 13 bd 98 d4 | 1b e6 b4 de | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #322 spent 0.407 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 21 4c 9e b6 27 92 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | b8 21 4c 9e b6 27 92 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.224 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 4 | retransmits: current time 10660.582855; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | 29 00 00 24 0c da a4 86 c2 a1 85 08 e3 8c e5 ab | 08 04 21 15 d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b | 86 e6 76 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 99 80 26 7e 80 26 83 7e e1 f2 65 | 5a 6f dd 9b e9 af 20 64 00 00 00 1c 00 00 40 05 | af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | b0 83 1b d1 | libevent_free: release ptr-libevent@0x7f498402dbc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #504 spent 0.455 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.207 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daece78 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.584785; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f498402dbc8 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | libevent_free: release ptr-libevent@0x7f49ac004e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daece78 | #444 spent 0.556 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.277 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da95d68 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.586834; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daece78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #323 | libevent_malloc: new ptr-libevent@0x7f49ac004e48 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 3c 2d c1 c2 f0 e3 cd 10 72 c7 15 be 64 0e a4 | a1 c8 98 5d 0a fb de 85 ff 18 53 85 c9 ed 0e c5 | 0a 59 43 e6 17 ae 98 bd cc d6 f4 25 a4 3f df 96 | 2b 64 c6 f4 0c 35 96 2f d0 20 65 f4 82 51 f3 e9 | 12 e2 e2 8b 42 b5 c7 c2 ee 43 5b 3b 4d 40 19 4f | 99 b3 8f 90 bd ca 76 6e aa 35 f6 85 5c 46 bb 2f | a3 72 fc 64 4e e3 c1 f5 dc d8 32 79 56 d1 28 19 | 3c a0 69 56 88 31 65 b2 ea 20 cf 88 9c 49 ad 07 | c8 b2 e0 e8 47 6d 36 11 78 6a ac 1b c9 8d 88 27 | bf 3b 9f 64 c0 03 6e 10 20 ea a6 31 b0 fd 2e 81 | 62 d0 ec d6 97 88 7e 9b eb dc c5 2c 10 d0 77 75 | 70 5b 76 f0 00 f6 d7 87 e3 8b 8e 25 09 0e 0d 42 | d9 ec 80 29 c9 b5 74 b1 d5 be c2 b5 ce 81 58 fe | 95 3a 41 75 f5 a6 ed f4 e8 37 e8 c3 5e cd a3 04 | a2 bc e5 88 90 10 09 6d d3 fa 5f 9e 32 38 5f e6 | 2a 31 bc 03 fb 6a f1 52 4f b4 41 b8 79 0f 96 7f | 29 00 00 24 da df 6e 25 e5 71 cd 0d ad 5c ed 43 | 2a ee 25 13 78 f2 69 6a a0 1c d6 00 52 c9 6e ec | 32 51 c7 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 22 1e 4b 8f 48 4b 00 9c 38 11 c5 | be 21 f5 30 04 18 c4 28 00 00 00 1c 00 00 40 05 | 5a 9b 26 c2 0f cd 95 81 81 40 62 a6 ba e6 cb e9 | ee 9d 46 b1 | libevent_free: release ptr-libevent@0x7f49ac038e78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da95d68 | #323 spent 0.394 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd e3 f5 81 b7 50 be 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | dd e3 f5 81 b7 50 be 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.19 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.643559; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da95d68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #324 | libevent_malloc: new ptr-libevent@0x7f49ac038e78 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 9d e5 1a de b0 92 64 99 d0 ca be f7 5c a7 b4 | 45 7a 40 be 75 ae fd 12 20 8d 2a 8d f5 d9 2c 61 | 2f d3 48 cc 89 6f c4 45 bc 55 c4 c5 4b f7 59 54 | 6c 69 0a 3b d6 b7 44 22 82 46 06 00 64 8d 15 86 | 0c ba ee 5c c4 63 04 78 9b 16 31 72 a9 a3 43 08 | 8b 93 d2 79 cc 50 05 21 82 31 db 9c ba 4e 6d bf | 78 4e 9d 27 00 43 b2 a4 34 76 94 5a 47 e9 4a bc | 69 bb a0 06 ee a6 6c d7 00 45 2b 64 4c 94 f8 62 | 2a 97 ff e2 63 8b 37 f6 fc 4a ad ca b7 5c 28 1f | a8 4d d7 6c d7 e9 0c f6 21 2b 3e 72 53 87 c5 1f | b7 ce de 55 95 2b e5 b2 f7 ea c4 14 d7 d3 36 5a | 8d b6 df 0d d8 bb 1d db f8 8c 5a 86 31 1b 5c 8c | 55 e7 c0 3f 20 e5 2d 2d 50 f4 f5 f3 bb a0 c1 34 | 2d b3 c2 6b fa eb a0 9d 41 0c cd da 90 39 e2 24 | c9 59 b8 b2 af 7a e2 fe 43 e2 cb 59 f8 25 ba 48 | 10 53 63 ee 92 1a d5 47 cb 64 08 11 95 d9 df 63 | 29 00 00 24 3a b5 f3 a4 69 c7 62 a6 bc 23 d9 b0 | 26 f7 9a 01 8a e5 8c f2 06 50 a2 a8 54 9c 75 80 | 2e e3 3b db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 31 fc 40 6d b9 dc bb cd 0d e4 34 | ae 2f a1 7a 55 96 7a 62 00 00 00 1c 00 00 40 05 | 65 a7 c6 d9 9c 39 dc c6 8e 78 30 3d 96 c6 cb 64 | 46 af d1 40 | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #324 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 96 ef 40 1f a0 93 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | b1 96 ef 40 1f a0 93 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.645857; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | libevent_free: release ptr-libevent@0x7f4994033678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #445 spent 0.0968 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab8a98 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.703138; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f4994033678 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | libevent_free: release ptr-libevent@0x7f49a4049498 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab8a98 | #446 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.705507; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab8a98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #325 | libevent_malloc: new ptr-libevent@0x7f49a4049498 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 4a 1b ec c3 1c 23 2b 4b 1f c6 3d de e1 67 06 | c9 94 e7 a8 aa eb 58 9e 84 6b 1c 3d a1 88 bb 5f | 35 7b 48 63 f0 b0 5a 47 78 a8 a0 34 7e 62 47 0b | 92 21 d6 eb cb d5 94 84 5f 08 89 24 20 20 13 46 | 5e 62 14 e4 38 00 50 af 24 a2 7f 7a da 55 78 a3 | 1f 81 15 52 96 12 e9 bb d5 3f 76 89 67 54 78 fd | be d2 5e 4d 5b 31 1c b5 bb 20 a1 6f a5 c5 71 6f | 38 e5 b0 54 23 cd be f6 87 5a 60 0d a0 ea c4 51 | 2e f1 b9 ef 9f ee 48 7a b5 5e ae f1 7d f1 4f 68 | b3 9a f0 ea 2e 15 8b f3 2e cd c3 92 ca 4b 03 56 | d6 bb 34 5f af 37 4f 62 22 82 c0 d9 1a af 2e e1 | f8 9f 32 b6 56 6c 26 dc 13 e1 9f 81 21 bf 0b 16 | d6 2c 83 f7 1e 17 a2 b6 bb 31 da 8b 36 c8 37 68 | 33 43 21 2f 5f 84 bd f3 d2 44 d0 4d 75 23 45 be | 77 e3 7a a7 ea 2b 67 63 35 69 27 99 a1 52 05 ee | d7 be 02 cf 20 b5 dd 1f 85 fd 1e f9 78 4a 8d eb | 29 00 00 24 54 94 d5 05 05 e9 55 e1 5b 7b 75 f3 | 5f 40 f8 60 cf 7b b2 30 d7 99 37 db 5f 4f 58 34 | 7b dc 83 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 37 3d 75 93 36 42 9f 33 4c 13 4d | 0a d0 ba c7 78 a4 2a 42 00 00 00 1c 00 00 40 05 | 1f ec 21 6b 21 ea ba 10 e9 7a 75 b4 d7 42 79 31 | bb 13 9d 48 | libevent_free: release ptr-libevent@0x7f49a4038f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #325 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 7e 33 f2 ba e9 f4 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | 25 7e 33 f2 ba e9 f4 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f497c0058b8 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.76385; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f49a4038f28 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | libevent_free: release ptr-libevent@0x7f499c01d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f497c0058b8 | #447 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.781205; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f497c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #326 | libevent_malloc: new ptr-libevent@0x7f499c01d3f8 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 5c 68 ed 0f 9a b3 e0 5f 49 1b cc 76 ab 0f be | c3 6f 99 2f ff 7f e8 87 90 62 23 f8 a0 77 73 76 | ce a2 86 e4 4e 94 7d fd 57 72 be 70 44 df 3b 5e | 5b 63 f4 60 73 d9 ab 1c d8 d0 78 3f 0f 88 4b e6 | a5 72 2f f0 f6 74 03 94 d2 2f 26 21 8f 45 3d ff | a0 73 31 30 31 e0 6c ec 24 b7 e4 64 5a 8c 45 c8 | f7 92 a3 d4 5d 38 e4 4e 2d 40 b9 f7 a5 f8 07 ef | 8a 1c 64 fc 8e b8 34 91 8b d6 a4 82 9d fb 76 69 | f4 6a 82 c5 f8 c2 2d 18 55 c8 e1 ef 49 72 d0 2d | ef a2 10 b4 9c 45 29 8f b1 e8 fe 0c 35 c4 4c 25 | d4 ec a7 ed a9 9a b0 a9 23 67 f9 71 3a 8c dc 5d | 5c 78 d1 ff 4c a4 f5 3f b6 b4 af ab 17 c1 9b a5 | 56 80 c1 ce ea e4 8d 7e 54 de 1f 12 78 3d fc 67 | 33 90 12 aa 17 5e 6a 22 5d 95 04 c1 51 dd 95 df | fa 99 55 3c 2c 80 f0 15 36 dd 8d 71 28 9c e3 3b | a8 be 17 4e a4 c1 3b 00 03 a0 7c 35 a6 df 61 14 | 29 00 00 24 e7 51 71 fd ee cb 6c 0a f1 e9 52 c6 | e9 1b 66 8f c7 de b1 8e 8b 50 6d 74 53 8d d7 b1 | 83 dc 9d a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 18 2e 60 04 47 a0 57 5b 6e 63 88 | 25 eb bf a4 03 b4 6d b7 00 00 00 1c 00 00 40 05 | 8a e6 df 14 f9 29 e7 91 01 e6 70 42 40 b0 2a 5a | df a4 4e 96 | libevent_free: release ptr-libevent@0x7f49bc01a7b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #326 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 4f 20 65 14 f7 75 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 75 4f 20 65 14 f7 75 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98b88 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.826554; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | libevent_free: release ptr-libevent@0x7f49b0017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98b88 | #448 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0959 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.837969; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98b88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #327 | libevent_malloc: new ptr-libevent@0x7f49b0017df8 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 38 ad 0a 8a 78 6a b5 54 f3 18 65 1a 25 85 8c cf | e7 3f 0c fc 5a 57 ec ab e0 ae 34 25 ae 97 7f 8d | 96 f3 37 a6 69 c9 d5 66 d4 37 cf c4 91 d8 d7 52 | 03 35 4c f9 68 94 8f 0c 6b 87 aa 2a a1 0b 93 b5 | 3a d5 e4 b1 45 bc ed 76 6f 4b b7 67 03 21 5c 9e | 3b 96 4f cd de 74 7f 13 09 cf 36 3c d4 07 24 7f | 0b bd eb 7a e8 49 85 7a 00 be 8a 90 a1 1f a7 bc | 87 9e a0 da 3b 48 91 a4 f1 49 93 e9 9f e6 94 00 | af e8 0a 30 d8 b7 f7 3e 73 5d be 89 4a 4b 30 25 | 60 70 36 96 71 27 52 f2 78 c8 42 69 07 b1 d1 6a | e3 1e 95 a0 63 b9 5f a6 ab 81 dd 79 7e 3d a3 c6 | 44 62 69 bd 9d 54 0b c3 d1 d0 04 0e 63 98 f7 30 | 2f cd 5d 61 40 a6 24 17 3a 67 c5 3e be 87 6c 08 | cb 81 5e 7f 34 57 8b 7b cd e6 73 a0 f8 71 26 2e | 8f 97 64 6e d8 f5 bf 04 5e a1 e7 b0 93 ad d8 16 | 0c 79 ed b2 a6 d7 fd 47 75 e1 44 46 89 ec 84 fb | 29 00 00 24 90 cb 6c 40 09 71 c7 3e a2 87 4e 1a | f2 27 34 b8 1d c6 ee 3b f3 62 43 91 91 f2 42 4d | 05 4f b2 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 59 36 81 c0 06 e7 b1 82 f1 fc fb | b1 0e 20 a2 19 35 44 9e 00 00 00 1c 00 00 40 05 | 16 94 c2 c1 b8 b3 db d3 28 fd 59 d7 06 2a 80 23 | 57 26 54 f1 | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #327 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 fe 82 f2 7b 90 d3 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | 95 fe 82 f2 7b 90 d3 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64948 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.886334; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | libevent_free: release ptr-libevent@0x7f4998023608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64948 | #449 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.919602; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64948 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #328 | libevent_malloc: new ptr-libevent@0x7f4998023608 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 0f ae 93 9f 71 d0 9e e2 fe 63 a0 a5 26 d2 9f | 7b 5e b5 be d4 22 4f e9 86 d6 0a 14 ca e7 87 25 | a0 55 f4 fc e7 86 d4 76 ff 28 b2 a0 14 75 69 30 | 12 24 ba 9e f9 1b bf ee a3 e7 7a b1 29 1c fe db | 38 ca 4a 76 97 40 ee 4d b2 ad 37 60 12 83 7e 53 | 16 de 74 86 e1 e2 12 07 53 68 97 a5 4a 04 ec 62 | 7e c7 77 f6 9f de c1 40 8a d6 51 85 66 4d b0 57 | 32 40 fe da 64 8c 20 a5 7b 3a 3f 8e 77 e0 d4 b9 | c2 88 6d 59 85 a0 b1 05 3c e8 29 fb f1 46 1e 98 | 62 67 12 2a 52 32 e2 ef 16 69 79 ae 80 f7 f6 22 | fd 03 d9 80 e5 93 5e 49 73 9a 31 7f b4 c5 da 90 | 8c 72 65 39 2d 4e 7b 90 6f 74 5b 32 12 6f 45 ef | 86 43 38 33 f6 01 56 02 3e d2 c7 41 14 80 9f e2 | da 6b 22 44 b2 4a d9 e6 11 f9 56 c6 ab aa bd 62 | 7d c1 14 69 21 6c 26 ae 2f 74 96 c9 7e 61 4e e3 | 46 f9 3c 91 08 33 1d ef 96 82 6f c6 f9 b9 1b 35 | 29 00 00 24 b6 98 22 88 58 98 e1 0f 5f 9a a5 17 | 44 8b 1c c7 79 5e a5 70 90 7f cc 87 df 3a 70 f1 | d5 bb 7c ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 25 98 0f fb 01 b9 01 a1 60 05 72 | 08 8d 42 90 fb 70 4f 80 00 00 00 1c 00 00 40 05 | 4d d7 b1 be 18 77 2f 14 9d 55 d4 2a a8 fa 9e 84 | ea a0 15 3e | libevent_free: release ptr-libevent@0x7f497802dd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #328 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 74 a9 f7 4c 68 88 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | eb 74 a9 f7 4c 68 88 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1dae8 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10660.948905; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f497802dd68 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | libevent_free: release ptr-libevent@0x7f49b4035f78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1dae8 | #450 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10660.981267; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1dae8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #329 | libevent_malloc: new ptr-libevent@0x7f49b4035f78 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 29 33 a4 83 ab 64 fe f4 47 87 6f 14 e1 09 | 2b 83 89 9e 75 2d a8 d5 05 a2 64 e6 35 90 3b ae | 81 98 49 e9 5f 7f ba 44 7d a6 0e 59 34 99 7f 51 | 09 07 d3 6c 34 23 c4 f4 31 7d c9 c7 a2 06 20 96 | fd 4d 4a e7 10 a7 a3 24 2b de fa 17 c0 8e 36 99 | c6 3e f5 09 79 6b 90 b9 67 9e 69 5f 21 3f 13 18 | c4 b0 48 f1 bc 18 8e 58 d8 38 7e 56 85 fd 6a 7b | a6 1d d4 67 36 f9 02 6d d1 75 20 cb 12 eb 00 d6 | 3b 66 ba c3 26 f8 2a 05 46 b6 53 78 ef 59 40 bd | e1 5f 35 c7 e4 e8 8c f6 ea 05 a2 6b 08 32 0b 45 | c7 46 1d e4 8c 68 33 b3 bf 22 44 ae 16 5a 48 fe | 58 36 1f 5a 71 30 15 a9 79 36 b9 64 55 0d e2 05 | 02 b9 33 f7 50 76 88 19 61 78 1d d9 95 e2 d6 46 | 97 3a 78 60 d8 c5 4e c9 1c a3 26 c5 94 88 da 59 | 9c 28 46 50 23 d6 3f 11 8c 2e 97 8c 56 2d 71 e9 | 25 ab 26 b5 15 a1 12 01 7b 84 c5 1f 44 77 28 c5 | 29 00 00 24 13 a0 9c eb 00 11 4e 73 d3 94 18 14 | 0e 02 be ad 8a af 21 29 ef a2 53 ad 2f cd 82 9e | e3 6d 59 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 5b c2 f8 9d fd ba ee ef 3d 90 3c | 66 21 39 2a 31 cb b0 ca 00 00 00 1c 00 00 40 05 | a2 9f c2 cd e8 8b fd 0a ba c0 b7 68 c8 69 c6 a0 | 9a ea 24 98 | libevent_free: release ptr-libevent@0x7f496c02dda8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #329 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f a8 92 b3 85 8f 06 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 7f a8 92 b3 85 8f 06 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70248 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.011665; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f496c02dda8 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | libevent_free: release ptr-libevent@0x7f4988017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70248 | #451 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.039937; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70248 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #330 | libevent_malloc: new ptr-libevent@0x7f4988017b48 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 b2 a8 89 86 07 35 28 c3 fb cf d9 e6 2f f8 c2 | cb 42 7f b1 2e b4 75 d2 c5 cf 16 ea 9b ae ff f9 | 7c 97 5e 2d 36 22 bb f7 f8 69 d7 c1 4e 0a 9d aa | a5 38 27 d0 64 00 33 e4 bc c3 2c 7d f9 b9 8e 30 | 4f e0 52 fd 35 4a 9d ac 88 c2 ee f1 25 8c 0a b4 | 93 98 cd 8f 32 d5 4d df d3 47 99 b9 31 60 e6 8d | e9 34 7d 14 31 15 17 2e 59 4e dc ff 5f e7 61 cb | a1 82 5b 04 a2 8b 2e 03 28 c7 e0 39 57 3c a3 02 | 1e da 49 8a 62 d0 9f 3d 70 8f d8 c7 1e 4d 8a 7c | 46 6b b9 ff ae 6f de 5c 84 4f 6e 38 c8 8b 6d 26 | 38 2e 15 8b 34 17 f8 d3 f7 ba e5 04 21 3c a8 08 | a5 87 37 f1 38 d3 ac 90 f9 92 b9 56 79 15 2d 32 | 43 87 f5 35 5d f5 00 73 92 c7 05 56 6f 41 14 4e | 38 49 ee 09 9b 6b dc 49 c5 2a f0 c0 47 88 3d cb | a1 aa b9 ee ca 7c fb 25 63 48 0d e0 d2 87 e5 b0 | 56 1a 9e d2 5d 26 dc 32 ba c0 fb b2 75 57 9e 17 | 29 00 00 24 52 b3 b0 2a f1 c0 b2 de ac e7 a1 3b | 0f f6 35 6a e7 a7 83 98 25 3e 1f db ad 79 47 5b | e1 06 d1 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7c ae 42 95 39 d0 21 c1 1e 4a cb | df f2 c0 17 64 a5 a0 c4 00 00 00 1c 00 00 40 05 | 4b 42 81 4d 68 b0 4f 33 04 89 ad 7f e0 42 87 aa | dc 09 83 63 | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #330 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 34 68 3c 51 f3 a1 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 01 34 68 3c 51 f3 a1 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0494 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d8278 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.068355; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | libevent_free: release ptr-libevent@0x7f4984022d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d8278 | #452 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0891 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.10095; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d8278 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #331 | libevent_malloc: new ptr-libevent@0x7f4984022d68 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 25 6b 05 a1 2d e1 f8 4e 63 67 e9 3c 98 c7 43 | b6 b6 3e d4 d4 6c 41 5c 77 04 12 f5 6f bc ab cf | 43 30 e6 3d e4 4a c4 72 16 89 b6 c1 97 dc 68 ce | fe 54 fd 1b 3d c4 45 71 94 b5 23 40 02 79 a5 3c | cc 70 9d 0f 6b 3c 35 08 46 16 32 88 ca 9f 48 cd | fa b4 f1 77 84 56 e0 5b e7 66 52 ad b7 a1 5c f7 | 18 45 3b df d1 35 05 94 fb 26 6b 8d 3c bd aa 9f | f5 78 b0 15 f7 80 bf e1 05 9d bc d7 3a 88 a1 72 | 03 6b 3b aa 64 22 0d 85 e3 25 04 d5 91 76 6d da | 8e a4 b9 db 36 3a 88 7f da 72 53 dd 0d 69 70 16 | fe 8b fe dc 7e 2c bd 34 82 52 90 ae 72 ab e9 a4 | c9 72 95 76 83 91 17 66 8d d6 cf 0a 3b 0c a4 db | c2 59 5a b0 b9 b7 28 32 5e 11 cc 0f db f9 83 3e | 09 cd 83 0b f5 09 82 7e 64 23 86 08 a1 6f fb 20 | 7f 46 7b 08 42 70 75 55 67 f0 ec 11 b3 d2 d0 da | 16 e5 f8 48 9d cf 55 d2 8e a3 ba 98 f4 68 22 e8 | 29 00 00 24 13 76 75 df b5 79 59 65 63 28 fd 6f | f7 33 b2 80 2f c4 2f 08 2e d2 19 58 eb 9f 4b 06 | 6c 88 6c e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 72 fe 29 e7 6e f5 6f c5 ea 78 80 | d6 d4 c9 c6 48 a7 59 8e 00 00 00 1c 00 00 40 05 | 24 20 d4 2c 5f d9 a5 f9 79 5f e6 17 9c 3c d7 f7 | f2 b9 12 88 | libevent_free: release ptr-libevent@0x7f498c038cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #331 spent 0.432 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 eb 38 c0 4c 62 f2 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 30 eb 38 c0 4c 62 f2 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f4998049be8 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.128795; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005832 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f498c038cb8 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | libevent_free: release ptr-libevent@0x7f497801d998 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f4998049be8 | #453 spent 0.296 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.117 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.165321; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f4998049be8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #332 | libevent_malloc: new ptr-libevent@0x7f497801d998 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 30 c0 4d a6 d3 61 8f 7c 01 74 29 68 2e 9c b0 | 4e 0c ed e0 61 51 5e ca 7f 46 de cd a5 a5 79 57 | e1 2b 50 ee c6 cf 9f f3 8e fd 26 1b 5e 2a ca 1c | 73 b3 76 96 8a 38 90 7b 2a ec 4e a0 35 8f 50 d9 | 31 2d 40 bf 03 89 44 e9 09 69 48 eb 8c 3e d3 d1 | cf 15 f8 4f c9 74 76 fa 69 72 b8 e0 b8 47 5e 19 | 16 f5 27 70 47 ec 7a ad 11 cb c6 c7 9f 7a df 4d | ef 8e 43 bf d4 00 e9 ec 16 c8 02 bf d7 b7 9f da | c9 52 dd 6d 4c 0d 62 6d a6 f1 e5 21 b8 91 30 17 | 17 85 01 d4 a5 80 b1 e8 71 08 cf 11 35 da 6a 5c | c3 4b 36 57 cf a0 de e2 d1 3d 66 47 4c 1f 1c 96 | 09 0a fc 1c 53 3d 7e 65 35 0e eb ca 4c ae de a9 | 6d 2a b9 f6 58 19 73 0e 91 03 00 d4 1a c1 3e 15 | 04 64 26 15 b0 48 83 b2 e2 39 82 07 24 4e 20 8a | 39 86 4f 64 01 10 6d 66 02 2d 96 99 c5 dd cb 6a | 34 9d 02 e5 92 91 5b 49 8f a1 1d 65 4c f1 c5 5e | 29 00 00 24 db fe 90 0c 8e 66 6c 57 6d 8c 9c 67 | d0 a9 ed e3 9f a0 37 35 54 00 90 dd c0 c4 f3 49 | c1 d3 17 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 2b 6f 46 42 40 7b 87 de 1b 92 7c | a3 20 ba 7e 45 ea 83 1a 00 00 00 1c 00 00 40 05 | 27 42 16 a1 05 7e b0 0e 2f 1a 0e b1 8c 74 3c c1 | ff 6c ae e0 | libevent_free: release ptr-libevent@0x7f4990038cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #332 spent 0.369 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f d8 a3 33 bd b3 b2 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | 8f d8 a3 33 bd b3 b2 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da801c8 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.188886; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007104 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f4990038cb8 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | libevent_free: release ptr-libevent@0x7f498c00c908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da801c8 | #454 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.252284; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da801c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #333 | libevent_malloc: new ptr-libevent@0x7f498c00c908 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf f4 46 e0 b6 2f 3d 62 0b 56 f7 d2 e7 8b 26 11 | 8c b5 32 87 f2 81 d5 de fe cd 6e 74 f6 b1 da b7 | 71 50 72 6d 9d 46 09 ba 33 59 e1 04 7e 74 27 99 | af 59 2a c6 5d 03 93 1a 96 5c 12 a6 8c 96 6b 6c | e4 7f 3d 81 d3 51 e8 07 7e 08 7b 7d 48 d5 df 2b | 1e f2 59 d7 1b 07 78 56 a6 db 83 85 ba 21 64 e2 | 1c f5 2d c0 0a 2c 83 e0 06 b5 6d f4 95 f0 be bb | bb 7f 63 2c b1 07 8f c8 44 19 db ef b8 d1 5f 21 | 15 df 43 d9 c5 bd 84 94 d4 f7 b1 d8 72 ea bc ac | f1 b2 8f b2 2b 99 48 31 7f d4 a4 c2 f7 3f 79 bf | cb a4 64 1e 91 3c 6e c4 db 1e 7a 83 3a d4 19 d2 | 93 30 6f 22 d8 7a 78 83 a2 6d dd 9e 33 e3 04 50 | ea 8d ec 5a 17 a2 46 b5 00 3d 97 fa df 3c 0c 35 | ed f5 f4 58 40 e2 f0 31 cd 74 e0 e0 6c a5 c0 04 | 22 88 aa c4 32 fd f0 17 86 18 8e 71 1c f0 1a f3 | 5f 3a 8c b5 e7 7b 4a 17 d1 cb 0f 25 35 10 11 d2 | 29 00 00 24 e6 8b d8 3e ee 26 b9 84 ee 68 6c 6f | 86 35 c2 ac e3 23 a7 b2 3a 1e bb 29 39 30 cf 02 | f9 34 db 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 11 60 56 89 bb 47 db 31 01 b6 f5 | 3c 07 67 bb 46 48 08 36 00 00 00 1c 00 00 40 05 | 9a 01 fa dc f6 d0 82 b7 e1 29 8a 4a 8d 19 2d cb | 0c 95 20 d5 | libevent_free: release ptr-libevent@0x7f4980022b58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | #333 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af cf b4 ff 0d 28 e6 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | af cf b4 ff 0d 28 e6 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98bf8 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.275584; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005289 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f4980022b58 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | libevent_free: release ptr-libevent@0x7f49a8038f48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98bf8 | #455 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0508 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.310882; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006978 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98bf8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #334 | libevent_malloc: new ptr-libevent@0x7f49a8038f48 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 5c ce 87 b1 0f a8 c5 fc ec 29 48 d9 c6 7e 29 | 3a e3 3a 0b b2 05 36 fa e4 49 f7 71 8c 0e e9 41 | aa 48 73 7c 3d ed 0e 38 f5 d0 71 4f 96 b6 d2 94 | a5 70 17 de e6 cf 94 b9 9c 0f 0a 30 fb 1c 15 09 | 65 aa 07 f6 dc e7 87 be 44 ad 96 93 78 68 ad 5e | 61 02 89 87 08 c3 c0 ae 12 9d 0b ac 04 5a 9a ce | ae ca 74 49 09 a6 e8 34 43 19 47 9a 12 aa 65 b4 | 69 f0 7f 2f 35 c6 02 da dc 39 46 7d 2a d4 a6 2e | 38 48 0f 18 7d e4 f5 7e 03 33 50 7a 5b d2 5a 14 | d6 17 a4 f4 41 e8 b5 12 ed d5 fe 9a 69 55 27 7f | d6 96 65 56 05 69 40 ff 1d f4 ec f4 7f 70 1f a7 | e1 38 b3 e3 77 66 06 d0 ef 5e d9 2a 5d 71 ea e2 | 5f 74 3a 16 a8 25 7b a4 e6 1c ab 28 b1 3c 11 7e | 96 e9 ce 22 fc 06 cd c1 de 70 ef e4 87 f1 b8 05 | 37 4d 5e 25 46 e5 ae ca 1d 16 54 b0 b9 a9 a8 1d | 84 44 0a e7 2e 37 99 4b 9b aa b9 5e 83 ca 60 d8 | 29 00 00 24 d8 71 1a e9 c1 9a e6 db 2b 49 2f 69 | 1e e0 d4 28 76 45 ba 34 0c e2 3a 97 ad dd 3b 0a | 03 48 e4 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 21 5e 72 d0 0e 19 c8 72 e5 80 68 | 39 df f3 87 e0 9e f9 9c 00 00 00 1c 00 00 40 05 | d8 8f 64 3b 43 14 ac cb 3c ea 3a 92 76 da 1c 67 | 75 2a 33 46 | libevent_free: release ptr-libevent@0x7f4974022dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #334 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 41 51 fc 2c 67 7a b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 01 41 51 fc 2c 67 7a b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da70328 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.335242; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f4974022dd8 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | libevent_free: release ptr-libevent@0x7f49b402aea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da70328 | #456 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.3756; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da70328 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #335 | libevent_malloc: new ptr-libevent@0x7f49b402aea8 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3a 72 33 43 c7 65 06 08 af 1e 94 b9 c6 6c 3a | 27 b4 bd 7d 51 e8 e0 af 10 83 61 d1 59 34 01 0d | ab 01 80 a3 d6 db 14 21 2a 8f e6 83 d8 c1 11 7c | eb da 19 b0 5a 77 e9 5b 4a 06 64 0c b6 93 51 96 | 03 db 7f e1 2f ff d7 8f 56 43 99 01 38 88 ae 10 | b0 ea 8f 98 71 e9 8c b6 e6 da a2 31 10 55 33 41 | bc 43 ac 30 9e a5 6a c2 07 e8 4d c4 c2 68 e2 15 | 54 64 05 b1 5f ba 95 8b ed 38 71 19 2a 69 a2 cb | 54 f0 f2 bc 1e e0 e1 f5 93 4f 36 0c d0 b4 38 85 | 0e 73 a1 e1 bd e8 08 e7 74 44 c9 50 3a 9b 99 8f | 6e 64 75 8e 22 e9 9f b3 be 66 2d c4 24 11 b8 91 | e2 a4 bd 0e 1f 0b bf 9c 69 98 d8 3b f8 b1 7d 4d | fc 00 84 55 21 fa 35 49 ba e4 1a 8b 76 3b a9 1c | 7e 75 da b8 db 25 60 aa ee 34 d6 9f aa 35 5c 57 | d2 ea 85 46 8d 80 69 1a c5 02 f4 da 27 03 f6 a8 | ff 12 9f ea d9 8c e8 ca da fb 81 c8 a0 95 60 e5 | 29 00 00 24 d0 4f ff c5 04 0d c8 7b 9b 25 fe 41 | 22 8f 4f fc 61 0e c1 d9 98 f2 6c a3 0a 04 41 ef | ad 0b b2 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 42 29 c4 8e a0 b8 0e 75 ab ba b5 | a3 4d 33 66 bf f8 48 b9 00 00 00 1c 00 00 40 05 | 83 e6 ac 00 26 5a 0e 91 f0 d3 e0 41 64 99 81 a0 | 37 a3 88 9f | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #335 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 60 e7 69 1e bd f7 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 7f 60 e7 69 1e bd f7 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.395903; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #457 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da846f8 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.457295; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | libevent_free: release ptr-libevent@0x7f49bc040fd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da846f8 | #458 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.460583; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da846f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #336 | libevent_malloc: new ptr-libevent@0x7f49bc040fd8 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd ea 05 03 ec f4 a1 41 99 5d e9 99 42 83 22 40 | b0 04 1d 7e fc 7b fd fa c5 61 25 c1 47 a9 cc e2 | 64 48 7b 45 81 27 46 ef 2d f3 51 b9 4b ba 27 ab | 04 03 2b df e3 ac 7e 12 d9 10 c4 2e 43 64 93 38 | 91 60 54 d0 82 2f 42 76 7c ea 48 d1 41 d5 78 70 | be ca 2d e2 de c1 b5 1a cf a5 e8 1c 12 bb 3a c1 | c4 46 ba 39 2b f3 28 ec 96 39 2b c4 20 27 a3 c6 | f6 fc 23 66 04 54 cb 86 a9 de 9d 64 0a 3f 6e 7e | 17 09 a2 86 6b 1a 74 cd 4e 17 ef b7 56 13 af 1b | cb 96 91 f2 26 e3 26 7e 59 a4 11 a2 c5 11 54 c5 | b0 c3 ec a2 c0 18 c9 cf 17 31 0c cc d5 3c 5c cf | b3 67 1c b3 bc 02 82 4c 28 8d 38 bb 91 8c 87 87 | f7 91 fc ae 5d 10 78 c8 4e 0e ff b2 03 6d 2b 50 | 4e da 02 4b fa ed d7 db 57 99 a0 7f c3 b9 37 ab | 21 2e cc ac f2 d3 6e bc 4a 50 b8 65 b3 40 f8 4a | 08 47 cd 59 b1 de 38 ca 0a 64 d0 ef ca 77 43 56 | 29 00 00 24 29 f7 36 a9 39 84 5f 75 de b6 72 88 | 9a f6 b1 83 22 f5 b7 9a 65 ea 5f 22 bd 27 9e 4a | 9d ac 55 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e1 ff a9 7a 36 a9 d0 ff c3 4a 98 | a5 e3 c4 a4 69 72 48 d1 00 00 00 1c 00 00 40 05 | f8 1a ad 46 1c 9d 95 fc 44 8c 10 21 01 e6 99 4c | 03 5c 44 9f | libevent_free: release ptr-libevent@0x7f498001d4e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #336 spent 0.0879 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 75 a1 ac 21 0c 5a 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | fe 75 a1 ac 21 0c 5a 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e3b38 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.51985; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | libevent_free: release ptr-libevent@0x7f49b002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e3b38 | #459 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.544126; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e3b38 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #337 | libevent_malloc: new ptr-libevent@0x7f49b002dc88 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 2f 9b e3 b7 ca 48 52 22 71 0c ff 1f 15 ff 3d | 7b 23 3d ce 2d 57 59 6b 71 ac 68 49 91 e7 18 81 | 50 b3 bb ba c6 ca 50 ba a9 46 0f 95 5b a5 b1 5e | 89 aa f3 f0 4e a9 bb e8 5d e0 de 47 9e 63 01 44 | 33 e7 76 a4 3e 8b 77 99 6e 97 ea 90 e7 36 04 db | 11 73 83 36 21 6e 7e b4 5a 11 e8 35 76 b9 3c 48 | 79 18 a8 b6 09 29 b6 58 3c d3 51 32 13 03 9e d2 | 70 46 0f c8 bd 24 70 c2 b4 ff 29 d7 fa b2 db 53 | dd eb d7 f1 b4 16 51 b1 bc c9 04 07 fc 0e c5 75 | f7 d0 7b 3c 91 4b b2 09 6a c3 a8 76 bf af 5c 1e | ee 77 24 5a 15 89 76 39 5f 14 89 41 20 f3 f6 3b | 14 6f 7f 8b b9 54 0c c7 05 3b 68 87 2c 8b 73 5b | b6 d1 91 27 79 fa d0 1a 40 83 f8 81 48 66 d8 75 | 0d 8d 5c 4f 9e 6d 64 57 98 3a ea c3 89 14 18 b8 | c2 b9 93 f2 39 1f 5d 43 19 3d 12 cc 26 9e 2a eb | ce 5a 4d 87 06 a5 09 a2 2a 6b 2f fa af cd 77 27 | 29 00 00 24 c2 94 23 17 ae 7d e2 69 72 5c a9 fc | 58 a7 ea cd 44 b4 37 c1 6f 73 0f 2f a3 07 9b 73 | ed 01 54 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 4f 37 bf 21 a4 7a 06 6f b3 09 26 | 8b c8 a5 f2 de 2b b4 a0 00 00 00 1c 00 00 40 05 | 08 b3 16 4b be ee 6d 72 ee 1f 34 fb d4 71 ff 6f | cd 4c 28 1d | libevent_free: release ptr-libevent@0x7f49b40257e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #337 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd 42 0e 37 d8 1c a5 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | bd 42 0e 37 d8 1c a5 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da2f298 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.579406; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f49b40257e8 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | libevent_free: release ptr-libevent@0x7f496c038fd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da2f298 | #460 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.604793; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da2f298 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #338 | libevent_malloc: new ptr-libevent@0x7f496c038fd8 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 51 f1 2d 72 e3 e7 02 1d 53 41 42 0b 18 a1 d5 | 35 10 f9 db bc 19 d0 a2 90 b1 93 2f 4b 10 a4 44 | e4 5d 63 2a e2 f0 53 0f 13 72 ab 1d 42 e7 f3 2f | 76 d7 74 a7 c0 58 dd 10 a7 6a 74 e7 da 59 8a c2 | 9c a7 56 7c 30 98 36 de e1 06 53 3f 4d fd f2 90 | b8 03 e9 fa 8b 89 43 ff 12 b7 59 4d 09 01 34 03 | 8b c6 e8 43 72 e3 03 54 2b 23 86 c6 65 3e 8b 21 | e0 07 e1 2c 64 96 a5 e2 43 3d 84 98 d7 7a a2 c9 | 0a 0c ca d8 5f 24 3c ff d7 cc 0d 4d 98 d0 68 2f | 0d e3 34 09 e1 8b 38 0d f7 08 1f c7 1b 63 cb b9 | 6c da c5 4f 1f 6c 51 f9 8d 8a fe fa f1 d0 54 bd | 56 e0 11 d8 23 bb 62 cb 83 83 2c 91 b1 f4 d1 65 | e6 d6 ed b3 71 21 2f 29 bd 20 ad 06 25 13 a2 46 | a0 42 f2 9c 82 e0 71 8b 3c 24 90 da c4 2f 7a e0 | fb 35 bb 50 30 da 11 68 fb 51 de 89 69 d2 26 40 | 8f 03 44 02 fe 88 c0 ed d2 79 c2 0a 83 ac d0 5c | 29 00 00 24 ab b4 61 6d 38 09 e0 25 c1 7b 5c 5e | aa 21 7c c0 69 0c 17 08 ac 52 32 98 7b 2c c5 97 | e0 20 b6 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 35 31 68 b3 eb 89 8b 1c 04 fc 78 | 98 8b 30 f2 55 5f de 12 00 00 00 1c 00 00 40 05 | f0 0a 7c a1 61 4e 50 af bc 34 75 9c d6 bf a3 b2 | 04 5b 82 d1 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #338 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 67 c2 15 d5 b4 eb 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | b7 67 c2 15 d5 b4 eb 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da68f58 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.641177; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004035 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | libevent_free: release ptr-libevent@0x7f498402dcc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da68f58 | #461 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.667473; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007224 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da68f58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #339 | libevent_malloc: new ptr-libevent@0x7f498402dcc8 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 d9 9c 4e a0 36 d3 a9 71 15 5c 98 70 c3 81 dd | 2a 67 b5 6f fd 69 fc c2 28 f8 59 f1 37 bb 39 f0 | 81 9a 4b 13 87 31 1e 06 b3 8d cd ef 5c f9 94 10 | 18 04 2c 1c 1c 90 e9 cf 47 0d 0d e7 3a ee 2c 06 | cb 34 ce b1 06 2f 23 4f e5 99 cd 7c 7e 3c 76 4c | 9b da 24 66 22 97 1c 83 a4 7d 8d 25 d0 fb cc 4a | 9c 2d 38 fd 51 75 88 69 1e d7 23 c2 6a 3d 0a 12 | df 2a ce 43 ef e9 59 a6 13 46 10 5f 9c 37 e3 bc | 9e 35 a6 fc 1c c0 b4 4b 3b b7 fd 26 59 68 5f 21 | 7c 05 60 27 55 60 b0 c8 93 90 47 b0 77 3d b4 eb | ca c9 74 b3 84 64 29 84 41 f1 ad 53 16 e2 d5 a3 | 8b 62 e9 da e2 ae a8 0d 12 10 22 89 e0 a0 53 85 | f1 3e ae 2a 8f 4d 54 be fc 00 b2 30 2f 5c 94 80 | 0a 40 87 e6 e7 25 81 96 40 9a 6a 67 b8 90 3c 86 | a8 93 d3 54 7c 7c af 59 d1 d0 4e 0a 33 e4 db 93 | 51 1c 24 12 2b 51 10 3d aa 51 43 67 71 81 3f ee | 29 00 00 24 1e d3 e7 a5 24 f0 8a 2d b9 e5 9b 9d | 9e 56 04 91 10 84 ba 35 29 ea 56 20 5f 58 03 1b | 60 13 ce e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 3d 48 34 64 e2 0d b8 7a eb 38 95 | 12 e8 1c e7 c1 40 aa ba 00 00 00 1c 00 00 40 05 | 05 c7 14 91 26 ec 59 52 a3 90 87 49 16 fb 1e d7 | 06 99 14 ba | libevent_free: release ptr-libevent@0x7f496c01d468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #339 spent 0.352 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 75 e1 e6 00 ce 45 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | 7f 75 e1 e6 00 ce 45 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da71a48 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.699019; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | libevent_free: release ptr-libevent@0x7f49a4038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da71a48 | #462 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.732368; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da71a48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #340 | libevent_malloc: new ptr-libevent@0x7f49a4038e28 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 54 91 7a 16 a4 9e c0 27 52 6c 76 ca f4 a8 b6 | 92 5a 4f bf 54 42 d8 8b 79 8c 8c 43 e2 6f 7f 67 | 2e 7a 9e 0e 2c 0f 55 61 ef a4 e7 c2 0e 5f bc 5a | ba 5f 06 bc 9c 50 39 9e e0 5b 13 48 6b e4 89 96 | 75 c4 9a 87 c4 d9 bc 74 c7 3a fc ff 17 34 40 4c | bf 33 94 8d 0f 8d c7 5b 86 4b bb 1c 96 b8 24 23 | c7 68 89 13 ae 13 54 6d 1c db 8d 4d a5 5b a3 df | 02 7a 4f a7 b1 ca 67 2c d5 37 48 6b 52 63 c8 2b | 82 fe 5f 31 39 b1 aa 85 06 4b 3b 70 8d 5d 9a a0 | f1 73 e6 70 95 cd 69 54 a6 23 2f db 75 02 20 5d | 9b ad a6 a9 ac a6 7c 18 e5 8d df ab 02 de 8f be | 68 3d 42 91 49 33 44 24 99 16 3b 7e f0 99 23 f4 | bd e6 aa 91 b1 dc dd b5 68 05 c3 a9 6f d6 e0 5d | c1 8f ab 92 58 60 ea c4 66 d7 44 f9 54 a4 20 87 | 48 58 88 c8 da d6 b1 ae 7e 96 15 45 fa 70 a7 64 | 00 d7 2b d2 ab 81 38 91 99 75 ed 33 7d c8 0d 10 | 29 00 00 24 7f 07 85 be 37 e5 41 cd 8f 9f 42 7c | 84 4b 0c 04 80 a0 73 6b a1 9d 55 c0 50 f5 f9 51 | f8 11 3d d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 77 67 38 80 78 8c 98 8d 7b ef 50 | 81 67 4f a0 a1 5d 53 13 00 00 00 1c 00 00 40 05 | 3f 79 c0 48 13 0e 97 00 84 ba 57 ed 82 aa dd 7c | fe b1 fa f5 | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #340 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 42 69 72 ff c1 6c c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 81 42 69 72 ff c1 6c c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49900058b8 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.757797; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | libevent_free: release ptr-libevent@0x7f49a801d588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49900058b8 | #463 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.82312; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49900058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #341 | libevent_malloc: new ptr-libevent@0x7f49a801d588 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 7a 4a 31 b8 57 d4 38 4f 0d 5b ae 40 79 2f 24 | 41 26 ad d8 a4 24 08 f3 38 7e 23 4a 19 e5 77 5e | 80 18 10 37 ac 8e e4 76 34 5e cf c4 38 8e de cd | 84 6c 2a 86 5f ab 47 a9 6d f8 02 8d 2a 59 58 95 | d1 1e da 9d 8b 8d 43 f0 23 23 21 22 7f 6a 0d cd | b4 bb e5 a8 6e 8b a6 6d ef 43 9b 4e 46 43 55 e7 | d0 56 75 2d 7a c6 69 a4 f6 02 f0 08 8c 15 31 ce | 4d 52 41 3c 15 f7 eb 89 33 36 56 87 ee 11 58 cf | 67 0d 38 be bb 89 53 09 3e 4a 04 ca e7 32 b8 fb | 27 1f f5 94 bb 37 46 cb d4 65 28 fe 02 43 14 36 | c3 1d bc 50 33 67 14 29 a1 b1 61 08 b6 b4 f2 59 | f4 8f 08 47 e9 72 ec 05 cc 0b ec d7 e3 21 ba 32 | 97 17 a0 10 7f a1 68 88 cc d3 91 12 d3 b2 8a c0 | 50 80 cd 56 05 fb 51 b0 b7 35 50 9a ff 18 99 5b | 53 60 65 66 49 1c 68 44 f5 f8 1d 6d 04 44 a6 fd | 3c ff 26 96 1d 4b fc a5 7e 6a 54 8e 6b 88 42 6e | 29 00 00 24 de 47 b3 53 d2 43 9a 5a 91 94 a5 c9 | 75 c1 bd 02 2d 31 b8 d9 72 be e0 af 66 55 46 c6 | f3 ef ce a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 4d d1 c5 0f 74 a8 55 f3 36 52 70 | e7 7e 3b 61 da 14 17 6e 00 00 00 1c 00 00 40 05 | 34 6d 62 d3 34 06 29 c2 1b 62 2a 6f cd f3 47 d2 | 3f bf b8 0e | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #341 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 d1 4c 29 5d ab 4d 17 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | c0 d1 4c 29 5d ab 4d 17 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ae178 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.839425; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | libevent_free: release ptr-libevent@0x7f49ac03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ae178 | #464 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.900751; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ae178 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #342 | libevent_malloc: new ptr-libevent@0x7f49ac03e538 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 2b 2e c0 33 30 d1 3d 98 0f 2b d0 99 07 40 2f | 9f b7 81 82 e3 1e a6 a9 1d da 50 37 26 06 6a 6a | be 0c cf a7 0f e4 40 a2 b8 f2 02 2f be 37 e3 32 | 57 ab 07 1a 6a 9a 9c 3b c2 56 1b 59 8d 26 63 5d | 9c 17 63 b8 10 7a 84 dd db 26 4d 0f da e1 f1 9c | 48 74 be 97 ea fb 58 38 bf 6f 5e 07 1c ca ce e9 | c8 be d4 cc ce 78 d2 2e d4 09 48 8d 0f 25 62 ea | 61 c2 ea 49 61 63 ab 93 2b 2c 7c d9 56 c3 82 9c | c5 5f 1e 97 6f e8 db 86 03 0b 32 8c cb a8 3d f0 | ca 94 54 bb d5 a8 7f 8b 7f 2b 93 85 4c 42 b5 ab | 52 b8 9a 6a 7d 92 99 d2 40 0d 24 e9 cb 9c 12 93 | 57 54 65 b6 1d 67 ca 4e 95 db ec 94 d3 1e 7c df | d2 a5 dc 8f 59 4c bf 4f 94 bc 94 df 84 07 1e 81 | 4c d4 84 7f 3c c7 68 a0 2a d7 ef 3b 1a 12 ac 22 | cd 2f 33 02 d1 29 be 54 8e fc 7b 71 49 f3 2b 68 | cd 2c 10 cc ce 4d 89 08 e8 62 ee 08 87 2f 4c ae | 29 00 00 24 f9 38 58 1a e9 0b 1e df 68 05 19 12 | e1 bf 5e 6c 64 ea f8 a1 12 90 5c 52 5b dd d6 63 | d4 43 6c fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 8f 21 02 c5 db 43 06 7b 15 2a 40 | 56 9d 06 78 01 58 05 72 00 00 00 1c 00 00 40 05 | cd 1c cb dd 67 89 e4 d8 00 a4 22 3d c7 03 a0 ec | 22 e8 85 86 | libevent_free: release ptr-libevent@0x7f499802dcf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #342 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6e b2 3c 4c f4 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 44 6e b2 3c 4c f4 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b27d8 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10661.933201; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f499802dcf8 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | libevent_free: release ptr-libevent@0x7f498c022c78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b27d8 | #465 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10661.987514; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b27d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #343 | libevent_malloc: new ptr-libevent@0x7f498c022c78 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 64 61 cf 5d c0 f4 04 b1 b0 5e 42 5b 28 c8 b4 | f2 5b 71 74 89 0b 4d dc d2 b0 79 e7 38 9f f5 0a | c2 6f 01 d4 71 2f 7f 92 2f 29 53 b8 49 79 f0 1b | d2 d0 bc d1 b3 8d 00 19 82 57 df 12 fc e3 0d 01 | e6 3f 7d 82 67 4c df b8 65 74 72 bd ff 81 80 75 | 8e 40 22 ed 0e b8 b7 03 51 b8 dd b6 f6 b0 f8 2f | 5d a7 88 28 68 6b 44 d3 b1 7c 13 59 01 0e b1 69 | 04 01 3d 3a 69 71 6b 63 c6 eb 34 9c 94 b1 e9 c7 | b5 0d 4f 59 8b e9 cf cd b4 fc 39 ad cb 22 68 94 | b4 a9 dd f8 76 25 1e b3 28 36 5e a3 f0 ef a0 6b | ac 0d a5 b8 c3 aa 2e 21 c0 d9 75 c2 56 ab c8 11 | c7 6c 3e cc 94 d9 d2 8c fe 68 b6 cd 73 65 00 5a | 17 5a 96 e5 9b f9 cb 8e c2 ce ce c8 0a 5d e1 84 | c8 f3 d8 b5 b9 3e be 8d 11 c2 cf f8 1a be 05 7a | ca b2 b4 f4 9c 65 83 6b 39 8b e5 6e 1a 64 01 14 | 63 a6 25 1a ba 05 22 54 9f 3d 5b 60 ed 8b 27 a7 | 29 00 00 24 c2 52 c3 c5 23 5a 09 d5 36 97 73 4f | 69 d9 e7 94 37 71 a2 62 cb 27 ba 55 33 75 23 d4 | 7f 81 15 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d cf bf 6b 22 ea be 22 47 7f 19 e8 | 94 d8 12 ea 5d 02 32 c9 00 00 00 1c 00 00 40 05 | f0 0c 77 aa 03 c7 d7 2a 55 43 bd fc 72 85 cf 9a | 5b c0 29 c3 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #343 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 04 a4 a1 2d ac 54 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | f8 04 a4 a1 2d ac 54 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da0abf8 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.023797; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | libevent_free: release ptr-libevent@0x7f49a403f768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da0abf8 | #466 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.065071; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da0abf8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #344 | libevent_malloc: new ptr-libevent@0x7f49a403f768 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 80 4b fa af f2 b4 6c ba 33 26 4d 05 8d 09 0e | e2 04 13 1f 3c 25 40 a3 a9 d3 9c 38 35 4e ed 01 | cd 13 49 ed 62 04 c4 60 2b 0a 65 88 47 71 e0 0a | 57 ce bb c8 4c f1 5d a2 ec 2f ad a0 db 38 fe 75 | c4 bb 42 5b 7c 76 36 ca 19 cb 5f fe c5 b8 89 a3 | bb 95 eb 4f b8 d6 1c 81 78 5f 04 87 60 e4 7f de | a0 97 af 7b d6 72 c1 d0 25 bf 16 0c 30 c5 b6 a1 | c3 78 97 7b 0c 0d a2 3c 90 e7 1c 47 c9 8b 7f dd | dd 46 ff ae 4b e4 1f 4a 8a 12 44 3f df 72 df 1d | 84 31 f6 15 9f 7d f4 fa a7 3b 0e 81 9f 6e e0 67 | b1 62 de 5d 15 2c 94 ca 8f b4 0c 9e 2c d5 bc 86 | 7f 37 6c 79 34 fe 19 4b 73 a2 eb 80 e1 93 83 b8 | f1 f8 e6 63 04 70 27 42 0e 63 3e 8a 5c ef 20 b7 | 47 e9 45 d7 e3 2c 08 f1 45 17 38 33 0c 74 e6 6f | a5 71 2c e3 17 31 c0 d8 41 19 72 18 aa c5 3e 5d | 53 86 75 65 1f e7 34 bf ff 4d b4 7d 34 2d 51 e4 | 29 00 00 24 74 3e aa 5e c1 1f 4f 95 ea ae 7a 2e | 46 24 18 6a ef ee 46 d8 3f 7a aa d4 20 c0 ba 56 | 71 58 35 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 e0 60 18 f3 fd 73 cc c3 a8 a4 4d | 01 7f ac bb cd 23 fb 89 00 00 00 1c 00 00 40 05 | 02 17 65 66 93 96 00 76 82 b0 2d 25 dd a5 56 21 | 92 04 08 e0 | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #344 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 55 46 56 2c 47 da 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 0c 55 46 56 2c 47 da 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.079364; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004796 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | libevent_free: release ptr-libevent@0x7f49a803e5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #467 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad7378 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.143667; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f49a803e5b8 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | libevent_free: release ptr-libevent@0x7f49a802de28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad7378 | #468 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0743 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.157074; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad7378 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #345 | libevent_malloc: new ptr-libevent@0x7f49a802de28 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f9 96 0f 12 43 ce 9f 80 9d 81 51 aa 5f 39 f6 | b5 65 35 75 cb 2e 08 ff 54 f0 ea 9e 41 c8 98 ea | 42 cc a8 46 47 72 07 88 ec 32 77 76 16 f5 87 88 | 73 0c b1 1d 1d 7a 31 ec f0 d8 27 d9 8f db 3f 2d | f3 e9 fa a6 3d 5c 10 e3 e5 f6 14 f3 59 15 fa 5d | 85 1d 10 b6 d1 27 38 45 d1 56 04 5a 33 77 c0 5d | 92 0f 04 9d 60 00 1e e9 36 a7 ba c7 52 43 e2 45 | f6 32 c1 18 fc d1 21 aa 6b 4e 1c 23 63 45 2d 92 | d4 34 b1 d4 19 36 d6 d8 c5 df 9e 9b 3f fe c1 8d | 6c 88 b8 c8 04 a3 df 23 e2 16 fa 89 fa 77 b2 c6 | 00 6b b2 5a 1a b0 7c 20 ee ff 8f de 27 80 cf d1 | d2 74 ee a6 cc 20 e6 d6 6e 05 34 9b 10 fa 6f c1 | c4 d6 2f f8 69 41 1d 12 24 49 dd 4b 5f a8 4b 2b | 9f d1 f6 31 9b 4f 50 3c e8 95 d8 39 66 d3 06 ca | e1 20 5a 95 50 b0 3b 48 3a e6 9b 16 a9 0e 76 5f | 76 47 0d c4 41 d0 4e 0a c5 13 98 fa 1a c2 9c 39 | 29 00 00 24 ec 31 c6 f2 30 16 37 38 9e 4b ae 2f | 2a a6 bf 67 cd c0 a4 d2 19 0d c2 58 5e c1 ef 62 | b2 a3 ab 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 44 b5 2e 10 ba ef a4 3c 91 af e5 | cf b9 45 4f 48 b0 93 2f 00 00 00 1c 00 00 40 05 | df e8 4b 50 83 0f 84 fd c8 34 59 20 c4 af bd 82 | 90 8f 48 95 | libevent_free: release ptr-libevent@0x7f4974033668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #345 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 57 93 d8 0a cd 7a e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | 48 57 93 d8 0a cd 7a e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ede48 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.201375; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f4974033668 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | libevent_free: release ptr-libevent@0x7f496c00cab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ede48 | #469 spent 0.283 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.250824; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ede48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #346 | libevent_malloc: new ptr-libevent@0x7f496c00cab8 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c0 de 88 a4 3c 00 01 25 fe b5 32 60 8f 82 63 | f0 77 70 ef 96 59 ae 36 ef 0c 46 52 ed 3e d1 1f | 32 25 15 eb 6f 87 2b 38 70 d4 d8 81 e3 0c 5e 24 | 84 e1 9a eb 9e ad 5f 3e a5 5a ee 96 e2 26 d2 36 | c8 24 74 df 9f f5 e7 9f e0 cc 5a ae 2e 45 a4 78 | 82 6f d7 47 1c bd 8d 43 fd 8c f7 04 a0 1f b6 39 | c4 4d ef 79 8c 86 f1 5f a1 dd 62 df 58 e5 a4 9c | cf 43 56 b0 0e dd 15 1a 69 e3 fd 45 e9 f1 6f 2f | f9 45 24 dc b9 b9 b1 58 9a 54 2f fa e2 d0 b7 8d | 20 ca ed 39 e8 de 5f c2 46 64 15 12 cd fa 3e b4 | 75 27 73 73 75 aa 74 e5 99 8f a3 76 bb 3b 8d fb | d0 0f b4 09 06 c5 d9 67 63 05 d8 c8 e3 3b 34 e5 | 6c 24 b4 30 f0 07 e7 81 5b 00 35 66 62 cf 09 f3 | 6c 98 3b 36 a3 83 21 64 97 cc 8c f9 37 60 9e b7 | b4 89 fb 1b 47 8e 9d be 97 26 bc d9 5a 60 60 d5 | 99 8d 79 52 9e 38 10 cf cd 4d ee 18 f8 94 8d b3 | 29 00 00 24 55 97 39 2c 8d 39 0d 0f b7 0d a1 11 | 3c b5 92 b2 19 31 17 4f 2c 02 37 34 9e 76 08 c6 | 33 20 35 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 3f 34 30 a1 a6 cc 2e 36 fa 40 04 | a2 5f 78 4b c4 d5 cc e1 00 00 00 1c 00 00 40 05 | 9f 48 23 14 6b 23 b0 b7 b2 8c a4 bf b2 2c 50 29 | e7 4a 82 ed | libevent_free: release ptr-libevent@0x7f497c022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #346 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 73 64 76 6f a6 c2 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | ca 73 64 76 6f a6 c2 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.264135; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | libevent_free: release ptr-libevent@0x7f498002dd38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #470 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da33788 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.324426; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f498002dd38 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | libevent_free: release ptr-libevent@0x7f4994038dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da33788 | #471 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0294 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.330672; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da33788 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #347 | libevent_malloc: new ptr-libevent@0x7f4994038dd8 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 63 f2 89 5f 74 b0 dd e5 64 19 ff 5a 51 0d 9a | 40 ba 4c 18 d0 fc 82 c5 92 34 06 0e 71 0f 7e fa | 78 52 a4 47 54 fe 4b a8 ff e4 75 b4 90 1f 6d e1 | 6e 49 89 93 44 06 11 fe fe 87 26 da cd bc 9c 5e | c0 ce 38 4d 2b 31 f8 e9 4e 21 0b d0 a4 36 ae ce | cd ef 1d a9 03 71 34 59 44 1f a8 a4 76 e3 9a 51 | 06 65 fe ed 75 af a7 fa 94 9e ad 3c 1f 26 88 69 | 90 35 ff 45 b8 7c ef 9b 6f d5 32 6f 3b 5e 3c 38 | 12 17 ec 9e 9d cd 26 70 1b 0b da ad f4 f6 f1 e2 | cf 7d c4 82 5f 3a fc 34 a8 37 4a 23 f9 97 90 22 | 0d b2 c1 3c 79 bb 8f 3e 8b cc 61 3f f7 df 6c 97 | 4c 3d 7a 62 31 d3 99 b6 b6 ed c1 56 6f 94 d3 28 | 57 04 9e 57 26 c4 28 8e e4 22 93 e8 47 3f 8a a8 | e2 85 f6 ec c6 90 2c 68 fc 2f 10 32 39 0e 08 8d | 1a 3c fe b2 d2 9a b9 51 92 c2 a7 f0 64 bf 6e 35 | 8f f2 fe fd ce 96 d5 de c3 24 04 d0 50 87 c7 85 | 29 00 00 24 fd e2 6d cb 10 4c 48 d2 24 a4 cf 3e | 14 f8 e8 de 1c cc 2b 99 64 8f ff 33 89 53 53 a8 | 69 6b ec ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 1f 2f 8b 98 d3 3f 88 16 7a 2d df | 22 15 8d eb 4c 52 3d 51 00 00 00 1c 00 00 40 05 | d7 77 a4 3b a8 6a cb 15 56 fc 6c 1c 65 5b 1f e5 | 65 af 98 82 | libevent_free: release ptr-libevent@0x7f499c038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #347 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f 8f 59 62 6e c3 64 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | 0f 8f 59 62 6e c3 64 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c6c88 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.387005; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f499c038e28 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | libevent_free: release ptr-libevent@0x7f499801d3d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c6c88 | #472 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.389371; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c6c88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #348 | libevent_malloc: new ptr-libevent@0x7f499801d3d8 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 79 1e 29 d2 ad 79 cf 22 7c a4 43 7d fb e7 10 | ba 2b c0 d4 fb a4 86 7f e6 fa 40 59 23 16 50 de | be db c6 9d 95 ae 80 48 eb f1 98 11 95 04 43 bb | e3 79 c3 b0 b7 a4 50 cf 9f 2d 7e 27 e6 6f 61 f0 | 36 5e b3 23 d7 ca 7d 59 42 42 21 6b a7 9c f7 e4 | b9 f0 fb 9f 6d 75 33 dc 7b 0f 9d 03 e0 20 41 c3 | e4 d5 5b d7 d6 a7 a9 54 6c 57 6f 05 f3 af 07 14 | 11 21 1b 82 08 75 b8 50 3f e5 36 d4 e6 3c 3b 88 | f2 a5 b7 62 74 53 ac 18 00 e5 bc e6 36 45 4b 60 | 14 ad 00 01 f5 c5 3e a3 4c 0b 20 94 2a 0f 50 8d | 65 66 35 cd d8 47 c2 b9 4c 3f 39 20 ee ec 30 1a | a6 a3 62 73 f7 f3 14 5c 3e a3 2a 1a 25 a7 a8 5e | 60 2a 83 0b d3 5e 3c f4 33 27 aa bf da 57 b3 5a | 73 0d da 05 e5 a5 54 2e c6 20 b0 0b 27 14 59 96 | 59 23 8b c2 9e 4a 75 49 90 50 a9 46 bd 03 05 20 | b3 a9 9f 8a 9f fd 99 53 e8 fd 64 b3 df 6b fd 2f | 29 00 00 24 a0 70 36 5c c8 40 bf 80 19 42 14 b5 | c0 f3 cb 94 11 77 50 73 6c 28 77 8e 64 31 9e a9 | 18 0d cf 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c 50 21 bb 8e 84 6b 11 12 ed 54 dc | 29 a7 11 4f 24 ee c4 9e 00 00 00 1c 00 00 40 05 | 06 4a de 0f 2b bc 69 43 5c da b6 a5 f3 c3 d5 6e | df 84 f8 30 | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #348 spent 0.0887 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 6f 7d fb 7f c0 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | fc 6f 7d fb 7f c0 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9bc898 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.445678; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | libevent_free: release ptr-libevent@0x7f49880283d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9bc898 | #473 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabb998 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.45094; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9bc898 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #349 | libevent_malloc: new ptr-libevent@0x7f49880283d8 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 8d 83 7d 48 89 2a 4a d6 69 d3 1a 76 b1 9e b2 | 40 39 b9 99 86 54 88 42 01 11 35 1b a7 66 d1 b1 | 62 2f 25 06 0d bd 09 fb d4 a2 94 7c 03 05 09 ba | 1a 98 c1 e1 d5 33 08 df 79 c9 03 d8 56 2f 18 ab | a9 1e d5 a4 3e b7 e8 4d 0b c0 2f ac 0a 71 53 aa | d1 99 38 97 36 b2 c7 7e d2 9e 7e 98 70 3a b0 40 | 8a d1 e4 3c 22 bd 87 ea 27 1b 33 f3 f2 bd 17 d4 | df a4 fc a0 21 12 d8 6c 45 5d 37 bf 68 92 a3 04 | d6 d5 08 cc 40 aa 2d cd f0 ca 17 78 76 f3 24 a9 | 67 3d a4 99 54 9c 38 e4 47 ea 87 e9 14 17 88 21 | 9d 6d d5 f4 62 f7 6e 8d 61 73 1b 84 ab e7 26 32 | 4d dc 59 81 fe 96 88 e4 e0 92 2e 1a 94 90 dc a7 | 89 e1 4f 16 c7 cb 15 a9 ba 6d 1c cc 25 55 b0 93 | e2 5d d1 23 00 fd c3 e0 1e 51 f5 18 6b af 9a 84 | 00 aa 57 19 1a 8f ac dc 5c 5d 53 03 9a 6e c0 1e | b2 c6 40 c0 b3 86 f7 89 a8 12 65 9c d0 0f 66 c2 | 29 00 00 24 56 c4 31 20 0d fb 9e 78 54 2e b1 51 | db 6a 2d 46 c5 cb 8a da 88 53 4f 11 07 ee 10 8f | 86 4f d3 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 8b 19 04 f7 9d 8f 5b f0 40 79 43 | 18 61 32 df 48 fc a1 ed 00 00 00 1c 00 00 40 05 | 17 b6 f3 0b 75 9d 1f 02 ba 62 55 0b 3c 27 99 5f | c8 8a 18 c8 | libevent_free: release ptr-libevent@0x7f499003e418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabb998 | #349 spent 0.0861 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf f8 ac 8b ac fd e9 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | bf f8 ac 8b ac fd e9 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.51218; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabb998 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #350 | libevent_malloc: new ptr-libevent@0x7f499003e418 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af c2 62 c6 b4 17 f1 eb 3b ae 58 9a 7e 14 ce c5 | 33 6d 01 b5 07 42 84 32 96 99 02 f0 f5 0a 2d 41 | a5 36 1c 3f 23 55 b1 d5 63 cf 53 27 de ac dc 34 | 99 40 09 62 70 b8 1b ca a5 6d 82 eb 42 63 e4 3e | 75 ea 94 c7 cc 72 ea 8f 64 9b dd 41 7b 7e 5a d8 | a8 c0 72 fa b2 0b 43 c7 03 c3 f7 d0 de cb 6d e7 | 0c 8e 5d 30 ae 67 45 4e 4c 1a 11 73 40 22 fb c4 | cc 0b 03 fe 57 5f 41 e9 cf f7 39 01 52 65 ad fc | 13 a5 1a 47 b3 39 b7 0f 39 c1 de 3a 7c 5d 33 0b | 68 40 b5 da 40 2e b3 ce 6c e6 7f 62 86 57 ca 2b | 52 36 b3 90 73 98 99 99 ff f5 ed e3 b6 3d a2 a1 | 71 b3 8c 6b 71 f8 12 68 ff 3f 2c 72 fa 84 3d f5 | ff 28 ab 05 8b 0a 4a 13 39 b2 31 10 75 00 59 7a | be 89 53 30 23 57 55 95 df 34 9b 7a 21 c0 89 9c | e9 3c 21 e8 94 19 83 c0 b6 fd 15 54 6b 04 31 d5 | a4 a0 88 78 15 fb ef 7f 12 51 af e2 e7 9c cf 86 | 29 00 00 24 4f e8 30 52 e8 0a d4 90 4c 86 69 1b | 3e 4a e0 af f4 3f 6b 44 d9 64 c9 43 af 25 fb 98 | 89 9b 45 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 e3 0a 91 8e 66 a2 60 5e a9 46 19 | 4c 40 7f cd 41 89 9e 73 00 00 00 1c 00 00 40 05 | 35 a0 94 7b 8e 78 06 dc d0 ce 60 37 99 8a 7e b3 | 49 31 09 48 | libevent_free: release ptr-libevent@0x7f4978038d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #350 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 49 86 94 c5 85 e6 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 33 49 86 94 c5 85 e6 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad4478 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.539525; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f4978038d98 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | libevent_free: release ptr-libevent@0x7f49a803e6b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad4478 | #474 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17ce8 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.570858; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad4478 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #351 | libevent_malloc: new ptr-libevent@0x7f49a803e6b8 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 00 f8 92 a9 2d 8f d4 85 9d a4 8e 7d d0 72 eb | 08 f6 83 a9 79 e5 70 1d e9 31 ed 53 92 47 3c 00 | 98 06 1f 73 d4 6b 99 cc 34 56 6b ba 93 3c c8 0e | c9 f9 25 ae 21 ec 62 68 6f 61 7c 8a e9 7c 52 59 | e9 f2 b9 a5 2c a4 94 d5 0c e4 72 36 5d bc 07 b5 | 4f 05 d7 9c bd b7 58 46 83 d3 bc 09 6f 9c a5 d2 | 8c b3 e7 25 42 f4 df 63 4e aa 2d 16 41 32 a9 60 | fb e9 fd de b7 6e ed ae 2f c2 1a f8 5a 2e 10 aa | 27 12 4f 3b 55 90 9e 2d 18 d4 72 b3 df 2c 41 6d | 73 96 7f ba 5f 4f 86 ca 93 ec 2c fb b2 95 c6 af | 3d 1c 32 c7 13 76 13 ad a2 e8 98 e6 b7 51 62 7e | a2 66 fc eb 43 66 4d 5e 9e 5d 2b 39 94 a3 4f b6 | ce 50 63 d5 65 32 a8 f5 43 37 0f 4c 55 33 b5 a8 | c8 cb e5 f8 ec 91 78 52 ba 65 49 75 ac fd 8a 59 | 2c 27 0a eb 2f bf 66 4a c9 84 0e ec ea dd a6 d1 | b6 94 9e e0 6b 65 f6 3e 38 58 93 3f 1a 33 30 50 | 29 00 00 24 22 ef 5d 55 39 f9 e2 01 65 2d 89 62 | 6b db 37 a5 5b 79 29 8e 51 03 7f 4b a5 62 39 58 | e1 07 de 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 1a 1e 50 46 50 07 44 0c 3d 7c d7 | 6b 47 1f 57 bc 13 90 92 00 00 00 1c 00 00 40 05 | 42 be 16 72 24 c0 fd 53 5e 63 c2 8f ee 96 a8 a1 | 04 4b 9d ac | libevent_free: release ptr-libevent@0x7f498403e2a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17ce8 | #351 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad eb 12 ec 90 73 b7 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | ad eb 12 ec 90 73 b7 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.63016; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17ce8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #352 | libevent_malloc: new ptr-libevent@0x7f498403e2a8 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 7f 59 44 11 fa da 82 1f 84 57 2f fc 73 1a b0 | d1 8b c0 3d 4b ef 05 d4 ec 91 3e 34 3f c5 72 7e | 40 d8 be 48 2e 0f 97 58 a6 dd 25 59 97 52 9d 0c | e7 5a 9d 4d 68 2e 04 4e c8 70 fe 98 dd be b6 37 | a4 9a 74 de 71 af 02 f5 63 a9 97 71 5e c2 ce b5 | 96 94 f6 b6 f9 4a 37 24 30 87 bb 73 18 f4 39 20 | 8d 7e db de 79 14 99 6a 7f c3 66 1a dc 87 93 81 | 78 0e aa 79 7c 61 44 00 b7 06 31 52 88 2e e2 bf | 4f 64 59 e0 db 0f 15 97 c1 52 18 42 c5 8b be d3 | 3d b4 1f f2 70 27 bd 75 74 b9 1c 4c 1e c4 07 ca | ed 79 be 08 8f ef ff 8a 00 69 2e 42 83 07 6e 6b | 2c a4 5d 72 63 ec d7 e0 13 19 30 ca cb 34 ed 73 | 05 51 85 78 79 39 00 31 2c ee 21 9c a8 45 e9 d0 | 0f 32 c6 30 3e 18 11 59 60 f4 1b e0 59 1d 7c 49 | 71 a3 41 bd 82 9c a1 40 9a d4 e7 d8 51 2c 27 21 | 84 2d c0 5f a4 a1 79 bf 6b 67 86 9e 46 e1 08 c0 | 29 00 00 24 9f de 6f 2b 8d bf ca dd b1 75 b4 97 | 9d 63 43 25 01 fd 91 ee 2e f1 16 68 8f 0e 23 14 | d0 d0 dd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 ce 0b ee 06 b8 bf 25 46 d1 60 2a | 26 23 31 a7 4f 55 7a 24 00 00 00 1c 00 00 40 05 | f5 d2 b3 75 d5 a0 c7 08 17 d8 53 0e 6e 82 6d 85 | 0b 70 7d 6b | libevent_free: release ptr-libevent@0x7f498803e6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #352 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da c5 d6 0a 78 8e d6 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | da c5 d6 0a 78 8e d6 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f496c0058b8 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.634451; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f498803e6d8 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | libevent_free: release ptr-libevent@0x7f4994017df8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f496c0058b8 | #475 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0744 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.691964; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f496c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #353 | libevent_malloc: new ptr-libevent@0x7f4994017df8 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a cf 37 e3 a7 b8 b0 2e 87 77 43 46 2b b7 c7 b5 | 08 b8 b3 a7 fd 82 6e 18 a7 f2 ad 16 89 41 49 20 | b7 dd 87 29 7e 9c 4a ac cb d4 53 df 77 23 e5 16 | 7d 79 de 77 c2 90 f1 86 1a 1e 26 97 be 1c 67 6d | 52 fa 90 ba b9 50 5a 0b 7b de 1e 87 7b 6b 1d be | b8 01 8e ad c7 84 a6 77 42 ae 74 8f d2 8f 22 2d | 56 b8 26 7a 54 c4 d2 db f5 d8 64 7f c4 08 25 2a | 63 b0 c0 f9 d5 66 ff ae 37 a3 40 31 3e b9 2d 87 | c4 e4 a3 0b 2c 9a 87 8e 39 e4 da bf 44 28 5b 7d | 56 09 9b 6f 5d bc c8 f4 3e 65 c8 a9 b3 9a ba d1 | 95 91 52 c2 72 9e 04 a4 86 ff 76 fd 7c b9 1f df | 7b 77 9e d4 c3 a8 62 ce b2 2f a4 5e 1a cf 92 93 | 67 78 bc 34 77 37 05 9b d4 36 cf c5 e4 fc 9a a5 | 77 fd ca 04 a1 67 f0 06 75 06 6c e7 92 a5 3f 16 | 76 f0 b2 eb 7d 37 02 52 d6 d9 f2 f5 44 51 85 87 | f8 a7 97 17 b6 00 55 dd 28 c5 7f 64 5e fd 8a 06 | 29 00 00 24 6f 5f 96 c6 05 22 7c 59 ef 2c 7e ed | 87 41 70 28 68 7e 91 66 c5 84 28 de e0 fc 8d 73 | d6 3d b7 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 84 6b 15 4c 95 3a ca fb a3 1f 19 | 9b d2 04 e7 50 fc ea 18 00 00 00 1c 00 00 40 05 | d7 0d 13 e8 64 cf f8 4a 99 19 3b bd 3e 75 4d d8 | c5 cb 13 aa | libevent_free: release ptr-libevent@0x7f499c022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #353 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba e0 36 e3 6e f6 31 32 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | ba e0 36 e3 6e f6 31 32 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3efa8 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.731275; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | libevent_free: release ptr-libevent@0x7f49b403b638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3efa8 | #476 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f88 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.748625; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3efa8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #354 | libevent_malloc: new ptr-libevent@0x7f49b403b638 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 ae e4 56 ef 99 f8 13 88 f1 82 88 09 5d db 59 | b2 42 40 29 3e 9e b7 91 6e a4 fa 22 8e 60 db 9c | 7f 82 fd da cd 5c 22 0c bd 54 f5 92 b1 46 1e 2b | 35 bd 1a 77 6a 20 b7 77 e8 78 84 b0 e8 c7 53 9c | 3e c4 65 89 fb 52 d0 73 da 96 b3 4d e6 8c c6 46 | 6f fa f2 fc 5c 6b 6a e4 0d 13 b0 13 ea b9 a6 76 | 10 89 b2 77 4b f8 52 d8 06 05 3e bb 06 45 f5 25 | d3 ca 9b 77 00 50 f6 a2 a7 f4 f3 6e 03 99 ed c4 | cb df af c4 e0 98 a2 93 df cf 32 ba 35 87 03 ba | 20 46 a5 46 d7 19 41 93 2f dd ae a4 43 95 46 ec | 05 48 09 1b 7b e4 d9 60 66 4d fd 4d 3d ad df b6 | 2d 60 b4 6f 29 0c d0 d5 64 6d 07 de 4a bd 78 be | 1e f7 03 b4 28 e0 bb 94 3d 82 ec 02 12 8c 22 7a | 97 19 9d 93 e8 93 93 75 31 40 82 d4 19 43 9f 82 | c2 eb d3 b8 34 8d 30 48 12 73 e9 8b 74 c1 2b 8f | 90 09 82 5e e9 73 b1 bd 1c 95 af 99 be 75 2d f4 | 29 00 00 24 29 31 18 6e cf 32 57 6e cc 61 18 b3 | 67 54 81 27 e7 ad 67 2e 08 ff 08 8b 7d 6d ac a9 | 79 0d 63 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 e6 49 7c 3d f5 b4 f3 d9 57 30 b8 | 25 44 61 cf e0 f3 26 f6 00 00 00 1c 00 00 40 05 | 64 6e 23 fe a4 be 1d 8f a9 b5 df e1 79 29 1a c8 | ab 1c 67 e1 | libevent_free: release ptr-libevent@0x7f497c03e6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f88 | #354 spent 0.257 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db cd 35 e8 4c a8 e5 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | db cd 35 e8 4c a8 e5 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.811125; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #355 | libevent_malloc: new ptr-libevent@0x7f497c03e6d8 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 87 6d a1 3a d1 f3 16 82 39 d8 0c 34 3a 11 56 | 7c 95 89 31 da 45 39 b3 d0 ec 68 81 e0 1d fb 5b | 9d e8 7c 39 23 37 68 ab 8b e2 77 dc ac 18 24 94 | 3d 16 ba b0 e2 48 d4 83 73 9d 7c 89 5f 21 95 8d | 2d c9 bb a8 e9 65 a1 b8 5f 46 cb d5 76 a2 46 df | 78 19 a0 fa b5 a5 c8 ec 52 70 cc 7e e0 6e e2 0d | 9c 0b 84 79 80 37 cf f2 aa 33 3a 52 b0 ec 46 b6 | 48 a3 cc 0e 50 1e 84 08 99 dc 01 02 7e dd dc 2f | cc 8b 2a e4 49 c2 2e 6e 4b 35 ea 88 01 e5 92 da | e7 71 30 0f c3 c7 cc c7 ba ed c5 53 f4 6e 00 e9 | ce 6e 32 08 d6 70 93 b5 1c 1e 14 8f e8 85 b6 9c | 8b dd a9 b9 c3 1a 1b 8a 1f 61 5f 4a d3 57 03 07 | 4e b3 03 4e 86 32 3b 89 32 55 58 fb 38 1f a7 d5 | 49 35 81 77 18 87 32 5a ab c7 4c db cd 27 da 5d | 20 d1 21 73 9d 3c 89 d2 e8 6f 3a a6 4f c8 29 ad | bb 3d b8 8f 8b 73 d9 f1 80 54 1b 44 cc 1c 9c ee | 29 00 00 24 ac 74 8a 4c 44 2d 71 91 6c 59 54 0e | 2e f6 28 d5 81 41 ac 57 d4 af 19 3a c6 60 74 cf | 66 c5 2e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f0 f3 26 ca ed 21 db 7c 78 44 f5 | a2 97 35 19 8a 69 32 ce 00 00 00 1c 00 00 40 05 | 4d 55 5f 65 0f bd aa 9a 10 64 6d 76 b2 39 dd f8 | e3 ee ad 86 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #355 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e ed 3f f1 12 1b f4 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 8e ed 3f f1 12 1b f4 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae71c8 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.82644; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | libevent_free: release ptr-libevent@0x7f49a8028668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae71c8 | #477 spent 0.0992 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.877725; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae71c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #356 | libevent_malloc: new ptr-libevent@0x7f49a8028668 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 81 77 e2 eb 4b 0d 75 74 ea 8a 9c 83 4c a1 5e | 58 93 c2 f8 d5 7a 19 31 ab 2f 4b b9 6d 47 f1 69 | 37 0f a1 26 09 f6 de 9f e7 71 54 72 fb f0 f4 7b | ae 5f d7 9e 11 f0 7e 4d 6e bf f7 d3 9b c5 92 48 | 12 55 7d 78 88 4e b3 07 57 90 eb 0c d9 65 bf 7f | c6 47 25 70 13 01 65 51 03 3b f7 6b 34 bf d5 81 | 4a bd d5 b6 6a d0 b7 2d ab 1b 24 a1 7e ad 83 dc | 41 d5 f4 e0 52 99 7a 80 72 72 1e 3b b4 42 0b 40 | 6e 91 9b cf e7 50 7d b6 bd 4e f9 0f 52 71 09 f6 | 2b 5f 7d 44 c2 c9 bf bc 18 2d ce 1b 98 28 b7 0b | 47 d6 06 47 33 4d 3c 96 e7 c6 c3 8d 0b 7d 79 ae | 5f 4c fe c5 02 7f b1 91 8e 5b 86 83 72 26 b5 e2 | 2e fc 85 e5 16 d7 1a aa 1e 9a 2b 29 73 33 65 b0 | d3 98 3c 83 64 17 b6 97 e5 0b b4 27 72 db bd 70 | 7a b7 e3 a5 7e a1 3e 05 b0 37 3a 5e c7 e3 19 5e | 46 dc 5c d4 02 e9 2c e3 08 b4 55 38 e0 8a 5f d4 | 29 00 00 24 5b 44 aa bc 5b 3d 98 ad b7 ab cf 69 | 32 5a 61 bd 5b a4 64 4e a4 65 7c 34 1e 6e ac e7 | 24 96 6d 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 86 78 39 96 56 7d a1 51 cb ce 04 | 24 6e 64 86 43 cf c3 a7 00 00 00 1c 00 00 40 05 | 0b 4a 55 65 88 70 43 4d be 2c 33 76 9d ef ba 58 | 2e aa 2d 40 | libevent_free: release ptr-libevent@0x7f49780242d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #356 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 69 49 3b ce df c3 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | 07 69 49 3b ce df c3 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6dd8 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.899101; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004581 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | libevent_free: release ptr-libevent@0x7f499c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | #478 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.938399; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6dd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #357 | libevent_malloc: new ptr-libevent@0x7f499c0284d8 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e a7 27 4a fa af 50 b6 6a 0e cf de 91 58 6a 7c | 57 72 ed af a0 63 ff a5 79 fa 05 35 8a 9b 6e 2d | 26 1e f9 0b 11 96 a1 9b a1 0f a1 ed 0e b9 97 4d | dc 29 d8 91 b6 f4 53 1b 57 ae 70 78 4d 0a 5c 40 | 45 96 56 b5 70 20 ca 0d 49 4a 69 a7 bc 4b f7 8e | 0a c8 97 07 94 0f cf b4 3e cb e2 4e 4f 9c 4d 55 | 2a dd c3 20 d9 92 52 b3 e2 79 c1 e1 66 8d 6e 59 | 03 4a 11 6a 38 0d 75 1d 4d e5 44 ec 14 47 4f f9 | a7 20 a7 1e a7 72 50 36 b9 98 45 a8 16 1b c2 d8 | 9c 38 46 25 2a a5 9b d4 6e 9d 30 58 9c e0 93 99 | d1 7f 2d f2 93 8b 96 68 d6 a2 53 96 e2 3a 2e 5a | 40 94 6d 4f f8 73 01 43 98 92 9f 9b 4f b5 b8 48 | c2 2a 6d f9 87 57 02 06 18 cb da 55 1a 95 e8 04 | 6c ab 6a 78 55 a6 df 23 03 a4 76 ad 0e 55 c7 83 | 2d 36 29 b3 69 28 a7 b6 5c 7a 58 7f 48 58 5b 56 | 30 b7 eb 06 e7 77 8d d2 9f ac be 69 19 56 0d 96 | 29 00 00 24 c5 80 76 ca 20 bd 3d 89 e7 bf 5a 44 | 62 40 9a d1 24 47 e4 af 5c 71 e7 18 68 06 9d 81 | 13 a3 92 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 3b 9d 71 e5 03 28 c7 2c ac 2f 22 | 24 36 41 6b 2c 3f 64 a3 00 00 00 1c 00 00 40 05 | 43 fb 56 41 ea 06 df c7 8b ab d1 23 4f b4 2d c4 | 20 96 e2 55 | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #357 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 39 37 2c e6 b6 e5 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 7c 39 37 2c e6 b6 e5 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df728 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10662.970815; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | libevent_free: release ptr-libevent@0x7f4978028608 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df728 | #479 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10662.99521; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df728 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #358 | libevent_malloc: new ptr-libevent@0x7f4978028608 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 54 75 7a f9 14 30 b9 f5 5f 21 96 9e c9 dd a5 | dc 68 e2 e3 61 b8 d2 82 0f bb a5 ee f2 21 23 c6 | 03 bd 78 a7 00 a5 c9 da ec ea b4 e8 92 fc 32 48 | 4d 33 3c 6b 0e 96 44 66 92 2d 87 54 d6 de a7 77 | 6b 59 3b 43 c1 7a 74 78 22 dd 05 16 91 91 53 e1 | 98 06 a4 19 a3 7b dc e4 09 42 24 f9 b3 d7 a6 fa | 38 7c 89 3a 10 60 28 24 d2 20 fe d7 f8 1b 93 9e | 63 b7 e5 3f 5b 6b 8f 22 4f 46 0e 4e 26 93 30 88 | e6 c7 97 e3 1d 4b 0d e2 c6 8f 92 83 e2 17 1e e3 | a8 a7 6b 6a c1 c8 34 80 7d 3d 68 20 ad 7f b1 26 | 97 12 27 af 9a b0 78 f1 45 25 5f 29 d2 e8 18 8a | c4 19 4c 14 ce f7 14 a7 41 1a 0f eb aa 26 65 26 | 14 6a 25 d5 99 35 11 f7 99 a7 1f d0 ad 8b 62 72 | 0e 1b 0f 32 da 98 97 74 b8 11 1e 8d 9b b2 7d fb | 81 92 03 47 99 56 13 3f 5d 1d b1 4f fa b4 c6 8b | a2 e4 83 f5 d1 e1 c0 7b a8 42 14 a3 9f 8b 2f 99 | 29 00 00 24 cd 3e 06 7a d1 a2 a8 1b e8 22 66 b1 | 64 60 5c 0f d2 dd 4d 35 9b 74 19 2f ce 1b c1 34 | 59 75 3e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de ce 72 2e 86 30 a8 0a 95 a3 97 00 | 1b 6e dd cc d7 04 66 ed 00 00 00 1c 00 00 40 05 | 83 eb 71 f5 c4 ae 99 96 dd bf 73 6c c4 13 82 06 | c6 9a d6 bf | libevent_free: release ptr-libevent@0x7f497803e648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #358 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 5f 07 28 12 83 21 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 29 5f 07 28 12 83 21 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0518 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9be0a8 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.040631; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f497803e648 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | libevent_free: release ptr-libevent@0x7f49b4040f98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9be0a8 | #480 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.168 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.057546; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9be0a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #359 | libevent_malloc: new ptr-libevent@0x7f49b4040f98 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe a1 01 b9 54 b8 14 41 8c d2 94 01 92 59 6b cb | 1a 11 57 e6 45 24 67 12 aa 64 b9 eb a9 c4 cf 2c | 99 38 34 d2 1b bc 6a a7 88 9d 9b 0e 87 90 e4 6c | 3e a8 66 cf 84 1c ef d0 87 68 45 79 7b 31 42 61 | 4f a2 5d 01 80 e9 18 3e d9 e5 71 c4 ca 50 10 71 | d4 d6 ec 9c 38 01 a5 10 93 10 bb a6 17 70 a3 99 | 17 60 a7 7d f0 b9 c7 f8 03 33 8f 66 7e 0d 62 5a | 41 51 a8 18 a3 ab 60 d9 7f 3e 79 89 5b 53 48 30 | 82 4e 7f 03 5a 40 4a e0 64 7c cb c5 8b 69 fa e3 | ca 9b 49 fa 18 e2 f8 8f 32 33 53 84 b4 ef ad a6 | 63 8b 9a 1c 7a fd 88 71 62 d7 8b 6b 96 bb ca 15 | 1b 03 18 de 3f 38 c9 3e 7b 79 0a e7 93 c4 a2 e2 | dc c5 0d 48 d1 78 b6 b5 2e c1 db 08 b0 3d f1 35 | e8 c6 1a 40 1a 6a 91 4c f0 38 d7 8a e4 20 33 1f | 00 7e dd 14 52 99 dd ff 99 89 45 03 7e 7d 51 82 | 90 9c dc da 85 65 77 21 51 73 29 55 47 bd d8 1c | 29 00 00 24 2a 38 6b b2 99 a3 3c e4 b4 85 08 37 | 10 a2 10 a0 16 f0 72 bd 6d 14 a0 8e 3f 6b 2d 41 | 33 9a fd 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 24 4d 67 7f 89 26 44 8a 30 5a 5d | c1 30 8d cc 08 55 00 21 00 00 00 1c 00 00 40 05 | 1c 4a 7e 58 84 e0 2f f7 7b 47 71 28 fc bd 0d 98 | 2d 0c 56 f6 | libevent_free: release ptr-libevent@0x7f4998039588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #359 spent 0.402 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 e6 9e 2f a7 8a 52 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 49 e6 9e 2f a7 8a 52 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.178 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9edeb8 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.103461; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f4998039588 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | libevent_free: release ptr-libevent@0x7f497401d568 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9edeb8 | #481 spent 0.517 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.187 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.116456; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006671 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9edeb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #360 | libevent_malloc: new ptr-libevent@0x7f497401d568 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 40 93 f1 e9 51 12 5b e0 4e 55 37 a8 83 40 9b | 6d 2c c7 6e 27 48 54 aa 1f 9f b3 c2 fd e3 c7 ce | bd 72 ce 83 e8 76 86 44 0b 85 92 40 53 ba f9 d2 | 30 66 1d 15 d0 96 f4 dd 77 15 0b 5f 47 0f d8 18 | 44 73 84 f7 d3 bd e1 8e 84 f2 92 cc 65 df 99 86 | 1f e5 2b d8 e1 87 73 65 0f 09 03 66 ec 6e 3e 40 | ab 80 d2 d9 b8 36 f6 26 8f 01 ba 6e d5 d9 32 c5 | 87 d6 f0 60 35 71 9f 34 76 8b ca 88 8f c8 04 16 | 36 ef 95 7b 72 1c 5c 47 4e c4 76 9b 26 f2 6c 12 | 39 ce 2e 31 66 ec fe 13 4f b2 96 16 dd 43 6b da | fe c1 b6 08 a0 cf b9 66 8c 1b fb 25 2c 87 d1 a3 | 99 95 38 bb ab 6f 3c 7c c7 b7 b3 bd 34 c9 a0 78 | 34 55 10 01 77 14 13 b2 bf d8 8b 61 e8 88 be 50 | 7e 84 32 a0 e0 8f de 21 01 ee 0e 00 ad 37 55 4a | 24 ab b1 f3 16 79 cf 4a 42 a0 b3 ed ba 45 ba f4 | 6f 41 f5 00 cd aa 15 60 a4 b2 44 54 39 39 56 30 | 29 00 00 24 a0 6e 02 2d a4 cb 94 61 26 37 dc fa | 9f 3f 80 f9 04 d4 7a a3 cf f3 ae b4 ed 41 8e 81 | d0 1f 99 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 db 23 e3 21 e7 55 ba 5b 29 27 bf | 14 6a e2 dd b1 d7 27 c5 00 00 00 1c 00 00 40 05 | 2e c1 1d 2e 03 ea 8a 42 2e 57 4d c0 ca 35 64 94 | 58 c4 47 21 | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #360 spent 0.445 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b 7b e0 62 58 06 77 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | 3b 7b e0 62 58 06 77 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.24 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b8002b78 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.164491; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | libevent_free: release ptr-libevent@0x7f4998028538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b8002b78 | #482 spent 0.489 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd128 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.179504; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b8002b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #361 | libevent_malloc: new ptr-libevent@0x7f4998028538 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 7f 04 4d a3 77 c5 27 8d d5 4b 63 30 43 81 f4 | 7d 71 04 a0 fe 8d 3c b8 9c 7d f8 69 6a 8c f3 33 | b3 2d b0 3f 70 18 b4 51 1e af 0a 49 61 13 b1 bf | 93 1b 14 89 f5 b8 bc cb 6c 42 37 47 97 53 2b 7d | 4a 09 fd ca 0f 5f 52 be 52 f0 a2 12 21 4b 17 c7 | b8 08 31 1a 75 b2 5a 3e b7 ea 74 01 a3 85 5c de | 8f 4d 72 54 cb 6f 5c 77 c5 65 6c 13 73 75 07 6e | 35 a5 3c bc e0 aa cc fb 6f 49 9b ac 9d d0 7b 0c | e2 01 b3 28 60 7d 6b 25 3a f2 48 0e 8b 62 94 90 | 69 b7 17 b3 8a 63 3c 1b 4e fa 03 9f b0 9d 0a 8f | c9 56 75 5b 84 a2 79 cd 08 85 fa f1 e9 76 0c 2a | f8 9f 67 ad 8d c0 2c b4 e7 93 3a b7 f5 8b 6d 03 | 44 11 73 cc 12 be bc ac 86 da 51 28 4d 23 7b 40 | 90 67 32 e3 8c e7 f3 5c e9 03 d3 a1 77 6f 46 1a | 38 5e 63 50 42 e4 64 3e b0 3f 2f 10 28 0d 0d 03 | 1d 63 80 e6 06 8e 23 32 cc 14 c9 26 7c 79 f9 ae | 29 00 00 24 8d ff a3 08 99 dd 51 0b 33 80 a5 7e | 55 cd 97 bb 32 a2 42 a3 bc 03 16 55 7e f0 59 c4 | d7 ee 11 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 dc b1 2a 3f 8d 6e d9 06 9e 37 0c | 70 ee 1a 73 f0 62 5d 42 00 00 00 1c 00 00 40 05 | fb 95 61 89 3d ad 5e 78 cd 98 20 29 92 67 72 3b | b1 67 8f ea | libevent_free: release ptr-libevent@0x7f49b4041098 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd128 | #361 spent 0.444 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 9b ca b4 57 7b d8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | fe 9b ca b4 57 7b d8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da603a8 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.236436; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f49b4041098 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | libevent_free: release ptr-libevent@0x7f498c0284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da603a8 | #483 spent 0.496 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.264 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.251432; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da603a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #362 | libevent_malloc: new ptr-libevent@0x7f498c0284d8 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7f f0 4d 43 1f b7 75 da f2 83 e0 a1 aa 3d 2e | d8 56 c1 3c 2e 35 2e ad 6e 26 57 8a b7 8a 23 2c | 0f e6 f1 6e 47 87 69 88 35 f5 1b 2d b3 16 2c 0f | 81 55 de 28 2c 49 1a e5 59 59 20 d4 00 6e 31 99 | dd 37 12 5c 2c 31 9f a8 8f 60 d6 6a 9a f0 a5 b1 | 3e e6 35 47 ee b2 f8 19 6d 69 0f a8 c8 5b 10 96 | fe 76 0d 8a 2f 66 12 05 e5 d3 08 53 e1 38 a1 e8 | 43 6d 5d 81 55 8c 9a 67 ec 42 9b f4 95 f0 1a 48 | 7d 1f 63 47 4e be aa bd e6 70 57 34 f7 95 cd 58 | c0 b6 7a d8 61 02 f2 81 71 c8 a5 95 cd f8 ad 60 | df 24 1f aa e3 a4 f8 dc 8a 0f da a5 bf 73 49 66 | 57 88 d1 f2 00 82 2f 9c 03 3e b0 2d 33 02 e4 a1 | 50 8b 0e 25 dd 9a 02 cf 37 e3 e6 52 eb 59 cf ea | b3 66 69 05 99 d9 54 34 a5 39 ac e4 8a 15 64 55 | 77 00 ea f1 bc 31 93 4e 0c 21 3c 12 3c 2e 2b ac | 12 8a 4c db 1e 66 03 b1 3b 77 63 cf 08 c3 46 e3 | 29 00 00 24 8c 57 25 f8 ac 37 d9 d4 41 bf 47 e5 | 28 39 61 32 5e 17 d4 f8 40 44 05 13 c2 7a 82 a1 | d3 3b 88 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 91 f1 7f db 76 53 61 38 5c 1e 2c | a8 41 96 f4 e7 ad 1b 1e 00 00 00 1c 00 00 40 05 | 47 3a cb 93 fe 26 31 3f 25 57 f7 be 46 f2 8e 75 | 3f d2 76 33 | libevent_free: release ptr-libevent@0x7f4984038b38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #362 spent 0.463 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 d6 ce c2 63 d5 0b 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 72 d6 ce c2 63 d5 0b 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.257 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da32008 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.303493; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f4984038b38 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | libevent_free: release ptr-libevent@0x7f49b801a578 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da32008 | #484 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.328461; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da32008 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #363 | libevent_malloc: new ptr-libevent@0x7f49b801a578 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 84 28 fb a1 ee 89 9a 0f af 48 7b 5b 73 f0 e9 | 5a 8e 28 87 ad ee ad 28 23 9a 76 c9 ba 62 e9 50 | b8 a5 fc 66 4d 4e 8a 8a ea 4a 10 ac cd 8a b5 18 | 34 3d ec a1 a7 35 a0 08 12 2a 95 c3 34 17 aa f3 | 3e ac 74 c8 a2 6a c8 ca ba 50 76 d8 79 cd da 2d | 5a 23 a2 d7 58 48 45 11 f0 4b 09 43 fa 7d d9 31 | 59 15 c3 b1 0b d6 3c 9a ee b7 9a a0 93 31 65 5e | 04 e0 13 69 ee 98 3b e9 50 ea d0 3a a3 83 a5 a5 | 37 cd de 48 84 fa da 45 c3 59 0d aa 63 d8 7e 9d | a3 2f 9e 4f 03 9b f4 ea 7e 7e 9c db e1 03 cd 74 | 3d fc dc cc 56 78 32 94 ab 3d 09 e2 83 17 a4 9f | 44 1b f5 bf 5f 73 37 da 6f 08 30 e7 89 75 51 da | c3 31 28 0c a8 a4 7c 1c b3 2f 98 fe bb 7c 84 74 | c6 78 ea 25 95 2e 09 50 62 24 bb dc 92 eb 39 85 | 30 00 48 ec 2e bf fd 11 4d cb 6b 66 28 b6 1d 70 | 90 a8 da 1c 42 ac 60 8c a7 66 5d 45 e5 bd 6f 0e | 29 00 00 24 45 1a 62 0e f9 ee 00 24 16 74 11 c7 | cd 39 b4 ec 52 5b 27 06 25 49 55 19 3c 65 98 e2 | 12 fa a5 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 f4 38 00 8c 2a 40 f9 0e bb 60 95 | b1 be 09 85 e6 e0 fb cb 00 00 00 1c 00 00 40 05 | ed a1 2a ad a6 4f 89 5d 09 53 4a 91 af e8 22 03 | 2f b5 df 4b | libevent_free: release ptr-libevent@0x7f49b0043cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #363 spent 0.465 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad ae 09 cc b2 84 c7 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | ad ae 09 cc b2 84 c7 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.204 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7bcf8 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.367555; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f49b0043cc8 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | libevent_free: release ptr-libevent@0x7f49a40336b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7bcf8 | #485 spent 0.479 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.390572; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7bcf8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #364 | libevent_malloc: new ptr-libevent@0x7f49a40336b8 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 15 ea 89 79 6c e3 60 0d ba f8 1c c7 a6 b7 ff | cf 0f a0 76 92 1e 68 66 03 12 19 97 76 b0 fa 00 | de da ef fc 32 8e 22 73 bb 1f 9e 3d c6 b6 c5 2e | 40 90 54 43 41 e2 15 1d 3b 2a 42 d4 34 5e f9 4d | 1b 84 bc 8e a8 5f 97 ff fd 3c b5 ca d7 17 57 65 | 54 ca bf 47 98 91 5c ba d4 69 56 a5 6f ca 6e ac | c7 23 d9 7d 32 91 92 0a 29 ce 0c e6 5f 75 01 31 | 1d 71 34 7c ea 88 87 52 73 bb d0 ab 9a 3e cf 89 | 69 6f df ca 59 28 f4 31 1c 26 8a 3b 3b 93 95 7b | 98 c9 28 46 d5 ce 94 d2 7e 4f e6 5b ba 88 f5 13 | 65 c2 5b 5e 1d b5 23 e2 73 79 46 d3 28 83 85 08 | 4b 4c 36 50 3d 24 dc a8 25 22 9c f5 89 30 f6 2d | ad 69 e7 7d 48 cb 3d fb 15 f1 c3 aa 80 bd a6 48 | aa 6f 6b 31 b4 83 b1 ed a0 8d 76 67 d9 74 ee f9 | 34 d8 ac 3d 7f d4 e1 2c d9 a6 52 7c d3 6d 84 b2 | 36 b0 d1 8b 31 36 76 eb fe 6f 3d 54 ff 50 2c 3a | 29 00 00 24 e8 a1 21 a6 85 c4 07 14 ea 9e 89 09 | 0b c2 c3 3d 58 8c 0e 1f 78 ce 36 f9 a0 76 63 43 | 5c 4e bd 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 3a bd 0a dc df 45 d2 3c e9 40 54 | a2 47 06 3b 54 a8 a9 29 00 00 00 1c 00 00 40 05 | fb 98 4a fe c7 00 b4 0e 2b 07 10 d5 1a 7a 06 da | 3b cc 4a 79 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #364 spent 0.599 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 dc c3 a7 20 00 b5 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | d0 dc c3 a7 20 00 b5 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.291 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07e48 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.434794; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00688 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | libevent_free: release ptr-libevent@0x7f49a4043cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07e48 | #486 spent 0.469 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.447719; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07e48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #365 | libevent_malloc: new ptr-libevent@0x7f49a4043cd8 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 87 04 3b 16 73 14 ca 4a ea 81 03 c6 d5 ee 79 | bb 4b 58 e0 89 02 04 f9 aa d0 8b 90 14 51 1b a8 | fd d6 32 24 03 6c a3 d9 0b 73 7a fb 1b a0 08 41 | 1b d2 e2 ca a1 92 d1 59 86 0f 1a a7 cb 89 19 4e | bd c6 40 38 85 84 98 13 13 f4 ba 21 ae c5 38 02 | 19 5f 05 d9 c7 b5 b6 c4 9b 95 7a d9 25 ce ed 81 | 40 9e 7d 68 d2 7e a9 0e f1 77 0b 2e 0a d7 3b 31 | 28 bd f6 43 47 9f b5 bc 5b d1 2a 4e 9d 93 fd 49 | bf 07 55 b0 d5 1b 73 b3 38 d1 84 9b f0 4b 21 13 | b0 ec 4c 57 a0 8f 62 0e 14 32 3e 41 f4 35 a2 6d | cb 5d cd d2 4f ea 10 77 87 a5 ae 07 ca 72 0b 47 | ad fc b0 13 90 66 b3 de ee 9f ba 4e 0d 92 cb 2f | d0 a4 f0 45 8a b2 17 4f 81 50 24 e9 1e 18 5b 6b | 75 ac 29 6f 66 85 b3 28 7f 4e a6 47 e2 3c 05 59 | 6a e4 65 50 05 ec 7a a4 6f e7 85 e1 5e 70 8a 01 | 9f a8 de 6b 1b 9b 86 ef 0d ee 46 ca df ef f0 82 | 29 00 00 24 08 55 68 12 ed 18 3a 3b dc a6 3a 71 | 14 6d c1 04 ed 8b ae 02 38 34 1d 40 89 a3 cc 77 | 62 a5 ef 9f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 22 70 92 4e bc e3 3a 16 cc 0e 3f | 68 1d fe 8c b1 06 0d bf 00 00 00 1c 00 00 40 05 | 61 bd b0 38 de f4 76 c9 45 e6 ac aa e1 f8 83 1d | 37 b2 25 4c | libevent_free: release ptr-libevent@0x7f49b401a508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #365 spent 0.564 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 fa 9f a7 cb 8e 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 77 fa 9f a7 cb 8e 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.281 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56298 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.497801; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | libevent_free: release ptr-libevent@0x7f49a8043f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56298 | #487 spent 0.239 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0876 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.504251; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56298 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #366 | libevent_malloc: new ptr-libevent@0x7f49a8043f28 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 8a 23 ab cc 78 ee d9 97 9a 10 9f 10 71 22 7c | 88 7e 0c 64 71 22 9f 1e 1d 50 dd bc 45 1c 5e 20 | 1e 3a b8 66 0b 9b 9c 36 13 c8 ec 98 91 c0 0f 83 | 22 72 4b e6 1b a3 b2 bd 9c 6e 6c 69 cd 9b c9 14 | 54 d0 c4 00 1d 8b b8 7d 02 1f ce f1 49 27 32 9e | fd 8a 74 cb d0 00 3b 4a d1 44 7d 09 09 26 51 a7 | 31 bf 66 e2 e8 f4 f5 36 10 a5 00 d6 ab 92 31 0a | 77 96 69 8b 2f 15 5c ca 1c 23 40 c3 f6 18 b0 ca | 62 bf 44 34 fe 9b 47 91 7f 20 6f 42 3e 54 47 d3 | a4 35 35 61 ff 7d 0f 8d 84 d7 a7 32 7f 1f a5 a4 | 43 d6 88 14 80 bc 70 8b 5e 32 00 d1 cc 0e 98 37 | 44 5f 7a 5d df 90 92 67 60 ee d4 cd 2a 3b 3d 2e | ea f2 db 22 64 8b f5 de 58 ba 04 1a dd 61 01 aa | a3 40 e1 d8 ab 56 01 4a a8 a2 ca ce 68 cd b0 24 | a7 e1 3e 04 86 fe a3 fb 14 ae 8d e0 48 cf b1 1b | 50 5c 0c 65 31 90 26 fc d6 0e 3b 8a dc 99 23 b8 | 29 00 00 24 50 21 09 96 95 7d da 5e 13 bc c4 85 | ff de 6f 42 d3 b3 30 d2 63 05 1b e2 5d c8 9e 03 | cd 51 52 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 89 7c 9c bc 11 20 82 cc c6 4d c5 | 2a a2 81 d4 c2 24 86 cb 00 00 00 1c 00 00 40 05 | ce 5e 91 46 7d c0 56 22 19 d0 87 2a 28 5a fb 9a | 41 af 8c 19 | libevent_free: release ptr-libevent@0x7f49a8044028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #366 spent 0.205 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 81 d9 2d 82 87 25 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | f7 81 d9 2d 82 87 25 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00b38 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.560706; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f49a8044028 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | libevent_free: release ptr-libevent@0x7f499c043e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00b38 | #488 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c3d88 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.563993; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00b38 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #367 | libevent_malloc: new ptr-libevent@0x7f499c043e58 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 a3 82 86 0e b9 2c a7 2b 3c 79 30 79 43 10 a1 | 1c 13 84 6d f6 19 1c cc 95 1d 60 91 da ce 1f 07 | e5 91 9b b7 2b 05 10 f2 49 29 28 2d 1c 56 f0 20 | f5 ea 73 d4 7c 02 14 d6 94 52 87 71 01 4f da c6 | 2b e2 41 fe 9e 8c cc 1b ed 3a 46 6d ea 4b e1 b0 | 37 c9 5d d4 42 1e 0b 87 d9 74 13 b9 c5 ae 6a 02 | 95 fc 77 de 7c 0b 5d 36 43 b2 41 c3 5b 9c 9f e6 | 56 38 cf ba 08 43 a8 4d bf e0 1f 85 2f 8f 18 02 | 34 a8 c8 56 23 72 05 e9 49 58 1b b6 a3 de f6 7b | 2d bd 9e 46 c2 58 1a 70 f4 2c 5c d5 ae 36 6c bf | bc a6 44 f8 51 3a 09 54 04 60 e7 89 cc f7 d9 74 | f9 81 ea 68 35 07 21 3d 7c dd 26 f2 ce 99 c3 7b | 89 dc ab 1c c4 45 0c 61 2b 56 47 70 4e 90 63 9d | dd 1b 87 e8 c8 44 2c 0c 81 54 fa 92 1a 5b 9a 0d | 1f e4 97 82 c1 25 99 9f da 45 77 07 1c 06 2b 14 | e2 48 15 48 0c a2 b8 72 cb ae 56 55 dd ea cf 2e | 29 00 00 24 af b0 55 47 4b aa 7a e3 68 9d 12 06 | 80 d5 ca d4 c2 00 3e 35 b6 36 aa a1 17 32 49 37 | 82 05 08 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 61 53 fe 0a e2 93 ae 35 e7 5d 35 | 3a 17 26 42 63 ec 2f d2 00 00 00 1c 00 00 40 05 | 56 e6 dd be ee c3 cb 27 4d 0e db dc 42 7b aa 1f | 25 4e b3 65 | libevent_free: release ptr-libevent@0x7f499c043d58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c3d88 | #367 spent 0.087 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 d5 14 4e 02 47 da 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | f7 d5 14 4e 02 47 da 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.62625; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c3d88 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #368 | libevent_malloc: new ptr-libevent@0x7f499c043d58 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 54 2e d8 f2 be d2 e7 c9 1c d7 6b ba 2c a6 d4 | 12 cd 9c 52 16 a0 23 31 b3 f7 e6 91 55 db 17 d4 | 33 79 56 44 c2 0a e2 60 75 7f 66 c0 d2 00 b7 76 | 48 42 de d9 50 9f c6 8c 4c 95 d6 7b c8 e7 27 08 | 99 d3 55 0d 5a d3 31 02 08 16 60 18 4f ea 95 65 | 62 40 01 b9 c6 79 9a 6d 5e 3d b7 3d a5 65 25 58 | d0 b8 3c 69 b2 8a 6a 38 87 86 52 e8 cd 98 3f ab | 65 40 46 6c 89 46 4e 29 02 df 0c 18 31 3a 74 1f | a9 a4 43 82 65 00 07 72 e3 03 97 96 40 f1 c0 39 | 01 4f cf 3c fc b0 72 c1 ac 06 78 dd 5f 53 3c ac | 41 2a e4 ac a5 13 78 43 ff 6f 15 3a 69 55 d5 6e | 62 98 a1 ff 82 9b 99 8d 8f 22 22 93 17 35 b0 ff | 4f 9e 1c 69 41 9b 5d 8f 34 04 3e e1 4c 95 8d 29 | ef 4d 91 b2 ab ae 68 86 41 68 93 3b ca b6 af a7 | 3b 89 98 b3 94 e7 26 b9 0d 1b a0 9d ac 4d 09 06 | b4 7f 87 2c 3d 6b e0 2a 22 76 5e d8 57 5b 46 dc | 29 00 00 24 b3 d2 e3 00 d3 25 e8 32 36 1b 50 09 | c5 5b fd 40 f9 94 e7 56 88 cd a2 a9 e4 b1 3a 87 | 5c 60 4a 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 60 1c 54 6d 67 23 fc b6 28 30 9d | ef 6b 07 db fe 4c eb 77 00 00 00 1c 00 00 40 05 | b3 32 cb ae 8b d2 d7 58 23 40 85 f2 5a 55 ec 7b | 24 db a3 37 | libevent_free: release ptr-libevent@0x7f49a0022ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #368 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 ae 30 e8 b0 40 fa 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | a3 ae 30 e8 b0 40 fa 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacb9a8 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.627564; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | libevent_free: release ptr-libevent@0x7f49780065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacb9a8 | #489 spent 0.0861 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad8af8 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.685873; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacb9a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #369 | libevent_malloc: new ptr-libevent@0x7f49780065b8 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 4d 54 df b7 fa 29 f5 e5 c1 71 c4 0f 2c 90 d2 | 3d 9f d6 1c 6a 2c 93 f8 00 2f 9e b2 be ef 24 fc | 22 be 53 a3 3a e7 0d 27 b1 e3 2f 5b a0 8b 42 d6 | dd a8 a4 82 6d 0f ea f9 92 6d 1c 47 ff 7f fd 4a | 9e b7 9b a3 fb ab 7d d3 01 fc 60 8e 38 42 0c 26 | ea 02 91 fd 9d 48 bb 47 29 33 d3 e6 30 a5 07 d9 | fe 31 5e b4 ad ae f4 89 d3 64 fe 53 61 a9 c5 1c | 15 31 43 f9 d7 58 32 5b d2 a2 dc b7 ec ca 58 35 | 14 ed 90 07 8c e5 d3 ea 77 3b de d9 b8 93 ea 6b | 7d 51 be 66 c7 cf 19 af 8d 2d 00 1a 54 37 2c 98 | 8a 48 fc fa a3 70 0a 89 9c 2e 48 5c db e7 9f ca | 93 75 bf b0 0e c7 a8 55 e0 d1 9a 4c af da 45 36 | 65 5b e1 bb 4b 10 05 40 ab 63 84 53 f0 1e 06 e1 | 2e af 28 41 c3 8b 1d 65 ed 4d 57 5d 60 fc 2e 43 | 00 5a 53 71 47 97 0f e9 95 cb d0 5c 7b b0 f4 ab | ba 36 95 97 c3 5a 19 58 f9 6e 6e 60 34 84 c8 a0 | 29 00 00 24 66 fe 20 5a 26 d1 29 9d e4 36 1a fb | ee 8b 30 dd 83 c7 fc 7c 45 01 24 ef 02 37 f3 97 | 4d 0e 12 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ec 11 cc cb c8 bf 05 54 66 10 f9 | 90 4e 6b 27 8f ce ba f1 00 00 00 1c 00 00 40 05 | 99 4b 42 8c 1f 7c e4 a1 1d e3 da 07 e0 be 10 ac | 7e 80 fc 58 | libevent_free: release ptr-libevent@0x7f4974043e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad8af8 | #369 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 d9 1d 5c 32 93 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | c4 57 d9 1d 5c 32 93 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0509 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.690218; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f4974043e48 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #490 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0394 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f0c68 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.751495; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | libevent_free: release ptr-libevent@0x7f498003e5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f0c68 | #491 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.769937; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006912 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f0c68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #370 | libevent_malloc: new ptr-libevent@0x7f498003e5c8 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 bb 72 46 ba 3d 64 f1 5a 53 1c 2b b3 97 9f b9 | 52 b5 be 1d 4c 8e c3 b4 3b 6e 39 45 26 1b b5 36 | dd aa 83 1a 87 03 78 23 6c be 3a 28 69 ac db 7d | 36 84 dd 3b cc a3 19 3f dd e9 59 88 9e b8 66 e0 | ec c3 71 d5 5e 1e 7c 37 d6 77 aa 3c 65 41 be 1a | ee 40 0d 7b cc 1c af 50 2d 21 67 d5 9f b7 4f 4a | 8a 0b df 08 81 1a d3 e9 9d d3 35 8d 4d 0b df bb | 96 84 53 d2 4a 57 4c 1c dc 44 a5 03 74 05 b5 b2 | f1 a8 bc b8 e7 c0 4a 14 8d 05 c2 1e a6 88 1d 4a | eb c0 85 76 a8 d2 c3 e6 d0 03 4f 71 ee bd 59 48 | 6d e8 26 ef 06 92 f5 bd 84 d8 f6 19 aa 5e 24 a3 | 79 fa 73 45 e2 b1 d0 34 94 5d 29 b4 d1 11 6f f3 | b3 1c f5 87 b6 01 4c 0e 87 dc fa 0c 6e 2e d5 b8 | a0 4b e6 68 55 58 ab 7c aa 15 50 fd cb 9f eb 61 | 43 4d 7c b8 6c 3a ef 35 4b ab 15 27 3c 01 99 89 | d8 05 e3 87 ab 83 14 3a 7a 81 8d 71 5d 36 3d cd | 29 00 00 24 46 c8 b2 dc a0 d3 1e 4a 9c 57 b0 4a | f3 b4 20 97 e1 12 4d e7 df a9 6b 09 5e 66 7c c8 | 92 78 2c 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 1f 73 cf d7 06 bc 96 64 2a 2b f6 | e1 81 90 72 13 77 21 c4 00 00 00 1c 00 00 40 05 | 23 80 8b 64 84 7c 70 a4 9c 8e 39 e0 99 80 87 03 | 88 17 a3 bd | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #370 spent 0.438 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bf 0b 5f de e6 ea 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | b2 bf 0b 5f de e6 ea 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa4518 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.811865; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f49b4002108 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | libevent_free: release ptr-libevent@0x7f498c033348 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa4518 | #492 spent 0.566 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.304 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d3c58 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.828089; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa4518 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #371 | libevent_malloc: new ptr-libevent@0x7f498c033348 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 18 94 0d 6e 95 96 ed 9b d5 f6 ea 99 31 49 59 | bf 89 96 a8 b2 b3 fa 28 0e 10 9f 17 49 d4 08 5d | 81 26 72 a2 8e 62 05 7b 8c d5 cb e8 51 81 ef 85 | cb d1 22 70 2c 60 0f 8e a0 bf cc 95 d4 f1 e5 e4 | 28 eb 1a 0b ea b0 bc 95 3d 4f 0d c1 14 64 48 3c | a1 8e e1 6f 04 9c cf ef 1a 75 42 a2 ca dd a7 9b | 07 46 a5 8c 37 b0 47 c6 60 86 9d 04 bb 18 6e ad | 9f 8d 9f 08 94 38 54 31 b1 68 14 40 9b af cf cc | 03 0d fb 1e 16 0b 03 80 47 12 f1 63 df 5d 0b d3 | b5 ea ae ab aa 34 76 c5 72 b7 fc 02 e0 82 87 32 | d2 1c be 02 b0 87 71 06 cc 2d ab 57 5b 91 19 a2 | 5a b0 cf 94 34 d1 75 2f d3 c1 ef 96 89 41 eb 1f | 93 c3 ed 5a 26 f3 88 5a 15 87 ec f9 a7 06 5a 6b | 11 12 d4 0a b9 c2 02 93 0b 8f 7c 7b 63 61 e4 5b | dd c5 b3 45 1c 41 6f a6 7e 61 71 60 28 c5 47 5c | 3a 43 38 2d d3 2d 3a 1c e0 33 4a 1e c5 01 40 5d | 29 00 00 24 92 b3 6b ef 8a 78 7b 89 76 e8 df d5 | aa 3e 92 58 ca fa d6 b2 70 f4 46 09 b9 e1 63 cd | 57 0f 64 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 03 b2 c1 42 0e a6 1b 6e 40 4f af | 46 a0 2b db e2 44 e2 e3 00 00 00 1c 00 00 40 05 | e5 8d ac 06 54 eb ed 20 68 4a 44 29 f5 f4 e3 35 | 82 e2 3b d0 | libevent_free: release ptr-libevent@0x7f49b0033438 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d3c58 | #371 spent 0.603 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 87 ff 81 03 d6 f9 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | f5 87 ff 81 03 d6 f9 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.3 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8ea48 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.878261; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d3c58 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #493 | libevent_malloc: new ptr-libevent@0x7f49b0033438 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 8a bf 89 e9 04 1d b5 a9 c3 d2 8a 72 89 10 5a | 84 f6 37 fe bb cc a5 f3 1b 21 9f 6d b4 cc 1b 5a | 07 e1 33 7d 4a 3e d0 20 fc 93 c3 9c 55 09 86 d0 | ac b7 f4 de f8 a9 7a c1 53 15 2f 45 ce 3c 08 2a | 62 b7 83 8b d8 f7 12 9b cb 18 71 8a e3 f4 eb 82 | 6e 36 f8 55 48 fe 52 dc d9 d2 9c ff d3 d4 16 b0 | e8 7e 28 44 fd 04 07 b1 8b e3 46 1f b5 9d 49 ff | 18 76 c7 7d 06 b8 53 6d 35 25 2b 74 1d 6b 39 b5 | 8c e6 8d 02 97 1b d3 7b e7 f7 85 16 76 96 e2 e9 | b4 5d df 00 38 f2 11 d8 26 35 66 db cf 7d 7c cb | 6e bd c0 9b 17 97 77 c4 30 be 03 c1 51 37 6d 7b | c3 bb eb 2a c0 ee ee da 38 d8 e1 ea 06 90 f2 fa | d6 46 f5 af 4a 8c 21 d1 75 d2 55 e1 38 b4 70 44 | 4e bb 17 7c b8 b2 68 9d 1d 40 07 6d f2 57 04 37 | 12 55 93 ad c5 64 62 b7 6d d1 67 9b 14 60 40 f7 | 7d 5b b3 7a bb 87 75 3c 23 0f 26 72 d2 7f 17 4a | 29 00 00 24 6c a6 4a 72 ec 47 d0 c9 03 29 97 3a | 49 a4 f8 e5 f1 35 ca d8 34 f1 dd 9a d8 8b 0e cd | 88 a9 b3 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 a3 c3 ae 69 6f 7d 8a 8f 0e 6c 42 | 62 6f 96 2c 30 9b 35 42 00 00 00 1c 00 00 40 05 | e3 b3 47 95 ef 22 84 8f af 74 c8 82 a4 d1 95 33 | e8 0f 34 78 | libevent_free: release ptr-libevent@0x7f4990044548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8ea48 | #493 spent 0.445 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c1 0e 6e a5 b1 01 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | 43 c1 0e 6e a5 b1 01 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.314 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da07dd8 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.892331; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8ea48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #372 | libevent_malloc: new ptr-libevent@0x7f4990044548 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 19 55 7e 8c 7a 92 9b 22 aa fc 17 ec b9 d2 c0 | ae 80 95 c2 04 38 6a a3 15 74 1c af bf f8 a9 e4 | 1b 77 e6 15 f8 f1 5b 0f bf b2 0e ad 9a 29 3d 26 | 38 9e 92 8d 1e 40 88 0d 43 92 81 75 20 ba 9d 8f | 4b 88 29 c2 24 03 77 7a a6 55 c1 ff d8 2e 84 00 | ea 5e c6 7c 41 eb 33 48 dc 9b eb 1a 63 78 fb f1 | 87 c4 64 1c 74 f6 87 e6 9d da d5 63 39 56 8e 91 | 0a f1 5e 2f 1a 2c 3e 3e 84 6b e1 34 fd 52 48 1e | be 19 7a 57 85 d7 bf 61 74 b4 d2 4d c7 1d e8 2d | a7 8b 0b e1 db 6b f8 b5 37 8f 77 ed d2 5a d4 df | 03 3f 56 49 46 cb 66 14 aa a4 66 3d 63 e1 74 50 | 29 fc 42 3c 5a 1a 7f 9c 70 36 f4 09 c3 0e bc b7 | 26 5a 76 01 4b ef 94 5a 83 53 7f 98 3b ff 42 e7 | dd 36 fb 1b d2 21 e5 86 4c 8c a6 2a f0 ab 10 6f | 36 87 2a 35 60 97 fa dd 3c f1 a1 dc 3a f1 76 c0 | 4d a6 0a e0 0e 93 08 43 7b c0 90 3c e8 79 99 d8 | 29 00 00 24 19 e8 41 51 50 c5 82 59 b8 8a 0f 30 | 37 7a 01 60 55 25 0b ec 54 b4 ba f4 c9 23 14 f9 | e2 26 7b dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 6f b1 7e 23 40 5a 56 c7 66 8a 12 | 1f bf 72 b1 d1 68 51 da 00 00 00 1c 00 00 40 05 | bc 41 56 01 65 22 a1 bf 2a 16 07 f1 1d ea 76 41 | 83 5c 2e 7a | libevent_free: release ptr-libevent@0x7f499002dd88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da07dd8 | #372 spent 0.303 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 90 93 36 17 74 e5 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | ef 90 93 36 17 74 e5 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.152 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6cb8 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10663.943918; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005904 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da07dd8 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #494 | libevent_malloc: new ptr-libevent@0x7f499002dd88 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 9e 65 6c 66 07 a2 ba 14 47 c4 fc a0 d8 72 56 | 61 4d 22 8c 34 62 df e0 ea ca bf 35 d7 36 e0 e9 | 23 f5 c1 c1 85 c3 26 d5 ad 8c 7c c8 10 0c 8e 07 | 8f d2 0b 83 9f 86 14 22 d8 63 49 85 7f f5 a5 78 | f6 f9 19 9d b4 8f 47 68 ed 0e e4 90 70 29 88 15 | 98 42 95 9d 6d d9 eb b4 50 26 0d c3 3e f3 12 d5 | 38 37 a1 a8 6f fe 08 d1 35 57 d5 30 3e 58 ee d8 | 4f 22 7b a7 96 af d1 c3 00 1b 53 c2 86 b8 14 2c | 91 20 00 ba 1f 25 95 2f 4e b6 1a f4 c1 fb f9 25 | cb fe a5 37 a3 c5 b8 de 8d 39 15 87 65 0e 29 0a | 7b 66 2c b7 0f 5f 54 12 ce 92 72 dd 83 6b 81 27 | 91 6f 73 94 90 02 2d c1 97 8f 61 e6 c8 2f c3 69 | 32 0b 37 28 85 dc b3 99 e1 c1 f2 32 78 4a 78 da | 9f 09 73 a0 47 4d ac fc 13 73 69 cc d6 c8 ab 21 | 5b 9a 33 39 b5 9c 45 34 88 19 c2 b1 ef 2c 52 f8 | 80 d9 e2 c3 0f e9 9d 27 8f 9b 89 0d 06 93 4d ae | 29 00 00 24 e3 a7 b9 77 10 76 d3 84 87 df 4c ec | eb ae fa 7e 7b b7 45 a0 56 2b 09 a4 92 34 fb 5c | e5 88 d7 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 6b 24 2c 18 42 22 4f 1e e6 2b 11 | 53 de b9 65 f0 23 59 01 00 00 00 1c 00 00 40 05 | c4 cc 1a 88 c4 48 e2 63 25 70 3e f9 af 75 7c 28 | 60 31 b3 7b | libevent_free: release ptr-libevent@0x7f49a0038d68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | #494 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 11 fe 27 7e af ba 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | de 11 fe 27 7e af ba 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d854638 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10663.945232; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006679 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6cb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #373 | libevent_malloc: new ptr-libevent@0x7f49a0038d68 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 84 7c 0c 8d 2d b1 30 94 c4 76 fe 8d 31 d2 9b | 2b 7c 08 43 e6 f1 8f c9 9e d4 75 e8 26 0e d2 1c | 4a fc f7 87 7e f4 90 9f 94 19 56 06 39 18 c6 77 | be 2a 01 13 e7 71 0d 79 ea 59 ef ba f3 ea a6 e6 | c4 dc 19 71 5e cc 75 0f bd 51 79 5f 29 46 3a 27 | 49 83 f8 74 cc eb cc 4c 52 8e dc c2 a3 fa dc c8 | ba 18 e2 3d e0 00 8c 81 8e c4 88 e1 50 77 d6 c7 | 98 ec fe a1 38 74 46 28 d2 cb 14 96 1c dc 14 63 | 93 8e a1 49 e9 b1 ad fb e9 2d 1b 68 31 e4 f6 05 | 6b 96 83 e1 e4 81 94 93 18 bf 24 6a ce 09 35 39 | 1c f4 00 fd 5b 32 4d d7 0e 7f f5 16 c9 e4 fd e7 | f6 1a f5 a8 db 04 41 e2 21 a1 a5 d3 7a 7d 0a 5c | 4e 0b 60 6b 30 b3 02 e4 13 26 78 ed fb bf e7 5a | 83 51 9f aa e2 f4 7c 4d 2e b1 23 a5 04 f6 49 13 | d1 5c 55 66 ec 34 c6 9f 99 d3 ca 75 03 15 27 ec | 64 3d 5a 73 85 ea 87 be bc 8f 64 e6 88 6f a0 fb | 29 00 00 24 98 5d e7 2b ce 1a fa ee 83 59 7c 3e | 17 95 f7 7f 9b 3e 72 3f 7a 36 d2 fa 6f 9b 4d f2 | 47 f0 ae f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 24 5a f9 63 d8 4c 97 8d 60 81 9b | 10 a1 b8 f6 5d ac c5 cb 00 00 00 1c 00 00 40 05 | 3c 83 d4 ef 7c d2 96 cd cf 65 ae 9d 78 91 63 09 | 70 3a 24 4f | libevent_free: release ptr-libevent@0x7f4984043d18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d854638 | #373 spent 0.0764 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f 93 87 76 d0 80 8e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | 9f 93 87 76 d0 80 8e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d8544c8 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.006622; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d854638 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #495 | libevent_malloc: new ptr-libevent@0x7f4984043d18 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 70 24 69 7a 58 e1 6e 93 98 e6 c6 f6 46 1a 93 | c9 39 06 ca 3b f4 98 f2 cb 0a a6 96 0d 15 2b 9c | 39 1c e5 45 39 8a 6c 1c 68 f0 2a 71 62 e5 f6 9c | 5f fe db 50 65 33 f8 95 c1 27 0b d6 30 d4 6c 62 | 3c 25 29 6f 7d 1f 27 a3 43 5b 3d 1f 3a a2 7f c1 | fb fb 37 93 88 aa 80 04 f7 99 c4 56 ce 90 58 7c | ba 04 3e 4c 4c 5b a5 9d 86 97 27 1f 1a a9 e9 fa | 8c 86 27 65 26 b7 bd 99 86 12 c6 1c 05 ed 1a 87 | 23 2a d6 2f 71 26 eb 74 fd c7 3c 26 19 a6 ad 82 | d5 28 8e 71 4a f0 ed d8 7a c0 ec 61 05 9d 26 f5 | 62 79 e0 f5 38 57 4a c7 bd 26 ad 97 5c e4 fc 6c | 7f 4d 5f 78 36 7f 1f 70 2b a5 ed 75 de 70 59 2e | 5b 30 b1 eb 5e c8 e7 30 1a 6f 8b 26 d8 97 f2 2f | e0 1f 6d d3 6c c3 4c 47 f6 d9 2b 76 cb b8 0e 9b | 57 8f 60 01 df 46 d3 a4 fc 53 31 dc d5 56 8d f5 | fa 39 81 ad 3f 3f 16 7e a7 1b e4 b7 ca b6 c0 10 | 29 00 00 24 23 46 9e a2 d2 02 ad 06 61 c4 c1 de | 0f 9e 45 25 06 d3 49 f5 b0 d6 ee 35 58 0c cd 64 | 95 ce 52 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 8c 81 bc 70 b6 ac 75 d9 b4 3c 57 | 29 e9 4b b6 9e 67 fa 0c 00 00 00 1c 00 00 40 05 | 68 a2 04 a0 61 41 9e 0f 1f 06 39 e2 13 ae 01 dd | 81 9a 48 25 | libevent_free: release ptr-libevent@0x7f4974038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d8544c8 | #495 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 78 23 a3 15 b1 37 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | ce 78 23 a3 15 b1 37 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daca228 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.007935; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d8544c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #374 | libevent_malloc: new ptr-libevent@0x7f4974038e28 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7c 17 57 2a d4 88 b8 09 40 42 68 ad f5 d6 24 b8 | c6 37 a0 4d fe ed fd 63 39 5f d7 7c 71 52 fc a1 | b5 1f ed e6 c5 f4 f3 30 27 33 de c7 6c 4e 33 f0 | df b4 8e 78 6c 09 b9 c2 8b 68 7e 56 7e fa e2 d7 | cd 79 40 ef 41 68 43 4c bd 19 95 be 5f 4d d0 d6 | 67 fe bb e3 d6 c6 3f f1 59 ce 0c 92 bd 00 59 24 | 34 38 10 97 61 82 fd f7 c3 72 50 f8 5e 48 84 7f | 42 49 6d df ab 06 62 ae 4b 9b 9d 88 91 d9 1c af | a7 6f 9f 32 f2 15 13 45 a6 4f 26 31 75 6f fe a3 | c8 57 f9 08 10 d3 a4 62 54 ec 06 c1 66 7a 35 7e | ec 10 87 df 32 c0 e9 62 1e a4 96 7d d2 d2 05 ec | fe 53 38 d1 f9 57 d0 cc c5 b4 ba 4c 79 53 4a a6 | 00 6f 66 ae 60 5a 92 e0 09 21 9c 1e 96 a1 99 21 | 28 85 c8 f6 7f ce c0 99 ce 8f 09 82 5b cf c8 be | 5a da 3e 19 06 32 2b 77 af 54 4e 8f 56 14 10 85 | 8b 31 98 33 81 8c 12 66 97 5f d3 f3 75 10 36 19 | 29 00 00 24 ad 54 8d 2d c8 d3 20 c5 0d 79 b0 1e | 62 06 ae b6 3e fd 0d ba c3 73 4c 82 48 25 40 e5 | d4 48 c1 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f6 06 0c 4f 6b 14 df 6a 35 57 6f | 12 4b 47 32 e0 10 07 5e 00 00 00 1c 00 00 40 05 | a8 d2 8d 92 0e 8d 6d 37 14 45 2a 8d 54 6c 36 99 | af 09 64 cb | libevent_free: release ptr-libevent@0x7f4988044f18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daca228 | #374 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d f6 29 84 8d ec 57 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 0d f6 29 84 8d ec 57 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da394e8 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.068266; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daca228 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #496 | libevent_malloc: new ptr-libevent@0x7f4988044f18 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 1d b6 4b e3 36 87 42 f5 36 46 3f 27 fc 91 2a | 09 bf df 43 7e 4c c6 73 d1 7b 4e 80 22 f3 de ab | 3d 10 99 5f ba 11 82 69 2a f0 21 0c 72 f7 7f 8f | f6 42 9f e4 d0 ee 29 1d 9c c2 7e fb 27 6e f6 49 | 5b d1 3a f2 25 7c be 8c 9d 3e 05 64 cb e0 30 39 | a5 13 47 23 cb ec 9c 74 54 58 4f a1 ac ed 59 7f | ba 73 1c 93 e0 3f fc ea 85 9e f0 4a 31 4c 62 3f | 3c 59 11 95 4d dc 25 72 83 18 eb 57 87 5f 64 54 | 61 24 c5 d4 ee fb 64 f8 c5 5b 7d c3 2a e9 66 bd | 43 09 0f 1a 62 25 ba a5 53 f5 a1 9e 71 a3 ef d7 | a7 d1 c4 7a 57 fb ad 8f bc de c3 8c 16 73 81 e5 | 2a a4 6d bd 56 e9 70 2e 7b 60 0c 50 c6 31 28 ac | 09 ed 3f 12 85 a8 1c a9 07 50 06 e3 3a f1 79 8a | a7 dc 67 cb 90 a8 c9 1f ac d0 f3 16 5f 94 74 e3 | 81 e2 84 99 a0 63 5e 5c 2a 10 12 9c 3a 72 e9 d4 | fc b4 af 08 ad 67 1a da e9 74 f4 c8 ae d3 9d 06 | 29 00 00 24 48 7b aa 11 3e b7 cb 80 cf 6e 67 d1 | 8e 41 9a 8c 9a b0 1e ca a2 5a 04 6c ce 26 7a d0 | 0d f1 36 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba d6 cc d8 42 54 a7 fe 61 5b ca f1 | 36 92 a6 77 db 6f 08 a3 00 00 00 1c 00 00 40 05 | d8 ea b5 fb 56 a5 f6 42 40 f5 fc db bc 2e cc 5e | 92 7e bf ac | libevent_free: release ptr-libevent@0x7f496c03e838 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da394e8 | #496 spent 0.299 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 90 29 fb f9 3e 72 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | e8 90 29 fb f9 3e 72 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d24d8 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.071985; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da394e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #375 | libevent_malloc: new ptr-libevent@0x7f496c03e838 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0b 0c 8c d1 16 42 b6 fe 94 07 92 4e 7a 08 32 af | be 43 9f dc f5 63 ca a3 ee 25 e1 8a 33 c1 71 75 | 28 c2 b2 47 4a 1b 41 09 e4 b4 e5 51 66 f4 c8 89 | 22 90 c0 ec 6e 48 be b2 e3 e8 9c f6 53 ed d8 11 | fa 14 ea 26 86 39 30 53 7b 7d 03 20 6e cf 43 f9 | 27 a2 92 e6 e0 4e 0f a6 18 1a ff f1 fd a8 57 af | 92 ce c3 d7 53 f5 41 14 b2 17 eb c6 9e 82 ea 5b | bb 1e 91 89 9c 5a c7 74 10 3f 20 a1 f8 a7 97 0f | 46 9d de 45 c8 0b 59 0e 16 3d 88 ec e5 e2 80 a5 | ff 63 cf 3c 09 ac 77 51 82 e7 85 86 ff df 24 c8 | 69 b3 0d 3b a5 d4 ec bd aa 48 fc 4e cc 18 27 9c | 7e 34 37 2e 73 b9 df 8f b1 3e f1 b3 ad e9 58 51 | 6c 0b db 8d 46 9a 93 65 ac 16 17 e2 89 f2 f0 19 | 5a 58 84 29 4e 00 8a 16 67 1d b5 26 33 48 03 67 | 4d 00 79 be 1c c8 ba 7c 1e c7 b9 1d 51 b5 ef 6a | 6d cd 18 05 9d 34 80 67 3c 51 49 f5 08 ec a4 1d | 29 00 00 24 18 23 2e 4d a8 db f3 6e 79 8e e3 46 | 6a 9c fd 4c 74 05 36 1b 63 ea 83 0c ac e1 0d f7 | e6 7d 1f c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 29 af dc 82 4c d2 01 66 6a de 21 | 9b e6 a2 bf af e2 8e ef 00 00 00 1c 00 00 40 05 | 69 1a f4 d8 a4 5d e6 9e d7 a6 29 df e5 39 b0 fc | 9b 58 da e3 | libevent_free: release ptr-libevent@0x7f497c017c48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d24d8 | #375 spent 0.321 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 de d1 a1 8b 6a 10 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | 54 de d1 a1 8b 6a 10 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.168 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae2c98 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.129744; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d24d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #376 | libevent_malloc: new ptr-libevent@0x7f497c017c48 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6a 06 bb 33 97 ba cb 63 95 69 04 eb 14 49 f6 2b | f2 68 fc d8 4a 34 52 31 09 a5 01 90 de 11 76 92 | 5b 8b 16 19 40 59 ba c3 dc d8 ba a0 67 f9 b6 4d | ad 06 37 08 b8 2f 65 b0 90 32 9a 95 c1 de bc 0e | 23 f8 2a fe be 1b 28 ce 73 8c 28 bd a8 7a 0c 07 | 7d 11 f9 95 e4 f0 07 08 be 36 b8 e4 c5 77 15 98 | 5a 0c d6 df 55 3f 7e 51 a2 04 76 98 a5 74 b3 c6 | a0 fe 84 55 e9 49 be fd ac 84 04 1e 4e 45 b7 e2 | 80 ce d8 ee 6e 3b 7d be f5 1e 6e 8f ae 42 73 26 | 4f b8 fc ff 89 d4 7c 95 40 29 ca b3 ba 6d e6 df | de d1 56 52 ef b6 8b 4d 68 c6 12 04 2f 34 4b 38 | 02 8f e9 c2 4e 24 66 d1 21 39 23 57 9b a5 44 1c | 0d 17 fd df 03 c5 b0 41 1d c2 de 54 b6 68 2a 40 | 33 b8 bd 68 a2 ac c0 4b 05 0c eb 7a 4b 6a d1 b4 | 13 32 69 58 7e dc ad dd 7f e2 8d bd f8 ea cc c5 | 4b fe e2 8b 0a 3f 22 ad 8c 3f 96 ff cd e3 93 9e | 29 00 00 24 12 26 8e 75 fc 9b 02 49 82 f2 25 15 | 5e a9 47 97 48 fd c5 41 95 61 18 7d a5 0f 17 fd | 07 cd fa 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 0d e5 ed 9f 44 19 55 b8 f8 cc 7e | 1b 69 f0 0b bb a9 e3 2d 00 00 00 1c 00 00 40 05 | 1b 0f 41 ec b4 02 f5 0a c6 a8 cd 92 24 0e cd d4 | a4 ae c0 2a | libevent_free: release ptr-libevent@0x7f49b0049538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae2c98 | #376 spent 0.6 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 16 e4 d8 2e 4e 76 bc 98 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | 16 e4 d8 2e 4e 76 bc 98 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.299 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da00ac8 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.135898; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae2c98 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #497 | libevent_malloc: new ptr-libevent@0x7f49b0049538 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 b5 32 f7 ff 42 27 38 1f 68 f7 0a 6a 69 5d 0d | 1d a0 01 2f 8e 75 12 8b de 06 d6 49 58 84 82 df | 0c fe 40 4c c3 6c a7 fa e8 1e 07 40 c7 db 9c db | 28 d2 0f cf 3a cf 89 bf a4 5b 88 a8 90 b7 37 85 | 1f 9c 74 65 94 52 ea d8 73 3f cf c0 8e bb 98 01 | 7d a9 99 53 c2 57 57 fb 73 6f 03 15 7d 44 b5 1e | da d7 93 fa 81 76 3b cb 36 2f 72 ca c4 6e f5 ae | ff 07 f0 c0 6b 7f b8 77 04 39 61 e0 21 cb be ad | d7 44 b2 14 56 ba 2d eb 2e c8 5b 23 03 15 b3 f1 | 57 ef 4d e4 f2 9b ea 7a a8 e1 c5 c6 3f d1 a1 d1 | 08 b4 d4 6b 5a 2d 0a 29 b6 4f f0 3d c1 aa 8d 23 | 17 46 35 c7 ca 7c d8 36 e9 91 88 e4 83 f9 60 54 | 80 83 b8 b6 7b c9 98 ab 15 a6 c6 82 03 8d a0 0f | 4c f9 c8 36 3b 34 e7 e9 9a de 3d 51 d1 48 03 11 | 79 66 0e 85 3c 89 9e 4f 90 b1 42 5c 03 8f 00 7f | 9c 27 08 90 b6 15 3f ee d1 26 07 01 86 de ab 38 | 29 00 00 24 55 42 73 d4 67 5e a3 31 a2 b2 86 f8 | f6 5c 32 38 1e 0a 38 9e ca 4e f1 8a 6d ec 5f 0e | b9 af 03 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 3b c4 a0 4e eb 77 67 fc cf 56 aa | bb 93 30 1b a3 4a 6f 76 00 00 00 1c 00 00 40 05 | fe bf 9d 18 17 4c c8 e9 8c 73 19 83 b7 42 8a 66 | cf 50 46 7e | libevent_free: release ptr-libevent@0x7f498803e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da00ac8 | #497 spent 0.382 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc aa 94 47 e5 64 b5 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | cc aa 94 47 e5 64 b5 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaba28 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.19262; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da00ac8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #377 | libevent_malloc: new ptr-libevent@0x7f498803e5d8 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 f9 24 ba cf b5 96 a3 93 ac dc 06 7c 30 32 2d | 11 b6 c4 50 fa 94 20 b6 d3 a3 51 62 33 cc ee a4 | 13 73 7d 86 d8 13 63 ca 6d df 27 a2 22 28 ab 1b | 56 c5 3b 26 31 92 78 6b 96 60 17 82 d8 31 34 c3 | c3 04 03 cc 7d e4 26 96 d5 f4 6e 98 fd 7d f5 71 | 6b e6 26 5f cf f1 9d c3 d2 e2 54 d4 b3 ac c5 5b | 43 d8 16 14 b7 28 42 7c ec e5 3b 25 f7 e4 52 3b | 03 6c cd 2e 93 fa 44 1f 96 1a d2 22 76 7e 87 57 | 0c 03 87 d7 47 e9 a5 56 c5 82 3f f5 41 ee 7a 2f | b7 94 19 4e e5 e2 2e e2 11 15 24 3b ee fb 26 57 | fc 47 60 9e 16 cb 48 4a 06 2d 9c a4 c2 2d d9 d3 | 18 71 75 c6 ca f7 e6 6b c8 97 d5 21 e2 91 a4 6d | d0 35 e4 90 b3 0d 55 99 09 cb fb 79 87 e4 f0 25 | b5 25 15 42 06 b8 e5 f5 2e 7d 37 f9 8c 20 9f 80 | b1 a7 21 d8 d0 e5 11 9f d5 29 66 6a 0a 03 aa 5f | 4b 43 9c 5e e9 b7 c8 0c 8b b0 66 45 cf f2 8d b5 | 29 00 00 24 03 a0 55 a3 2b 28 ba 0b 99 e0 eb 44 | 97 a1 55 2f 0a 7c 6d 1f 4f 10 f4 f7 ab 01 9c c4 | c0 ac 75 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e4 d6 99 bb 54 0b 9d 73 fb 0b bf | 5d 78 25 43 d1 b2 08 a6 00 00 00 1c 00 00 40 05 | 8b 8b 19 ff 17 59 2e 04 b2 9b eb 7a 2e 71 e8 32 | 05 19 0f 6b | libevent_free: release ptr-libevent@0x7f4998033558 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaba28 | #377 spent 0.476 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 56 4c 93 10 55 89 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 2f 56 4c 93 10 55 89 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53408 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.20332; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaba28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #498 | libevent_malloc: new ptr-libevent@0x7f4998033558 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 80 f6 cc 1e 41 80 d8 b5 bc f5 da 8f ff 7a cf | 01 01 2a d1 74 17 5d 84 d0 0e b4 84 b0 c7 cb e9 | ec de a9 cb e4 47 1d bb 6f e9 3c 26 48 ab 31 e2 | 41 84 9c c3 b1 75 5c 38 e7 a4 3b ed 1a d5 7b a8 | 1f ac 97 a9 b3 1b 21 ac c5 33 9f ff 59 65 71 f2 | 8c fd 30 bd 3f 6f 20 82 c2 3f b6 b4 ef 74 7a cd | 34 ff 28 3a d3 23 54 86 c4 37 4e 6c c5 55 a7 51 | 50 72 ad fc 04 9c 23 35 28 e1 69 b9 5b 5b 58 34 | 2e ed 8b 4e 5b 96 44 9a cb e1 b2 43 7e 71 d2 9b | 94 2b 7e ba e5 04 e0 f2 ca 4b cb ee a5 cb 49 6d | 77 61 4b c0 6c 87 a8 ec 5d 49 e5 f9 f0 94 70 10 | de 14 d5 e9 84 22 f6 03 a3 68 86 55 2d 22 27 63 | 38 51 e9 3b 24 31 0e f9 78 cf 69 c2 a5 ea 9f e4 | ff 83 6f 53 77 bd e4 99 60 61 5b 74 d9 9f 11 3e | eb 52 96 bd 4e 4b ae 95 48 94 45 04 a1 15 4c 9c | d0 47 d4 7a 7c 6b 22 2b 33 10 87 2b 02 d1 96 07 | 29 00 00 24 56 9e f4 16 12 f8 89 df 66 51 be 2a | 1b ac 38 dd 97 0b 39 84 c6 f6 02 0a 1e 11 ff a2 | 71 30 8c a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 f5 bb d3 24 0e 23 fb 2a 17 a0 79 | fa 1e 4e 52 6e 6a 7f 5c 00 00 00 1c 00 00 40 05 | a0 9e 91 c0 82 ab 4e bf 41 e0 4b 45 af 42 73 d5 | 94 aa f7 cb | libevent_free: release ptr-libevent@0x7f497c03e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53408 | #498 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 92 cb 5e a7 23 a8 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | a5 92 cb 5e a7 23 a8 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8408 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.251665; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53408 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #378 | libevent_malloc: new ptr-libevent@0x7f497c03e5d8 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 e0 b7 5c 6d 27 0a b5 cb d2 d8 b1 4e 6f 6e 08 | 86 83 02 6b d4 e8 7c c8 c7 2d e3 38 57 76 2a ee | 3e 75 be d9 65 bd ff 45 70 f3 2c fb bd bc 6f 26 | f9 5a 31 0b 7c 3c 8b 86 a0 2e 1d 25 25 78 eb 3f | 21 83 b4 60 73 53 bb dd dc b8 81 a9 77 aa 50 2d | 87 e2 55 bc 25 b4 0c cb b0 67 4b f9 db c3 2e ef | 1f 3a 6b 80 9f 0d 80 45 6c 07 2a a8 f0 12 85 ee | 6e f9 e2 f5 61 59 48 b0 43 22 08 0f 83 b0 99 57 | fe 39 e5 af 25 07 a5 1c e5 4a 30 4c a5 d7 97 02 | 8f d5 cb ee d4 ed c2 ae 22 b2 b9 4f c1 20 a0 79 | 6a 23 8b cd 8e 8e a8 15 1c a6 2b 73 13 4a a9 93 | 37 82 88 d4 93 62 a1 5c 1d 85 2a ba 1d b4 3e 70 | d6 14 8f d1 00 f2 c0 b6 72 65 00 b4 7a ef b9 4e | 4c 7f 55 f2 da 97 5d b6 e5 10 e3 c6 e6 86 3c 12 | ce 8c 3a bd 1d ab df 92 79 0f 13 05 6d 91 fc c0 | 16 44 94 5e 95 95 e6 0f f8 8b 95 aa 67 f9 d8 8c | 29 00 00 24 06 25 2e 41 db 7e 57 c5 ae fc 5a 6a | f6 d6 ff bf 20 55 8b a4 d5 2e 93 89 d1 db bb be | c7 cf cd 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 7d 0e 46 2a 66 4b 77 29 f8 8e 1d | 4a 70 f1 54 f6 ec f0 b4 00 00 00 1c 00 00 40 05 | b0 04 9f 41 03 9c 6e d9 5a 1e 70 1a a6 49 1e e6 | dc 88 d5 3d | libevent_free: release ptr-libevent@0x7f4978043db8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8408 | #378 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 2b bf 87 5d b7 90 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | fd 2b bf 87 5d b7 90 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d08 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.268997; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8408 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #499 | libevent_malloc: new ptr-libevent@0x7f4978043db8 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 38 17 c9 56 58 c6 90 df 88 27 8d 64 6f 25 e5 | ac 3c 88 b5 0d f9 32 82 43 d7 83 52 8c fe 31 bf | ea 89 86 a3 a2 23 bc b8 4a e2 ae be 1c f4 35 36 | c5 d5 a2 7c df d6 80 23 02 e4 8f 8d 1f ba 28 b3 | 9c db 2b 75 a6 90 21 1a e7 7b e1 6b b8 2a 16 72 | 64 57 59 49 1a 93 62 46 63 f2 86 3a fa 9b 0f 31 | c7 af fb ee de 04 1e de 76 e3 0b d3 20 ef 62 19 | ca 78 5d 0b 93 b1 37 03 eb d3 2e 78 a5 5c df 46 | 41 c0 2c 36 87 3a d4 5a a1 82 42 aa a0 c8 b5 b8 | 88 6e 0b 1e 38 d6 ab 97 03 a1 4c e6 86 f9 67 ab | 2f 4a 09 cd 11 b8 d6 39 e3 c1 a5 71 e7 9c 8a 90 | 67 75 5e c5 2e 84 53 4a f6 90 95 88 b4 fd bf be | 9d 62 3e cc 43 55 c0 ef 88 7e 76 27 cf fa c8 18 | e6 a6 da 32 2e 3c 7f 31 ee c7 d2 8e 33 38 05 ff | 72 61 77 ee c8 cb e6 1c c5 26 ee 74 4c 8b 46 ee | 94 95 88 8c 47 c0 f9 db c4 e8 06 5d 88 26 93 5c | 29 00 00 24 a9 0b 28 38 2e de 26 e9 76 17 33 4c | 94 7b a2 b1 a4 23 3a 31 ea 41 71 23 a6 cd b8 69 | 1b a5 53 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 02 d6 6f ac 39 1a fb 71 6e 39 92 | 4b 5a 34 27 ea bd 0b d7 00 00 00 1c 00 00 40 05 | fd 04 cf 51 02 8b 46 e2 e1 51 6f 86 c4 b2 f4 5b | 5a 51 13 ab | libevent_free: release ptr-libevent@0x7f49bc00f798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d08 | #499 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b b4 5a 0d 48 5b 19 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | 1b b4 5a 0d 48 5b 19 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da53478 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.315279; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #379 | libevent_malloc: new ptr-libevent@0x7f49bc00f798 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 95 2a 97 d3 c8 23 66 12 d3 03 f4 cd 56 5a 7a | d7 fb 9d 2d d1 68 18 80 59 71 86 d6 d6 84 a4 70 | e0 03 f2 b0 64 68 b9 3a ad 53 dc 7c e2 41 ae 65 | 5c cf 0c 9b d2 a0 a4 18 02 ea 11 df a4 47 33 78 | 93 69 bc 6e 29 14 04 39 21 47 64 9a cb 94 b7 10 | 33 26 f7 32 95 0c 8b b3 27 d0 c3 cc b7 9a b0 2a | 7d 29 6f d2 6d 16 14 d5 cc df f5 52 9d df 1b f0 | f2 31 7e 7d 61 0e fb e8 8d 42 d3 40 fa ca f8 39 | 6c 9e 4b d1 7f 7a 21 e2 95 68 c6 42 e0 fb a0 a7 | 2e be 22 22 cb 19 7c 16 6e f0 73 d4 21 b8 5d 63 | b2 2a da 23 04 d5 d2 c8 f2 38 7b 85 3c 35 70 d3 | 27 81 6a 89 73 81 c8 e2 30 42 2e 70 34 a4 65 73 | 8e 93 c3 15 08 72 48 73 4c 4a be 7c c6 21 84 74 | f1 7e 3d b3 05 69 5c 18 f8 51 b7 8e d8 19 a3 81 | 61 72 f9 62 42 4b a4 a9 fa 5c 74 3b ee d3 ed 74 | 26 7c 5f e9 62 dd d5 f3 40 61 d8 e3 70 85 19 76 | 29 00 00 24 f2 05 4d 4a bb 40 c2 df 2b 33 62 c0 | ad a6 01 11 10 f5 54 85 22 9b 14 46 ed f3 9e 9b | 77 4f 09 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 dc 9e 63 66 16 3e 54 32 59 51 b0 | 18 95 0e b0 f2 09 98 fe 00 00 00 1c 00 00 40 05 | d1 6c e8 1d bf b2 65 52 bd e0 73 92 c8 21 1a e9 | 73 e7 99 98 | libevent_free: release ptr-libevent@0x7f496c043ef8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da53478 | #379 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d3 86 ec 52 31 cc 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | d5 d3 86 ec 52 31 cc 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8a488 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.330641; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da53478 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #500 | libevent_malloc: new ptr-libevent@0x7f496c043ef8 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 12 b0 b5 6c 94 32 5b 13 43 fc a9 0d 75 2d f8 | a8 09 7e b2 14 e1 b6 5f 11 80 11 01 07 58 9a 0c | ca c3 95 4b 9b 65 86 2b 61 2f fe 82 c3 8a 0d f0 | 6d 46 7a e4 e8 51 94 e7 19 9a 3f 0f fd 63 98 1a | 86 96 70 66 72 f2 07 9f d5 c3 84 53 b7 55 71 9b | bd 9f 7e f2 65 f7 e3 85 29 f3 a8 78 c4 4e 57 e0 | 5e e8 c0 fc 2a 08 53 d9 d1 66 f7 c0 71 8e 12 83 | a5 2c 0c 36 1f 05 a1 f1 45 7f d8 bd e4 3d 9c cf | 9f c5 91 21 65 88 4f a9 35 47 ff 4e 92 90 73 8a | e7 94 b1 2d 7b 3a eb 3b d0 ea 32 17 f4 b0 31 c6 | e8 8b 51 11 c1 19 c5 b9 1b d9 a8 e1 12 46 10 e8 | 78 f6 31 2e 54 42 54 66 65 61 e6 43 70 f7 c5 8d | 84 3e 8b d5 50 c3 b4 a9 42 b6 36 12 fb c6 da ea | e5 39 55 f9 bb 67 4f 54 93 82 8a 88 00 17 bd a9 | 9f 7d 6f 0e cb ff 13 97 eb 0f 6c 70 d0 4c 9b f6 | ef 20 6c ae d1 a9 05 e0 bf 9e d7 88 5d f0 91 71 | 29 00 00 24 b0 d5 2d 46 51 d2 16 b4 2c f6 3a 14 | 27 bd ef b5 b2 8f ea d9 24 a8 ee e7 b2 ea e4 81 | 78 29 16 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 7c ba 12 65 b8 92 a5 80 5e f0 a7 | 78 19 5f 00 a2 d7 7a 84 00 00 00 1c 00 00 40 05 | 60 35 5f 6c 81 27 41 85 b6 5d ec 43 f5 1e 71 8d | 5a fb e6 0b | libevent_free: release ptr-libevent@0x7f49780334d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8a488 | #500 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 7c c4 cb 9a 2d 26 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | 75 7c c4 cb 9a 2d 26 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da61b28 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.369946; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004743 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8a488 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #380 | libevent_malloc: new ptr-libevent@0x7f49780334d8 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 db 1a 9a 6d 42 c0 a3 67 6b 30 a0 f6 92 fa 2d | 54 7e 36 a9 17 4d bd 7d 47 2e 0c 83 88 66 f2 2b | 4c e2 c9 0f b0 14 7b 7a 1b 34 d6 3f b9 af e9 99 | 45 3c f5 c7 96 f5 39 22 62 4f 1c ff fb ad 85 a9 | ec b2 a2 a1 e0 52 b4 25 01 54 dc a9 8a 29 d0 20 | 5f d8 2a e1 52 d6 c2 13 2f 4a 51 3a c5 56 b9 a8 | 30 bb 79 b4 fd 37 99 1d 5b 2a f8 0e 58 48 63 bc | 87 40 92 6d 84 1c 12 2e 57 8a a2 ac 2c a1 94 e0 | 4e 69 7e f7 32 82 40 dc d4 aa 18 92 89 66 cc 62 | 97 1d 98 bd ce b5 f6 3c 9f c1 a8 5c a3 72 44 ab | ed 32 73 dd fb 8c f9 a1 2a 4d ee b5 bf db 90 03 | 11 76 0e 32 7d 01 c2 7a d9 4a 4b 43 77 7e 52 2c | 9c 7a e5 bf cb 43 9e 29 55 6c 64 94 b6 b0 54 75 | 3f 95 be 6d 46 b9 22 47 61 88 6a bc 08 c7 06 a8 | c6 b0 c7 ae c8 2a 71 38 dc 59 05 d2 49 9e 97 48 | ad 8b 95 94 50 d7 79 31 94 ac b0 82 56 92 ea 89 | 29 00 00 24 ff 89 4c 01 23 83 1f 48 33 c6 f7 a8 | dd 8a fe a3 ee 1f 96 93 05 06 5d 95 e5 32 f4 1a | 3b 00 c7 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d9 ed cc af 71 48 ee b4 b7 10 bd | fb a7 39 09 df cb 14 7b 00 00 00 1c 00 00 40 05 | da 90 fb 7d 11 79 b7 74 4e f5 23 ac 34 d1 8f e6 | e6 83 0a da | libevent_free: release ptr-libevent@0x7f4990028328 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da61b28 | #380 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f fb 21 51 68 16 23 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 1f fb 21 51 68 16 23 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da393c8 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.395311; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da61b28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #501 | libevent_malloc: new ptr-libevent@0x7f4990028328 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 4d 92 78 17 da 57 0f be bd 8b 51 6d 25 a1 a8 | 61 57 3c 5a de ba 9a 7b c7 cb 1e 38 93 d5 84 85 | 94 bb 19 62 70 21 bb 02 2a ef 5c 1c 8e ae 89 33 | 1d 0d 66 53 22 d4 d4 a7 c4 8a 91 ba 6a c7 b5 06 | 7a ac 44 7b e1 f3 20 9e 62 d9 f4 42 4f 5c 98 74 | db 31 9f b2 f5 c5 e2 d2 ef 0b 8b ea 2e 58 2c eb | e4 bf af de ec c8 92 e7 4b 6e aa ab 1d 1b 4b 3b | dc f6 9d 70 0c 30 fd 8c 92 5f 7d f6 a7 03 b5 8a | 97 29 3f 9c a3 5e 09 93 af 8c f8 bf 5b 41 4c 8b | c8 50 60 72 f2 1b 80 3c a6 56 b7 88 94 50 95 8b | d0 45 59 f6 70 f4 b2 5c b1 ae a0 06 b3 32 85 c6 | 36 2b 80 4a 0c ea de 0e 0a 61 22 7e 67 f2 cb e9 | 57 f4 20 e1 35 d5 a3 ca d9 29 e7 27 e3 27 5c 37 | db b8 62 7a 5f 3b 78 18 64 ba 0f 6c 4f 46 fa 98 | a6 65 db 50 b7 4c 9c 08 d3 98 42 be a6 d8 27 ef | 1c be ce 73 c0 4f 39 6c 47 ba c2 da 3e bd 15 f8 | 29 00 00 24 76 88 4f 06 94 72 ce 77 34 ab c1 ce | 30 0f 6c 6a 03 46 20 57 64 80 23 52 49 ec 2c 3c | fa a3 3a a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc f2 54 8e ce f6 a3 29 a3 3a 88 55 | fe 0e 47 7d cd cf fb bc 00 00 00 1c 00 00 40 05 | 72 c1 d6 2e 67 bd 05 12 46 0b a6 5c 89 b3 f6 f7 | ed 7a 46 06 | libevent_free: release ptr-libevent@0x7f49bc046748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da393c8 | #501 spent 0.204 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 ef f3 2e 84 7b 94 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | a0 ef f3 2e 84 7b 94 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0881 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da36618 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.432751; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da393c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #381 | libevent_malloc: new ptr-libevent@0x7f49bc046748 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 1f 87 8d 78 b0 9c ce 2a 12 20 1b 84 fb 74 95 | c5 59 cf d2 fa fb d0 0a 00 5e d4 cc fe 22 be 0e | 21 d7 4b 99 02 8e 18 0d 7a 42 ef 76 72 e6 7f 89 | 40 b8 f5 f9 45 06 cf 0d a9 74 3d 5e 07 5c ce 63 | 94 0e cd f0 47 ec f3 f8 16 f4 6f 2e e0 75 40 a5 | 6e 50 3f 75 fa 9b 62 e1 d3 9f bc 48 d6 a6 83 4e | 70 5c fc b1 72 37 6c 33 bf 05 1e 3c 8e 14 52 eb | a0 8c 4a 79 fd 5e c1 ea 07 88 0a 72 10 b9 f7 c5 | c1 7d d2 11 d0 cb 85 30 48 0a c5 19 47 7f ea 92 | d1 7b a6 9a 8d a7 9b a4 16 0c 60 30 00 5f 57 94 | d8 07 43 be b5 88 b6 07 19 81 76 50 1a 81 0f de | dc a2 8b c6 65 86 6d b3 83 41 e1 a2 7f b6 19 0b | 31 4b 97 f3 40 41 f2 66 29 4d 6b 50 98 56 de 6f | 8c 3b 9d a7 49 5b 88 51 25 0b dc 9e bc d3 33 0a | fe 97 78 3f 2c f2 71 13 1d 01 37 45 bb 50 72 e8 | fb c1 af 93 93 70 b8 1c 92 e0 3f 73 55 15 26 a7 | 29 00 00 24 ba 15 b6 a4 61 e8 6d 9d 70 e0 7e 0c | 46 1d ee 17 c9 8a 8d a9 b5 57 26 c1 44 45 63 6a | d8 a6 59 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 45 78 44 05 40 86 8f 37 86 ea a7 | ad d1 d4 e9 bb 9b 34 f6 00 00 00 1c 00 00 40 05 | 56 79 e5 d1 cf 53 ca bd 98 84 d2 28 d2 d1 f8 e0 | be 96 d3 2f | libevent_free: release ptr-libevent@0x7f4980038e68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da36618 | #381 spent 0.256 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 1f 30 7d cb 14 b0 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1a 1f 30 7d cb 14 b0 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.113 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f52e8 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.459384; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da36618 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #502 | libevent_malloc: new ptr-libevent@0x7f4980038e68 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 0d e6 e8 9c fd 72 02 3b 81 86 cc ac b5 88 b9 | 08 65 a8 80 e3 b1 86 53 a0 95 fb f9 9d 94 25 22 | 7e 48 3f 71 b5 e8 9b 45 1e b7 fb f5 6b 76 45 6f | 82 8e 68 a7 3e ee f2 d6 94 dc 78 d4 3c a3 77 bc | 9a 6b c5 84 e2 97 b8 a4 78 5a 01 d0 c7 b9 9d 00 | ef e8 f7 15 95 48 31 3f 37 1b c7 86 ae 9b bc 31 | 7d 65 e9 b4 72 84 b8 2b 27 be c4 cf 91 53 ee 06 | 62 c3 e4 41 7f d2 29 4b 71 b5 69 30 47 78 c6 de | d4 a1 6a 94 bc fd b1 86 5a 2b e2 b2 c5 0d 58 1b | 43 f2 d5 08 a9 dd 66 e3 dc f2 83 21 ac 69 10 d5 | 80 41 17 ad 7e 9f f5 64 81 99 30 3b 11 68 46 5c | da 06 d9 ed 12 2f e9 56 f1 3a f0 cd 2b b7 93 59 | 66 7f 5a 7a 0b d5 be 4e 28 1b f5 e0 91 97 46 ed | 9c fa 69 db 87 a3 92 d0 23 cf 9e d9 6d b7 ad 3a | 37 6d be d5 84 97 60 5e 93 37 cf 0d c9 d3 3d 2a | c2 33 48 00 20 32 02 50 e9 74 8b 24 8f bb a3 28 | 29 00 00 24 a4 bc df d3 a5 ac 32 27 d9 78 ab 13 | eb 9a fd dd ed d2 d9 da fd 94 93 9b 85 07 d1 0c | 2e 23 4c d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 a3 64 88 f7 8b c4 8e 31 66 88 18 | ef 0b f6 ba 75 14 dd 0a 00 00 00 1c 00 00 40 05 | f9 78 90 b5 1b 8e 5e f3 cf d7 67 70 a8 a1 4f 39 | 8e 66 bf 72 | libevent_free: release ptr-libevent@0x7f49a4043bd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f52e8 | #502 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 b7 79 3e 57 d1 d3 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | f2 b7 79 3e 57 d1 d3 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9cdf28 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.522696; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f52e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #382 | libevent_malloc: new ptr-libevent@0x7f49a4043bd8 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 16 77 24 95 78 a8 b2 1f fc 2b 7c 25 c5 f3 5e | 11 18 3b 97 2e 3a 27 66 e3 15 da 99 0d 93 f1 93 | 47 ee a6 98 73 b7 36 93 ee a2 a1 45 3f 5f 5a da | ae 28 8a db 9e 5d 0a c9 ab ee 52 ae 25 12 03 a9 | 5e de 75 5b ac e4 b2 66 87 f7 66 21 91 44 03 42 | 56 4f a8 5f 5a 33 1c cf 0d 59 3b 81 01 76 64 6d | 4f 56 e7 df 8b 6c 14 16 53 3c 62 65 dd 34 b7 28 | 1d e6 3f fc ed 71 99 12 04 9e 85 d1 74 64 7c 33 | 9f be bf d3 59 57 00 05 b3 5e c7 d6 1d ca 77 07 | 5b 2e 19 fe 66 9f d0 f4 4e fe a8 03 7e 6c 2c e4 | 62 5a b4 7b a9 62 f5 d8 8f 2a eb 21 2b 23 a8 f0 | e3 23 f8 fb 57 f9 f0 f5 15 c1 62 83 46 f7 2a 4e | 84 19 d1 51 96 2f b5 71 8c ca 35 1f 23 64 51 92 | 70 5e e3 11 28 e7 f8 72 a4 77 30 c0 b3 c6 a9 c0 | 0a 35 53 da 26 82 cb 82 95 6a 73 da a1 33 15 87 | 06 72 7e 68 0d ef 4b 81 ff 8c a6 2a 2a 24 ac f9 | 29 00 00 24 7d b7 78 20 92 2f 9d c1 11 df ec 0f | 26 51 9d bb 5e 82 48 3c 4f ad bd 2f 8e 99 d0 19 | 33 2d 60 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 8b b9 40 53 da ac a7 32 7b cf 2f | cf 66 3f e2 95 99 bb 2e 00 00 00 1c 00 00 40 05 | f4 d5 7c 53 2c 97 fa df 9d 65 ee 70 db e2 ff 4a | a4 4d 66 02 | libevent_free: release ptr-libevent@0x7f49b80470b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9cdf28 | #382 spent 0.211 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 6f 35 c9 09 5c 32 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 76 6f 35 c9 09 5c 32 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0915 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da59018 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.52306; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9cdf28 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #503 | libevent_malloc: new ptr-libevent@0x7f49b80470b8 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 14 89 7d 0e 1a 77 27 4f 10 9e e9 4b 83 61 5a | b3 2a 86 79 18 13 38 f0 86 b8 47 56 a1 08 31 d5 | 20 76 b3 89 e2 3a 1a 76 a7 6f 97 9d 1b 00 4c 18 | 1b 29 6d ed 7b f8 a5 d3 b8 1e fa fb a0 d2 5e 7a | 3c cd dd 7c af a8 ce 45 55 be 85 59 56 97 03 53 | 17 c4 a9 9e 84 74 57 8e 05 43 9f e2 1d 47 bb 20 | 57 f5 09 f4 af 41 b9 5e 08 0d 25 1b 00 29 78 8a | 3f b7 db 5e 59 88 f5 2c c9 ee d4 0a 2b f3 19 cd | 7b 21 17 57 36 9b 3a 5b c8 c7 ff f1 58 15 2d b6 | 40 6a de f2 e6 db b1 38 38 bf fd 78 d1 05 4a 16 | c2 d6 72 f9 14 69 c7 8f 3e 22 89 9d e7 29 9b 0c | 77 33 ac e0 75 5a 9a 1e 96 04 a3 9c 6a 4e 83 e4 | cd 00 29 9f f1 c3 4b 76 f4 66 54 d1 49 8b a7 e0 | 35 97 4c cc b5 3a ee d8 79 ff 0e bf dc 68 89 3b | bd fd 36 69 08 28 8a cf 6c 0c a5 5f 13 9b ef b2 | 3e 18 cb d3 49 52 aa 24 c7 08 e4 9f 37 e2 dd 9b | 29 00 00 24 6a df 41 aa 43 24 5d df 47 18 db 96 | 96 68 11 71 24 f8 80 c1 64 2d 2d 86 4d 7e 3d b4 | 53 6c a4 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab ce 33 b4 bd fc 20 c4 f2 44 85 c0 | b3 b3 b6 ff 76 34 ab 12 00 00 00 1c 00 00 40 05 | 93 50 3c f7 1f 1d 5c fa 64 d6 56 4e f8 67 8a 57 | 22 3f b9 17 | libevent_free: release ptr-libevent@0x7f49b80471b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da59018 | #503 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f4 80 43 38 b6 37 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | 0e f4 80 43 38 b6 37 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b4002b78 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 5 | retransmits: current time 10664.583384; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da59018 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #504 | libevent_malloc: new ptr-libevent@0x7f49b80471b8 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 88 79 a8 25 2f ac 63 78 12 ed aa d3 54 86 a1 | 4c b1 94 ab a6 9d f8 a3 5f 1a b0 54 4e 26 7c c2 | 4b 13 ab 43 05 f0 2d 2e f1 a4 81 93 36 6e 5b 37 | 62 6a c6 f6 3a 2a 7d 89 d0 78 21 2c 5d 8d 41 9d | 29 3e e4 2c 33 a0 8c f7 c9 a1 5b d5 92 4d 15 4b | 0d 75 3e 52 8f d7 8f 38 91 ac 49 cd 79 cd 6d 0b | 7d a3 33 1a c3 0c 97 9e f4 13 48 ce 40 8b 59 84 | e2 20 6e 4c 6b 4d 0c 4c 33 9d 0f 48 4b 50 7f 99 | 53 39 91 bf 39 2d 8d 16 c7 96 ab 10 ab 30 83 c9 | bb 58 e9 0b 5e 7c d9 78 7c 88 f7 75 35 74 eb 9b | 80 63 dd 3b d2 6a 2d 61 49 a7 71 0b 63 f3 10 51 | c6 c5 39 26 18 a0 9c 1d 11 80 a1 cb 20 b0 d2 43 | bb 30 73 36 ed 35 fd 75 42 33 e7 b7 26 c0 5b 1e | ab ca 0a ba 05 af 77 5f 7d eb 2b bb a3 ab f0 5b | 89 b7 bc 46 fd c1 b3 65 9f 92 e7 31 ac 4c 3c 8e | e4 57 20 aa 78 83 1c be 17 50 37 3f 51 96 b3 a3 | 29 00 00 24 0c da a4 86 c2 a1 85 08 e3 8c e5 ab | 08 04 21 15 d1 f6 91 33 1a 20 a6 e6 f3 c8 4d 4b | 86 e6 76 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 99 80 26 7e 80 26 83 7e e1 f2 65 | 5a 6f dd 9b e9 af 20 64 00 00 00 1c 00 00 40 05 | af 35 47 57 a1 c4 34 aa 2c 52 53 db 5e cb 43 e4 | b0 83 1b d1 | libevent_free: release ptr-libevent@0x7f49a0022a08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b4002b78 | #504 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 8a f2 6c ec e1 aa 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | 10 8a f2 6c ec e1 aa 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da4ef18 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.617674; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b4002b78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #383 | libevent_malloc: new ptr-libevent@0x7f49a0022a08 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca a5 af 3f e5 a2 55 cd 02 c8 2a 65 46 a6 18 db | 1a 78 a7 77 f4 60 9d 4b e0 01 46 14 bd 9c f3 fd | cd c3 41 fd 4d 0e fa cf f3 57 ca d9 0c 6b a3 bc | c8 d0 6a a3 c5 12 bd 0d 54 15 bd cb e8 69 8c e8 | 31 e1 84 02 9f 17 9d 19 5b 37 85 46 df 68 0f 9d | bf 74 a8 03 33 cb e0 a9 09 fa 23 c2 ad b1 4d a8 | d2 a0 82 0b 10 fb f7 f1 bb 57 1f c5 b0 3e fb 92 | 50 5b 9b 6e e6 d4 5c a5 6b fc 38 cd ac c6 e5 16 | c9 89 82 36 8b 60 98 17 39 39 c4 a3 d0 de 18 65 | 2c 0b 35 6d 8a 3b 40 96 d6 ab 3b 7e 84 6c f9 c5 | 00 7c 95 63 56 8d c5 a9 37 e4 9b 82 b9 c9 16 6c | cd ed a8 5d 89 94 f6 5a a2 a3 90 e3 7b 9e 64 a6 | 70 f7 19 5b 0b a9 f5 30 1a 47 b9 6e f1 f8 10 c6 | 53 a2 85 36 40 84 8b 9d 10 a9 0f 81 9a fd f2 dd | 8c cc 13 e1 3b 6e 1b 3a 75 57 62 b5 08 29 cf 93 | 99 45 b9 d0 70 37 b5 18 b7 42 e5 94 98 ec 94 e8 | 29 00 00 24 54 d1 71 f0 66 4b 1a 20 e7 6e 65 19 | 99 6b fc ca a5 fa 15 1a de ce 8f 49 14 2d 8b 58 | b3 f2 b9 d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 97 1b 06 03 e1 00 f0 af 53 f4 2b | 64 de c4 53 50 88 3d 69 00 00 00 1c 00 00 40 05 | e3 27 fc e5 2e 76 5b 15 63 e0 fc d7 2c b0 9a d6 | 09 6a c7 72 | libevent_free: release ptr-libevent@0x7f499c0065b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da4ef18 | #383 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 65 1f b1 8e 7a ed 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 01 65 1f b1 8e 7a ed 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0259 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f088 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.677994; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da4ef18 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #384 | libevent_malloc: new ptr-libevent@0x7f499c0065b8 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 ea 89 1a d2 c5 2c e9 cb 52 f1 81 ac da 7b 84 | aa 6a b0 2d 38 70 8b 5b b1 eb 40 d4 5f 1a 43 ae | 1c ec c6 34 23 68 48 d4 c3 97 4c b0 70 d6 88 29 | d4 8b f7 0a 73 9c ff b2 95 88 25 b2 f0 72 99 e0 | 8d 72 5c aa c5 63 66 50 d9 54 81 9c 5b 51 1d ba | a9 5c 18 5d 1c b8 20 95 5a 36 b1 3d 0e ba 1c e8 | 1d 2d f6 d8 50 68 c7 20 11 89 a2 45 ff fc f4 59 | ab f8 51 de 5a e3 5b 46 9d 77 cd 5b 73 9d b6 2c | 4f 3d ae c0 57 8f fc cd af cc 64 9c 88 fe a9 4d | f8 6b 24 e9 b0 14 02 a0 11 d6 3e 52 c2 81 15 8f | 2e 20 67 65 9f bb 1e 71 b7 ee 8e 03 ef ff f2 9e | cb d4 52 52 8c 70 4f bd 31 b9 b6 b5 53 67 03 6a | aa f8 d3 f9 06 c8 49 e4 86 22 0a e5 84 3e f7 ac | 6c 50 11 f9 6d 2d 9c bc 32 b5 92 9d 3b 93 2f d6 | ed 1c bb e8 2f c1 b6 a3 1a 9f 11 fd bb 1a ce 05 | 48 ad a5 90 91 7f 3e f4 f0 5c ae 38 34 ed d5 14 | 29 00 00 24 38 ef 00 0c 61 2d da ca 95 29 62 35 | 86 11 b0 2f 3e 07 37 a3 fe 7d bb ee 57 a6 c9 6e | 5f 36 ef 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 d2 a0 33 6f 43 fa 00 1a ca 0f 6c | e4 d1 32 4f 89 b2 0d f1 00 00 00 1c 00 00 40 05 | 08 1b 6b 79 8b 5d f4 05 e6 85 b6 36 ec 38 9b 88 | ad 66 5c 46 | libevent_free: release ptr-libevent@0x7f496c03e538 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f088 | #384 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 08 ab 9f fb 85 44 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 8f 08 ab 9f fb 85 44 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daf1568 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.745349; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003665 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f088 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #385 | libevent_malloc: new ptr-libevent@0x7f496c03e538 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 ab cd 3e 92 a6 bf 64 ad 96 cb a6 4a 90 0b 16 | 40 28 c5 4a e6 25 f6 99 f2 d8 3a a3 8a 65 09 21 | f1 35 69 26 20 9b 35 fe 6d c2 53 de 3f e2 d5 32 | 85 66 a7 4c 65 e3 07 71 1b 5d a8 64 f2 71 1a 29 | 72 8f 06 13 a1 02 64 92 fb ce 05 fc d7 f3 c9 d6 | 20 9d e7 a5 74 62 60 9d 8c d8 86 6e 62 08 74 a1 | a5 73 52 86 16 9e 19 0d 42 f3 d7 ad bd db f6 a2 | e7 f0 95 07 ba 50 b5 06 f8 1d 7b fb 12 9d c5 9a | 6e 3b 71 65 24 60 7c c1 63 cd 0a 5a 69 7e a0 86 | 7f 71 1c 41 25 67 3b e7 00 f7 bc ab 2a 30 10 76 | 3a 83 d5 db 53 47 3e fa f9 cc a0 3c 63 d4 6b 57 | 34 ed a1 8a 31 78 b3 a7 ec 73 30 2e 99 22 b7 f5 | 09 a3 11 f7 62 bb b0 10 dc 4a cd 1c 71 f9 97 b3 | 62 79 1b 18 f3 1a 30 62 7b e5 db 8d df af a8 b1 | 81 87 03 a6 d0 fc 15 62 28 4c af fc a4 9e a2 27 | 5d 64 be a1 3f 2f 49 b2 07 6e 8f c9 78 4e b6 4b | 29 00 00 24 c9 fb 55 0c e7 a2 e5 55 61 d1 d0 b3 | 19 68 1d 6a ea 8b 5a 33 a7 3c a3 88 0b 7c 36 5c | 8f c4 55 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 00 1e 8a 45 ae fb 2b 50 69 2d 2e | 32 70 ef 92 86 d3 9e 38 00 00 00 1c 00 00 40 05 | e6 71 d0 bc b6 01 19 1f b3 09 78 f2 61 06 7e 7d | d7 68 1b b6 | libevent_free: release ptr-libevent@0x7f49ac017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daf1568 | #385 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 cf f4 e5 ce 74 1a d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | 76 cf f4 e5 ce 74 1a d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db088 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.804845; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daf1568 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #386 | libevent_malloc: new ptr-libevent@0x7f49ac017b48 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 00 be 9b 56 c7 63 01 e7 4e 40 47 3e a2 7e 62 | 6a 6a 5a e8 7e d2 5b c6 23 09 45 3c 22 97 9b 35 | 0d ca 5c d1 44 8a 47 59 81 d7 6a f9 e6 c2 a6 38 | 5a a1 b8 22 b4 b4 44 5c 75 f1 6d d5 04 56 93 63 | b9 83 00 06 b8 ee 7e fc 6f 56 1b aa f3 9e d4 9f | f5 4c 94 97 ef fc 1f 5d 3a a7 0c ff 77 1e 7e 33 | 6d 25 fc 32 6f 4c 3b df b7 80 8d 1d a2 4b 4b e5 | a5 7c 41 62 47 87 52 b2 1b 62 90 8d 49 ea 91 83 | 76 37 f8 03 ac 67 5e 29 c0 72 fa e0 6a f3 a0 db | 8b 03 28 95 28 3c fc 8f 6f 83 f0 33 f8 3a 67 c1 | 07 4c 39 6e 3d 25 f0 c8 bd 6a c4 ce 07 40 fc 75 | 88 76 15 48 b9 0a d3 7a f2 ea 53 40 c4 6f 48 c0 | b3 a7 c2 2a 45 c1 8e 52 e1 6d fc da 08 db ca 64 | cc 0d 76 bb 7d 39 fb 63 db 28 ef e9 7c 6b 48 32 | 93 f7 39 56 b9 bf 1a 4c a3 a0 e0 02 84 e5 f6 8a | 9b 71 a0 1b 14 0b 45 27 d2 62 0f 4a c0 27 c4 8d | 29 00 00 24 2f 61 cd e1 db 3e 87 ef f4 2b 34 a1 | 5f b6 29 de 04 a2 2e 4f e6 a2 57 15 0e 4d 5a 42 | 58 73 8c da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 6b 1a a2 4f 19 1e 67 5c 00 6f ee | d9 38 af 5f 6e 43 6d be 00 00 00 1c 00 00 40 05 | 1b 47 ab b9 23 c4 4b 93 a8 3a b2 a2 7b 2e d9 0b | f7 f7 31 87 | libevent_free: release ptr-libevent@0x7f49b0017cf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db088 | #386 spent 0.508 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 27 c6 b6 9f 8a 51 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | e7 27 c6 b6 9f 8a 51 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.243 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa8c08 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.862899; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db088 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #387 | libevent_malloc: new ptr-libevent@0x7f49b0017cf8 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 6d 4f 54 78 6b e8 cd 66 af 79 ed c6 ac 31 60 | 73 63 fa 08 67 bc a8 e8 fb 23 9a 24 ef ea 0b 12 | 9f 48 56 76 bb 2b a6 32 b3 90 70 f9 27 da ce 4f | 68 aa 5f e0 03 77 f2 08 a1 2e d5 25 e1 52 cc 91 | 33 4e 54 11 0e fa 0c cc 54 cd 6e 4c e2 88 17 85 | ac 21 ca e4 c2 2d f3 83 96 eb 19 63 4b f7 9d 08 | 72 a6 e8 8d 27 87 dd fd b1 5f 1e 22 e6 cd 9b 5c | b8 b6 02 5b 0e b4 00 7c aa 9a 82 7a b7 05 f0 f7 | e6 9b c9 39 9f 75 d4 8f 80 85 03 88 ac 6e b9 f5 | 92 0d d9 53 cb 18 17 22 b0 98 ad 4e e8 6e b6 c6 | a0 1e 71 1f 0e 20 3a 51 1a 2e 91 1d b8 27 61 f3 | 63 1a 91 d5 c6 6e e1 2e d3 a1 7e 56 c1 c2 21 2f | 08 1a 70 ea 67 f3 ea ca ad 39 d4 07 31 a6 a2 d2 | 53 78 2b 9b 5f 8c 5b 69 4e b8 1d c7 48 ff a6 ef | d8 01 42 83 ec 22 ae bd ec 56 ba 7f 6e 94 af c6 | 62 92 b2 fd 0f b4 6f b0 6c 75 a1 37 15 2f 1e b1 | 29 00 00 24 af 30 46 08 68 1c ed e0 82 e1 74 56 | 6f 51 bf 1a 46 af 8d 48 8f 41 d0 9b 35 63 1a c1 | 05 09 92 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 09 43 e2 a0 b9 06 c7 32 ad bf 8e | 82 09 3b ef c6 ee a5 65 00 00 00 1c 00 00 40 05 | 93 6e aa 17 0c cd 27 a5 9a f7 21 26 c1 f3 ef 80 | ff c2 9c 91 | libevent_free: release ptr-libevent@0x7f498801d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa8c08 | #387 spent 0.422 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 a6 7e bc 33 e9 c3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 15 a6 7e bc 33 e9 c3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da13748 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.924851; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa8c08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #388 | libevent_malloc: new ptr-libevent@0x7f498801d3f8 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 8c e2 df 99 81 b3 49 7d bb 8d 1b 85 5f c4 55 | bf 6d 21 60 e6 bd 9c d3 5b 63 0d 88 fc 3a 58 b4 | 2d 9e 8a c8 7f e0 e9 3a 11 ea 75 15 94 c3 16 ee | a9 37 35 10 8d 6e 6b d1 37 9c f8 67 7b e3 5a 6e | fe e2 4e 84 6b c0 42 21 fa 6b 1d 42 2b e1 08 5a | c4 88 31 56 2d 54 80 9a 8e a2 a5 5f b8 4e ed 24 | 40 d5 f0 0b 7f b5 ab 01 eb 1a 82 b1 d9 f9 e4 d6 | de b7 ec 07 13 7a 42 3f 43 e1 aa 1c 6d 7d 03 ea | 28 6b 6e 62 96 69 6a f5 9b 98 bb f4 98 71 a0 69 | 34 58 fa 05 f9 57 a5 81 78 00 e5 38 5f 7d 43 b7 | d9 6f 3a 64 b2 ed 86 b2 76 88 2d 1d 17 fa 23 86 | 03 68 21 f0 d9 43 57 db bc 43 d6 18 43 bc 3a 40 | 1e 6b 8f 4f 19 56 34 4d 84 ae 0e be 30 43 84 d9 | c7 71 5e 86 06 d9 21 bf 25 96 11 9f b9 b4 09 a5 | af fd 3c 39 87 b2 05 90 1b cb 4d af e1 80 b3 53 | 8e 9f 27 8c 81 9c 73 00 9d 6c 5e e2 d4 4e a1 5d | 29 00 00 24 80 b7 55 b6 0e f6 5d ef 89 37 b8 60 | bc ae ff e0 44 e7 fe 55 bc 9e 9b 31 0b db d3 75 | b9 b8 d7 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 fc 53 b1 ed 8b a3 f6 f9 62 eb d1 | 29 71 07 29 24 ef aa f9 00 00 00 1c 00 00 40 05 | ae f3 7a 8f 88 13 77 d0 9c fa 9d 76 41 3e 91 88 | 27 8b 12 3a | libevent_free: release ptr-libevent@0x7f496c022cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da13748 | #388 spent 0.434 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 bc 1e cb 35 eb f2 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | 74 bc 1e cb 35 eb f2 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da88d78 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10664.986653; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da13748 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #389 | libevent_malloc: new ptr-libevent@0x7f496c022cc8 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 57 f2 30 fb 5a 40 f5 59 39 dd 26 33 2e 5f 37 | 84 3d c0 5e 49 b9 15 23 c0 44 ad 26 ff 10 98 1b | 6f bf 6a b2 9d 3c d5 54 f1 ee c6 24 28 9f 8b 8a | 16 29 98 07 3f b5 6c 9e 54 8f 45 0d 0c 1f e2 90 | b3 55 75 ff be 9f 6a ff 12 1a a1 30 42 71 95 5a | ee c7 63 ad a6 6d 53 5e 76 4f 98 a0 f8 d2 ad 26 | 13 01 c6 ab 59 a5 48 fe 1b 98 49 88 f1 f9 6e 6b | 6f 19 ef f7 3e 77 f5 1e 46 39 92 8b 45 53 9c dc | 12 e7 ee 75 8f 03 49 aa b2 f3 e8 55 fe ab 93 d1 | 3e 48 39 b6 92 d8 6f 25 88 00 ce 93 59 41 97 bd | 54 46 71 7c 49 35 1c 21 fc 3d b0 ae dd e9 d5 d2 | 41 60 3e 62 54 40 fe dc f2 f5 ba 1a c9 6f cc f2 | 2d 6f 12 64 5b f5 75 bb 73 89 f7 b5 0a 71 e2 5d | 27 4e f9 ff 98 b8 5d e1 1d e4 f7 96 ac 97 7d 9f | 72 d1 dc 39 18 11 ef 01 99 db 50 8f 31 69 2f 74 | df 2b 1b 2f 4e 21 2f 5a 83 e4 a6 0a 0c 89 42 df | 29 00 00 24 3c bf 38 a6 98 ef 26 6a d0 07 6e 0d | 93 99 84 46 f5 53 ce 33 8c a7 01 a5 6b 67 ae 13 | af 7b e7 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7a 6b 5c c4 2e 65 61 ed 6f c1 9a | bd 8b 1a 03 2b c9 b7 5c 00 00 00 1c 00 00 40 05 | dc 5f 51 f4 a0 b6 08 06 ee 79 08 58 c0 8f 1b b8 | 6d f0 f1 bf | libevent_free: release ptr-libevent@0x7f4984033488 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da88d78 | #389 spent 0.219 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 89 be 22 84 d1 d1 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | a8 89 be 22 84 d1 d1 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a9cb8 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.070156; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da88d78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #390 | libevent_malloc: new ptr-libevent@0x7f4984033488 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 4a 9c ba 81 9b 59 b5 f3 5a 3b eb e9 25 2f d1 | 6c a0 0f 17 ab cc b6 1d 05 83 cd f4 86 ee 31 82 | e3 0e aa c2 f4 3d 7e 5f bf 37 b5 7d de 49 ce bb | 6c 5e 7c d8 5c fc 48 d6 c6 66 ec 9f 67 4e 26 a3 | a0 b6 ae cd 5e a6 fd f4 9e 02 51 82 74 95 83 2e | 94 18 63 27 32 98 eb 76 d3 e7 32 bf a4 43 cd f5 | 09 ad 04 e1 c5 66 aa df 78 7a 07 e2 ad 65 35 f0 | 77 5e e2 2e 4f a8 c5 3e 53 0a df 6e 72 4d 67 e2 | 4d a4 c0 de 62 a7 3d fa 34 54 9c 59 93 03 8c 7f | 0f 57 89 15 36 92 3d b2 7f 6a d3 41 62 49 fb f7 | dc 06 da 0f 75 ed 9e 27 cc b5 ce da cf 40 51 b1 | e2 bf 2e 71 60 07 05 8f 89 15 ef 79 f8 00 67 28 | 59 00 a5 99 12 c3 38 94 08 2b e1 b3 a7 9f ba 50 | b5 13 bf 69 21 56 72 da 42 c9 ce d2 f2 a0 1e 46 | 2f 44 90 22 26 ab f5 aa 52 ae 5d 4e 88 cf a3 13 | 52 f5 2b fe 42 63 1e 3b f8 d4 d6 25 96 5c a2 0e | 29 00 00 24 e7 04 30 e4 1a c4 0f 3e 14 95 31 ac | 5b 98 80 c2 18 8d 07 e9 77 46 79 cb 6d 3b c8 32 | 12 98 de ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 44 64 a1 46 96 c1 48 f2 cc db a6 | 2a c8 f2 18 af c8 9e 40 00 00 00 1c 00 00 40 05 | 2e 0f 0e 1b e5 ad f1 77 37 20 16 cc b7 25 35 24 | 62 fc 07 fd | libevent_free: release ptr-libevent@0x7f49bc030908 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | #390 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 91 6a 31 61 8c d9 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | 49 91 6a 31 61 8c d9 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49980058b8 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.138463; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a9cb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #391 | libevent_malloc: new ptr-libevent@0x7f49bc030908 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 63 97 82 dc fe 12 1c 45 a8 c3 75 bc 5a 7a 0c | d2 69 9f 92 08 88 aa e5 d6 ba 2f 5f a8 d5 d6 43 | 2c a6 7b 3b 24 fa 91 5b ef 83 45 43 8a d1 75 ec | f0 a0 44 b0 f6 92 df 55 86 93 b7 95 32 69 09 0a | aa d0 1c 36 d1 70 9f ac 08 06 ed 33 2a 14 4a 65 | 2d 33 dc a8 90 e2 ef 8f 27 55 03 06 83 2d 25 f6 | 9f 83 53 d0 d8 73 da 62 30 f7 f8 ca 6b e0 c0 67 | 72 50 01 ac e8 01 81 f3 93 92 64 bc 1e 29 b5 80 | c2 aa 9b 8a 6c 41 79 fd fa 4b bd 43 c9 47 55 f0 | ce 05 d4 d9 da 78 e4 36 d7 7d 00 85 c4 9c eb 2d | 2f e2 c0 8f cc 34 67 16 1d e1 81 6f 63 b6 2f 54 | fa bd ef ee ac aa b2 89 d4 8e d0 8a fd 87 3f 98 | 14 9f e2 93 9c 4e 92 eb de 17 0f 68 fd 68 cf b3 | 93 ce 00 65 31 b9 77 6f f8 91 1e fd b0 85 dd 9a | 51 57 a3 b6 9c 1b 4c 4f 89 39 05 a7 34 6f 32 68 | ce a0 ed 64 92 fc 79 eb 57 ca 94 77 ae 27 a6 a6 | 29 00 00 24 b3 57 cf 04 e6 60 51 2b 57 b8 ea 80 | 2e f4 d2 68 be 67 68 85 e9 b4 48 5a c8 d5 6e c3 | d2 0c 51 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 bd c6 8a 9c 5d 4a 3a 89 f7 cc e1 | 96 53 12 ca d4 d6 fc 65 00 00 00 1c 00 00 40 05 | a5 80 e1 c5 13 1d 63 14 43 bb 34 f4 db 46 bb ed | ef de 41 fa | libevent_free: release ptr-libevent@0x7f499c0122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49980058b8 | #391 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 94 1c 13 50 26 09 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | f1 94 1c 13 50 26 09 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da066c8 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.200853; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49980058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #392 | libevent_malloc: new ptr-libevent@0x7f499c0122d8 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 09 d5 51 ea 26 83 d8 f5 76 77 64 9a fa 5a 4e | d1 91 b4 e2 30 db 9f 82 9c 07 d3 e6 b7 6d bb 97 | 82 63 f4 b5 68 33 5c 7b 74 8e 3c 69 c7 c8 1c c5 | 93 6c d6 d8 fa 27 89 b8 01 5e 45 ce ed 64 3b b3 | 8c 39 3b 01 26 98 44 7b 9a 7c e0 64 5a 80 1d 52 | b8 9d e6 d0 68 06 be 61 eb 44 3c b1 11 68 6b 3e | 8b a4 e0 55 06 90 81 c2 95 35 a4 cd 95 c0 95 fc | f9 93 e7 30 a3 e9 75 18 d2 fd 6c 69 a5 86 cb 18 | a7 05 83 e3 51 13 6a c8 28 18 8c 1f a5 b7 27 f5 | 44 35 5d ae ac 1c e7 ae 34 ff d1 90 c2 f6 4b 04 | 96 ed 4d 35 1e 4d 83 7b 28 66 36 90 59 f7 6b b6 | 0e b4 61 36 2e d5 cd e0 2f 52 c9 29 f2 d8 17 b5 | dc 4e 0d e4 b1 9a d0 7d 52 51 85 cd 33 a0 60 cf | 42 cf 06 56 f8 3a 8b db 79 f6 af 4a 89 f4 52 7c | a6 25 ad be 59 66 80 4c 13 9d 14 b5 c6 e8 b5 c7 | 94 ba 5f 3a ad 56 0c 1b 67 33 d2 f8 44 6e 56 91 | 29 00 00 24 85 97 d7 ab 9c 27 40 08 3b b6 d4 ce | f5 eb fe bf 2a 6c 5b a6 f3 00 e5 c0 59 72 51 03 | 1e 2e c9 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 3b d0 7d 31 66 f3 86 06 04 28 1f | dc 2d ed 45 a2 a4 ea df 00 00 00 1c 00 00 40 05 | b2 0f b0 9f c2 25 4e 81 79 3d 98 6e 92 36 92 21 | 68 bb e3 9f | libevent_free: release ptr-libevent@0x7f49ac0284e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da066c8 | #392 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 54 4a 66 bc 5e e5 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 21 54 4a 66 bc 5e e5 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da82fe8 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.27315; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da066c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #393 | libevent_malloc: new ptr-libevent@0x7f49ac0284e8 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 61 36 d2 af 90 99 13 33 f7 08 11 88 38 ab e3 | 1e ec 06 ff 77 86 93 93 83 84 8b 66 e0 dd 76 96 | f9 f3 ab 1d 58 2a 32 91 24 54 3a c9 b1 94 95 48 | 86 32 f1 03 61 fc 0d e0 0c f6 d2 a5 6d 0d 43 73 | b8 8f 64 c9 5e bd df ba ee 7a db e7 36 c7 9b 22 | 6a c9 91 d7 a6 cc 94 1c c8 b7 7b 4a f2 e0 12 b0 | 17 38 38 81 56 6e d8 2d 58 95 ff de 5e e7 78 cc | f8 c9 59 71 7e 9b ef e6 f3 6a e0 10 ff 95 25 7c | 6a a5 2d 86 c9 a5 d6 ce 9a 4d 72 73 55 ba 0a d8 | bc e1 1a e4 5a b8 7c d3 b2 58 39 6e c8 37 c5 73 | 05 61 79 84 d8 a8 54 35 e9 99 fd 11 bb 13 fd a6 | 99 d1 45 42 fb 8f 7a 5c 64 7b 65 7d bf 04 f5 8d | 64 cf ce 2d 93 51 c7 da b6 69 d5 8e 87 cd e4 a4 | dc 5c e2 8d 83 59 93 39 cb b5 56 fb 0b 93 a3 c8 | 68 bc 78 72 10 14 8f 2d 5a fe 7d ec 8b d0 1e d8 | 94 06 ec b6 1e 51 d8 cf b2 4a 07 14 b7 0f dc 35 | 29 00 00 24 9e b8 09 de f7 cf 9e b6 02 68 18 4c | 66 7c 68 13 a6 f6 4a 17 f3 5f f3 b5 e9 0b 8b 70 | b3 ff b4 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de d0 8f 1e 1b 49 1f 8b 84 ef 76 ee | 58 32 6b da e3 77 d1 8a 00 00 00 1c 00 00 40 05 | cf a4 49 8c 20 38 10 91 85 10 0a 74 42 c9 ca d0 | 4e 5f 9d 71 | libevent_free: release ptr-libevent@0x7f497403e5d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da82fe8 | #393 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 69 e4 32 5e 68 bd 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | 71 69 e4 32 5e 68 bd 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabba08 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.339517; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005411 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da82fe8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #394 | libevent_malloc: new ptr-libevent@0x7f497403e5d8 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 f8 5d 2a bf 75 ca f6 80 b6 dd 0a a6 96 8e 43 | 30 a8 51 98 d9 7a 4b 16 19 b1 ed 2e 2f f2 a2 a4 | b8 f5 63 74 4c dd 0c 44 7a 0f 72 9a 89 02 ed d8 | f2 94 84 8e 35 02 4a 45 ee 43 08 12 5f 84 94 e0 | 4a 2d 11 5e 72 ae ef 77 18 4b 9f 63 84 5a 17 62 | da c8 65 b5 ec 9a e1 a6 26 c9 08 da d9 86 f4 a5 | cc 77 49 9a b8 f7 be 90 a5 cf 7f 31 a0 9b e9 60 | f5 7c 01 59 b9 b4 ba c2 69 21 41 89 75 c6 25 c7 | 7a 5a 64 16 f7 64 86 53 6b 89 f3 e5 49 5b af 55 | 5c ae e9 d5 b0 4f 12 71 bb 97 96 35 83 80 17 20 | 47 bf a9 ec b3 53 e3 7a e5 0d 70 71 5a 52 26 9e | 8b 2c 6a ea bb d8 c6 9f 15 ea 97 86 e2 cc 1a 05 | 33 4c 2e d8 d7 91 a2 97 f8 de 8f 7e d9 8e 9d 90 | b2 66 6b 4f c1 c4 35 fe f0 03 be 93 90 ff 3c 3c | 03 91 62 15 0c 2e 60 b8 80 e0 6d 1b ff e8 07 75 | bf cc 04 31 80 fd 05 f7 36 27 15 71 65 ea 98 e8 | 29 00 00 24 a2 a9 bb 07 96 b3 f9 28 0e 59 22 54 | d5 cb b6 14 a0 3c 3d 8f 8d 94 97 b1 5f 5a 7b 13 | 17 23 6f be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 cb 76 df a4 a8 15 02 74 e0 73 32 | b6 94 52 02 fb 61 9c c7 00 00 00 1c 00 00 40 05 | c2 a8 bd a0 58 63 79 22 01 e8 d8 cb 81 c5 fd 97 | 17 09 2c f5 | libevent_free: release ptr-libevent@0x7f49b8003978 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabba08 | #394 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 28 fb 94 96 2c a4 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | fe 28 fb 94 96 2c a4 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ff3b8 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.394796; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabba08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #395 | libevent_malloc: new ptr-libevent@0x7f49b8003978 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 69 86 34 6a 27 b0 fe fa 55 01 d0 70 ad ca 92 | 26 3c f9 0c b3 49 18 84 43 97 28 d8 ec 68 7e 95 | 72 ab 70 14 07 e3 2c a6 73 e7 16 42 56 09 bb 9b | 16 d6 59 7e 03 6e 8e 64 e9 98 c5 f9 d6 01 03 c0 | 7e ac fd 49 31 83 d2 7b ab ab 39 76 77 1b 38 75 | 9d fb f3 90 0f 6f a2 e6 a0 bd 98 b2 9b 84 a7 67 | 7d 2c f5 01 d1 15 ac 96 1b 7d b8 68 2e 39 f5 d9 | 6f 7a 55 b6 2f 22 2c 03 37 8f 57 91 9f 41 9e 3f | a4 b8 03 de 24 e9 cf 3a 8e 44 22 3b b7 ae 86 42 | ce 96 2a bc e7 3e e3 8e 67 6c b9 c2 ac d2 e0 7e | d5 3a 05 1a 4a a9 a9 50 e8 f0 8e 0a e9 86 11 54 | 99 73 65 0f ec 59 55 c3 f0 46 bb 24 66 6d e7 ab | 16 55 ec 37 c3 56 b1 fc 9b 7e 99 a9 78 04 75 0f | fb 7b 4e 8d 40 62 a8 9b b3 fc 1e e8 5a 98 7a 2f | 05 00 c6 2c 7d 3c 47 0f fb a7 cd cf 1e 64 a3 c2 | 49 c0 65 bf be 51 36 f1 f4 85 b3 08 1a 02 2c 7b | 29 00 00 24 f8 d3 1a 26 56 57 5a 08 00 e0 ee b6 | 3d 13 b3 20 dd 56 da 98 d1 06 e4 ba 58 3e 79 be | 34 18 84 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 71 1d 53 7f c9 61 4b 21 2c f4 df | 2f 3e 1f 57 4d 53 5e 6e 00 00 00 1c 00 00 40 05 | da ab 6b e8 00 c7 7d c8 30 13 b7 95 05 c5 95 9e | 1c 16 c4 19 | libevent_free: release ptr-libevent@0x7f496c03e738 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | #395 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 9a 3c 9d 66 ab 1b 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | 27 9a 3c 9d 66 ab 1b 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da51d68 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.455241; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ff3b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #396 | libevent_malloc: new ptr-libevent@0x7f496c03e738 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 f0 6d 19 14 53 76 d7 34 77 41 7f 48 34 bb f9 | 46 2c 50 4d f0 17 94 2f 48 9b 24 68 5f 9f af a8 | 5c f9 e9 75 01 ac a1 98 ca d2 77 aa 0d c0 39 4f | 47 4d a0 4d b0 57 c6 d1 63 60 7c 64 d4 44 72 f2 | 25 0d b1 74 a8 ab 95 27 b4 45 73 20 2c c1 8d 99 | bf e1 87 d6 01 14 cd 8b 7a 0c 6e f1 30 62 e9 3a | d2 3b 82 50 69 e3 b9 a3 6d 41 bd 59 8f 49 e8 20 | 81 02 ca 38 78 ba 8d 6b 1c de 6f fe 5a 11 9a 3e | fb bd 0e 14 4f 32 91 22 57 f6 80 28 e4 69 3b 24 | 00 c3 f7 28 e6 ee 40 b6 44 e2 28 5d 21 c9 08 64 | 4a 9b 0d 36 3c 49 74 20 bd f9 74 7d b1 13 8f 67 | 98 cb c6 19 4b fc 96 42 d5 ab 14 4f 5e 8e a4 27 | 4d 1c 19 26 15 5f 8e 43 a8 80 a1 31 94 6c 71 6d | ef 64 58 3e 27 25 43 f3 27 38 76 09 98 7b 39 9f | 08 a0 6f e2 42 61 16 aa 57 a9 d5 77 3d 45 05 b8 | 69 f9 bc 28 04 ff b5 ab 99 99 92 24 0c 6b 10 7f | 29 00 00 24 70 dc c8 d2 7c 08 4e 71 91 34 64 e2 | 7d ef b2 24 65 6c 64 f1 e9 42 4c ee eb 2f 82 20 | 52 fd e5 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 11 c5 62 1c 28 ca bd d6 8a 41 12 | 88 67 0d 41 82 0d 24 8a 00 00 00 1c 00 00 40 05 | 8b c3 1c ef d7 02 c4 38 73 99 5b 97 74 6d f6 cb | 48 fe 25 49 | libevent_free: release ptr-libevent@0x7f497c0121d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da51d68 | #396 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 8e f7 aa c9 55 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 70 a3 8e f7 aa c9 55 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7eb68 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.519618; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da51d68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #397 | libevent_malloc: new ptr-libevent@0x7f497c0121d8 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 18 b3 8c 90 5c 9a 49 be e4 6e c6 16 8f 37 1e | 9f a9 12 76 57 55 0a 6e df 16 8f 99 61 04 7c cb | ce 6a 7e 8f 24 e0 f2 0c 68 37 64 2f c1 23 5c 49 | 14 a3 80 06 ca 1b a1 0a 67 ef f8 e6 87 87 2d 78 | 81 39 98 50 58 cb 4e 21 3c aa a7 1b 32 77 41 9f | 35 c9 60 1f 23 9e 9e b6 65 9a 65 12 14 18 9f e5 | f3 42 40 b2 62 6e dc 51 a1 bf b9 c3 d8 12 92 f1 | 39 56 de c5 ea 92 12 d6 95 0e fa 95 e0 c8 85 56 | a7 7d 65 a1 87 5f ef 8f 78 54 15 a2 34 ea b7 d5 | e6 17 35 39 b8 7a 4c 12 c5 a9 9a c4 35 3e c9 2a | 7a f8 2b 78 65 9f 6b 97 4d 76 7d 8c e4 c3 d5 54 | 33 27 f2 d6 43 46 d3 8a 37 00 19 1a 6d e2 0d 31 | 04 d0 23 ba 96 60 b1 25 b1 8a 9e d4 24 7b d8 ef | 6c ea 79 1b f7 04 97 a5 c9 5a c0 40 b4 8f 2d 40 | e6 da 03 30 9f 2f f1 e6 2c 3e 4a 45 7d 1a 8a 8d | a4 b7 59 c6 fb 73 7d c2 26 b1 a9 27 04 3e 99 51 | 29 00 00 24 58 c4 6e 5a e4 cb 60 37 ea 87 dd 2f | e6 2d fc 6d 95 f1 50 5c e8 e5 7d de e4 ea 0b 82 | 39 86 54 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac 59 70 8b 95 ae 1f 6e 27 51 3c d4 | 42 31 ee 7f 2d ca 25 a4 00 00 00 1c 00 00 40 05 | dc 5f 90 36 46 58 fb db ce 17 d8 51 da 33 1c 46 | 6d 15 e8 78 | libevent_free: release ptr-libevent@0x7f499c02de48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7eb68 | #397 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f 62 56 80 20 f0 47 b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | 2f 62 56 80 20 f0 47 b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0745 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2de8 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.578121; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7eb68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #398 | libevent_malloc: new ptr-libevent@0x7f499c02de48 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 3a 65 12 b7 e5 c4 99 b5 34 47 20 c9 81 18 a7 | 2f 1a 55 8d ce 1a a3 35 37 d1 11 1a 91 71 be 8c | c8 64 b4 e6 06 a8 e7 14 06 25 9b 3d cf 0f 81 95 | 8e ff ef 73 f9 47 a6 90 1d 4c 6b e2 c5 81 84 8d | 96 05 40 a6 b6 64 14 ff 4b cc e9 f8 3f 5c 19 03 | 9d 83 68 d4 d4 6e fc c9 5c 66 25 fb f0 45 27 99 | cd 08 73 48 42 fe c1 d6 65 64 5f 7b 88 e0 de 98 | 23 2e 2b 48 2c 0d aa 6c 85 8c fa 34 fe ee 2e a1 | e4 f0 c7 45 69 19 fe 22 8d ea 36 5d 75 69 05 cf | 97 54 c9 80 c4 60 4a 91 da 96 f6 4f 09 3a 0b 27 | ac c8 d7 a3 31 23 48 b6 ea 2c c6 32 34 50 66 ff | c8 27 0a 67 42 20 fa b9 70 24 1d a8 44 34 f9 28 | 6b 76 78 34 54 2a c1 8a 02 45 01 70 62 0d 44 4a | d4 0c c4 ce 6d ff c6 c6 df 3b 39 25 d5 a2 89 47 | 4c 9f 6d 3a 84 2e 4a a0 a8 03 ac 10 71 7b 94 0d | f1 34 9e 2a 98 96 d0 5c 0b 23 17 80 0b ae 37 3c | 29 00 00 24 ae 90 66 59 db 15 87 77 e4 f7 88 94 | 64 07 a3 a1 8b 1a 57 e5 af 7d d0 99 f0 68 47 bd | a6 a4 c3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 6d 22 5d f8 cd ef 94 02 45 ff cb | 2f 88 88 a5 e2 e3 71 1b 00 00 00 1c 00 00 40 05 | 6d 44 cb 63 e0 7c 83 b6 21 1b fb ef 5f e6 4c 7c | e1 87 6b 4a | libevent_free: release ptr-libevent@0x7f49b4014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2de8 | #398 spent 0.433 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 80 d4 92 bb 7c 54 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | 38 80 d4 92 bb 7c 54 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da108b8 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.637029; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2de8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #399 | libevent_malloc: new ptr-libevent@0x7f49b4014f58 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 1a a9 7d ee 64 33 c2 b5 0a dd 76 62 13 63 6e | da f3 0b 02 2a 11 f3 10 74 31 74 0e 81 74 d4 bf | 96 5a 0e 55 b1 f5 7b 6e c0 92 ad 14 66 45 ea 35 | a5 42 fc 45 c1 9b 92 de 66 c1 69 9a f0 6f d9 e6 | cc fb e2 52 b9 d1 56 42 9f c2 1a 06 dc 76 90 e2 | 1b 20 28 73 03 b7 a3 c6 b2 f9 69 6a a8 eb c8 36 | 71 2b cb 0b 99 a7 d5 50 39 96 47 12 db b6 b2 fb | 80 29 7d 5c bf 98 0a db 97 e7 94 63 39 e1 7f 63 | a3 df 37 e5 8a d9 0e 75 0a 7a 08 7d c1 f7 ed 8d | 2e 99 ee 3c 81 ae fb 7c 88 77 84 1f b8 d8 9a 8d | b1 fd 7d 89 9b 60 bf 2a 0d a4 24 f8 85 07 f1 23 | 19 8b 30 9d f8 0e bc 9e 55 f7 5a b2 84 28 33 a5 | be 21 86 54 0c e6 40 92 90 03 44 79 50 94 53 67 | 20 59 49 9b 9d 0b 6f e3 ba 89 02 fc cc c6 a1 fc | 4c eb ae dd d1 f4 97 59 16 8e ee 43 04 8f 8b f0 | b2 d9 7d 97 db 0a 69 62 2a 6e 00 d5 b3 77 42 45 | 29 00 00 24 3a 4d 23 27 76 af 48 4b 84 00 20 aa | ca 71 91 38 e4 07 4e f7 45 86 55 f8 e0 96 19 41 | 82 46 c4 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 f2 dc 8f 48 f3 80 9e 6c a2 69 62 | be 82 61 ec e5 67 43 37 00 00 00 1c 00 00 40 05 | 20 28 3b 49 d8 17 ef e8 28 4a c9 d5 f1 19 f8 cd | 11 41 f4 f3 | libevent_free: release ptr-libevent@0x7f49b0038ca8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da108b8 | #399 spent 0.43 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d b8 e7 8c 67 3f fe 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9d b8 e7 8c 67 3f fe 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49b00058b8 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.708954; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007234 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da108b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #400 | libevent_malloc: new ptr-libevent@0x7f49b0038ca8 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cf 78 18 74 e4 df 88 f6 a9 f6 01 ea 32 2a 3e 5a | 4f bd a6 d5 f8 66 91 a9 ef 02 cc 06 df 5c 28 29 | 46 f3 1d 0d fd 19 8d 70 56 f8 4d 8b 75 e2 31 01 | 6a d4 a4 d2 87 64 ec ce 9e 47 82 c4 2f 54 45 20 | 8c 34 5c 40 ea d0 c7 52 a5 61 60 07 7d 08 1a 89 | d4 de 40 d7 0d ef 85 3c 96 38 ad 9b f6 4b 6c 17 | da bd 41 63 54 dd 1c ad a1 fe f8 2b 40 b8 9a 4d | 27 3a ca b8 6b 97 3d 58 99 08 e0 3a 92 bc 21 c5 | d4 78 4a b8 60 ea 16 83 7a ed 9e b2 b2 c5 a8 1e | 2e 71 4f 89 ea 07 08 07 a0 6b 0b 3d b5 e4 d1 30 | 78 97 70 e7 a0 45 ac f2 63 02 cc 53 39 3e 61 a2 | 12 a7 4c 48 b7 f3 36 0d 0d 27 b2 53 71 52 38 c5 | 96 48 1e 14 f6 be f0 cb 28 2b 0a e6 11 5b a5 17 | d3 7a 2a 88 e1 b8 11 f1 6b c9 d1 20 4c 0a f1 4e | 7f 3a 0c de 61 05 3c 1d 7b eb 02 e2 44 31 72 a7 | bf 67 02 9f bd 71 4c 5c 5d d0 12 4d 27 33 97 7d | 29 00 00 24 bb 0f 35 94 b7 d6 cc b8 46 ba 2a 71 | 2d 96 8b 39 bc ab 9d cc 40 3b ee 5c 0a 6c d6 f1 | 5f 67 ab dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 f6 dd 28 b7 e5 25 24 5b 8d 76 e8 | c5 01 b8 29 57 e3 ad 0f 00 00 00 1c 00 00 40 05 | 60 02 79 f9 6d e1 4f 47 e6 e4 9e ec 7c de 29 53 | a1 dd 12 ee | libevent_free: release ptr-libevent@0x7f496c028638 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49b00058b8 | #400 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 1c b7 b7 ad 1a c0 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | b7 1c b7 b7 ad 1a c0 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dade7a8 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.778276; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49b00058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #401 | libevent_malloc: new ptr-libevent@0x7f496c028638 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 d2 72 06 ae 22 1e 22 ab b4 1b 44 5f fc a8 c1 | f8 f4 78 91 8f 75 e5 03 ff b8 82 66 79 d5 ef a4 | b9 bc 5f 7a 97 e7 d1 27 07 f4 c0 84 59 c8 60 49 | 94 f7 9c 00 66 60 13 0c b0 86 90 d3 b8 da 78 d8 | 4e 2b 68 57 06 f1 3d 1d 68 59 e1 58 74 d7 52 ac | 99 67 5a 93 34 b1 93 52 48 8f be ff b5 9c 85 56 | 2e 96 87 89 2e 92 97 0c 52 6c f5 39 94 5e 4c 43 | 86 f6 3d 3f bd 1e cf 0a 53 72 d0 bc 4c 28 f2 f2 | c0 2d 66 95 af 0b 05 f3 fe fb 97 9b be 85 a3 12 | 03 55 46 42 f2 39 d7 6d e9 6f 97 42 f2 b8 26 f2 | d7 c4 41 98 68 75 30 27 d4 ea 01 6f e3 6f 66 73 | 93 1d ea 44 25 47 78 00 06 da 2e bd 8b 0e 54 ae | dd 4f b4 d4 ef 2b c2 f6 27 68 9a b8 a0 60 19 ba | b4 87 4b cb 4f 56 1a 8c d5 1c e3 10 55 f4 32 19 | d0 15 a8 0a 68 44 85 12 37 c1 31 74 cc 94 62 8d | 3d 1a 0e 3f 30 ae 4f e1 82 f7 6a 31 c5 a7 ad f1 | 29 00 00 24 7b ac b1 64 a9 8e c6 b7 30 58 bd 6c | 45 c4 47 3e 65 2c 91 4c 18 05 0e 10 c5 db d4 d3 | 59 ff aa 05 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 d4 10 98 6e 35 80 5a 2b ad 28 c4 | 07 1d fa 9c 82 90 1d e7 00 00 00 1c 00 00 40 05 | c6 d8 73 26 26 67 ec 49 09 59 49 be 96 d8 6d ce | b0 e2 f8 ea | libevent_free: release ptr-libevent@0x7f49840066b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dade7a8 | #401 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 2f d6 40 d4 5f 67 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 57 2f d6 40 d4 5f 67 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8328 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.834579; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dade7a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #402 | libevent_malloc: new ptr-libevent@0x7f49840066b8 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e e3 6c 28 e0 dc 02 ef 1c 3f e3 6c c1 76 65 0c | 3e a6 84 03 2d 29 5a 27 0b c4 c4 e9 fc ff 19 bc | 74 02 32 2e 1a e7 83 01 72 39 f8 05 32 89 b0 44 | 86 a7 c7 82 e4 5c 5f 0d 89 51 42 27 b1 a2 3a e5 | 89 30 6a c3 4d a8 65 80 76 64 06 7d 9d 6f c0 e9 | 84 57 7f 5f be 28 56 97 b3 16 bb 37 52 de 80 80 | eb 8f 24 cc 4a 98 c4 6c 3d 53 c2 e1 1a 3c 95 57 | 12 4f 7a e2 93 67 0f b5 e8 05 3b 8c f4 2e 08 6a | b9 2f 93 8a 12 88 ad 92 bf 59 5c 86 1a 0b 04 43 | b9 2e fa 23 8f 1c 7c e1 73 6b 67 2f b3 d0 96 10 | 9c 3c ce b0 b8 1c 65 b1 ad 49 99 7d 6e e9 37 9e | 7a 4d 17 ba f5 6d f6 3d f1 40 3d 1c bf 5c d4 bf | 85 18 d1 10 f5 7e 9a 87 63 4e d4 3c 63 64 d1 b3 | 17 e9 9f c2 26 5c 13 09 28 33 b5 19 79 c9 e9 d3 | e7 f2 08 6b f8 54 b8 fa c4 94 e2 97 a9 43 d5 74 | f1 66 7d 69 8d 67 9d dc 9b 8a dc e1 21 57 72 a6 | 29 00 00 24 e8 45 11 b0 91 e8 6e b8 fa 51 65 83 | 8e 94 0c 3f 17 03 c4 78 09 6c 3a ea f1 00 17 08 | a9 9a c4 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 09 68 77 cd 44 e6 c3 13 cb 05 d1 | cf 66 1c 50 d6 14 4b 97 00 00 00 1c 00 00 40 05 | 4a 76 ac f0 70 fb 47 b5 a4 35 5e 85 ac 7f 83 46 | 7e 8e ea 0b | libevent_free: release ptr-libevent@0x7f49b401fd78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8328 | #402 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 71 d8 6f 82 de 92 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | 14 71 d8 6f 82 de 92 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78ed8 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.897825; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8328 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #403 | libevent_malloc: new ptr-libevent@0x7f49b401fd78 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 d0 19 0a 68 f7 be 23 bf 13 ad 99 8c b1 23 c4 | 72 21 ce 0c 22 b3 a8 a1 7b 9c 90 8f 08 83 e2 6d | 54 71 68 14 15 58 fd a7 8c 8c 8e f4 0a cc fd e0 | 19 5a 97 7a d2 a9 cc ec cc b1 f9 33 3f 04 cd e5 | 37 f3 50 0c a7 3a 28 22 8d d0 cc 3a 99 af 33 62 | ca 2a 67 09 b6 9c 1e 7f 41 5b 5a a8 5e 9c 3d db | ca 14 04 2e ad 7d 3d eb ad 11 f6 58 db c6 a0 66 | b5 91 db 63 2a 53 79 9e 00 25 6d 56 15 6e 6d 6b | 83 1f 04 e5 3f ef 1f d9 19 83 83 c3 f6 c1 ca ec | ba ea 08 20 20 32 21 ee fb ec 65 8b 43 35 52 0e | 5d 75 45 da 30 7e e0 39 6e 6d f4 4c 18 46 53 9e | c1 36 11 66 fa cb d1 64 4c 35 4f b2 49 f5 07 66 | 7f 1c 49 55 91 3e 37 68 29 09 2e 13 e2 75 90 01 | 35 2d a9 df 4b a7 db ed 28 95 4c 79 f4 35 46 b2 | be a9 cb 6d 00 86 89 32 58 e3 a8 9e 84 96 63 df | 8f 32 d4 da da 04 c5 23 7b 98 49 ec e9 e8 38 33 | 29 00 00 24 aa 02 03 d7 6c b5 2d cd 3e a0 f2 c8 | 18 81 30 8d 73 d7 cc 4d db dc c7 5c ef e5 b6 da | 38 15 c9 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 5d 5c 47 50 b9 54 e2 46 fe 31 51 | 51 34 34 50 3f 7d b1 56 00 00 00 1c 00 00 40 05 | a5 72 8d bf f0 d6 5f d6 c9 0e e7 58 97 ff c6 72 | 7a b9 94 5a | libevent_free: release ptr-libevent@0x7f497402de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78ed8 | #403 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 4b c3 7e 75 ee bb 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | d4 4b c3 7e 75 ee bb 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49940058b8 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10665.960228; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78ed8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #404 | libevent_malloc: new ptr-libevent@0x7f497402de08 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 2a d0 0a e1 d5 6f 1f a6 b0 c7 c0 f8 12 7d 13 | 0b da 16 8e 1c 94 45 4b 5f bd 63 45 20 27 fc 18 | 45 bf 5f ea 26 6b 54 98 0d 9a 70 cf 3b be d9 88 | 67 44 41 e8 b7 c1 53 7e e5 60 36 ef f9 26 bc 03 | c2 a7 24 cc 05 ca 45 32 b2 e7 6b ad 99 7c 45 24 | 3d 16 a6 d6 d4 5a 9b 0e d3 83 ae da f8 25 7f e1 | 6c 77 fa 1f 34 ea 6e 10 9d 7e 0d e2 f1 8d c3 ea | fb 27 ed e9 78 c9 da 97 02 bc 7d e8 bd 4d 69 f8 | 55 09 c2 42 cc 58 f6 86 30 38 d8 02 95 83 5c 03 | 1f 4d 1f 64 bd 0e ab ed 39 12 00 b0 4b f4 1e a7 | b7 ff d7 ef 1a 05 1d e2 87 ae 53 b4 76 5f da 71 | 60 dc b3 98 c7 5f d4 72 77 bc e2 2d 6e ba 24 bf | 6b 61 e8 0b 81 a7 bb 8a 2b 24 b4 d5 92 66 58 13 | 56 40 5e 48 1c 5f bf 4d 33 46 e1 1c 9a ee 5d c6 | 5e ca 31 0a 7b ac 84 46 9f d9 fd 08 db 35 1e d9 | 41 b5 07 5b 43 37 ce c6 e7 d5 ee e8 ca 42 73 1a | 29 00 00 24 08 ff 02 05 a2 75 c9 77 d4 e4 1f ef | c9 1c c3 25 67 af 61 86 70 40 7c 61 fb de 63 ec | 58 e9 ae 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 7b 1e 17 21 eb f9 9b 42 e8 1f c0 | 9b 50 e3 bc 16 5a 7b 3d 00 00 00 1c 00 00 40 05 | 70 27 d3 fa bd 24 d2 18 01 85 ee 8b 23 df 77 7e | 78 2b 5a 00 | libevent_free: release ptr-libevent@0x7f499c0285d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49940058b8 | #404 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 a7 2e b2 3a 36 06 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 04 a7 2e b2 3a 36 06 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b55f8 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.020612; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003967 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49940058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #405 | libevent_malloc: new ptr-libevent@0x7f499c0285d8 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 8c 42 4e 74 39 25 2a 1d c5 06 15 bf c5 10 d7 | b0 c6 78 12 00 f1 61 cc c3 f7 f9 70 ec 05 05 00 | 97 dd ad 3b a7 26 47 02 c6 b8 2f 87 b4 84 5f 20 | 10 27 ba 96 f3 82 15 fa 85 3f 57 2e 7a bd 19 a7 | 7c d4 ae 7e 7b c6 ab 07 6a db d0 f1 78 f6 6f 45 | b9 12 32 ac 27 a5 07 15 42 4d 2f a9 43 5b 69 c0 | a1 0a ea b7 ad c2 5b 40 3a ee 3b dd 7d c8 5f 7f | 3f c7 3e a3 89 e9 ee a2 4f 7a a3 70 05 0a e1 ec | e9 01 ca cf e8 07 ae e9 2f 54 3b e6 10 30 dc 92 | ba 66 a0 05 c3 6c cb 90 13 9c 6d e6 5a ae de f2 | 38 63 f0 96 f5 a6 e0 35 7c 8b ba 83 dc 23 bb 21 | 19 eb 3d 66 54 9f 7d db 06 40 de de 4d 62 47 db | 17 66 eb 8c 51 1f 57 ff e9 0b ee 17 06 48 ab ec | df 9e 5c 9b fa 7a 00 7d 1f 64 22 59 fc 59 f5 a9 | 2b 55 2b 06 d6 73 4f 81 92 d8 16 cc f0 49 88 7e | 9a e4 f3 8d 53 95 96 8d 1a f0 1b a9 44 db cd 11 | 29 00 00 24 e6 1d 94 e0 5e 10 bf 36 30 51 bf 2e | 29 4c 52 9f ee 9a 54 1c b4 18 23 df 63 6a bd 54 | 05 89 e9 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 9c 9b 3f b5 2c 94 18 d8 36 b5 ad | 74 c8 5a 36 61 d7 20 fe 00 00 00 1c 00 00 40 05 | 65 47 e9 87 32 b4 6a f4 c7 56 2c 0d 3b 28 1e 23 | be 3d 4b 48 | libevent_free: release ptr-libevent@0x7f49a000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b55f8 | #405 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 f0 62 53 bb 6e 47 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | 91 f0 62 53 bb 6e 47 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da7d508 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.076075; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b55f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #406 | libevent_malloc: new ptr-libevent@0x7f49a000ca08 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 54 2a 0a ef fe 1d f7 49 b5 61 31 f9 43 7b 64 | fd 5a c0 b7 ff 99 66 0d e7 ef ee 0c 37 f7 21 42 | fa 23 e4 04 b5 47 68 4b 66 c1 88 6f 63 4b 6b 6e | 2d c1 1a 2c 5b 6b 40 a0 96 26 40 48 24 5d f6 65 | 06 bd 7c 9a 13 fb f9 a1 1c 59 a8 a6 da f9 35 f3 | 43 19 54 c3 6b 69 2e 85 51 eb 50 f3 80 7a e0 3a | c2 a6 f2 94 c1 a8 60 23 0e 59 37 fb 71 88 e5 1d | 6d 72 48 6e ad 64 13 25 67 1d b8 5f 3a 71 3c eb | 4c 35 8f c7 70 50 0c 2c 9a ad a3 6c 13 3e 80 b3 | a0 57 a2 ea 0d 27 fc c1 4a b0 74 ff 17 01 c6 0e | 62 42 a5 1a 58 72 31 04 33 f7 6f bb ce 23 bf bf | 76 08 94 69 55 01 f6 7d bf 02 ea 58 67 69 83 ca | 01 c1 6c 9e 6a 5f 07 29 44 14 7c 33 d3 13 92 b9 | 7f 2a 81 b3 86 42 70 bb 9e 26 02 7e 9a ce ee 16 | cb 16 e2 e9 3d 5d 02 18 dc f7 44 92 8a c6 6c be | 1c 26 60 1f 64 a5 7d cd e4 e9 66 75 f7 80 ed d2 | 29 00 00 24 49 34 1f 95 48 ec 95 68 08 94 52 6f | a9 10 bc 09 e4 ce be 8e 86 2f 16 fa 05 d3 81 4c | 13 40 7c db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c ea e9 d3 9c bd b4 37 da e9 14 58 | e6 4e 11 93 61 6e dc 0e 00 00 00 1c 00 00 40 05 | eb e9 1a 8a 12 0e 1c fe df f0 07 3c 70 7e 01 ba | 80 5f 25 59 | libevent_free: release ptr-libevent@0x7f49a40122d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da7d508 | #406 spent 0.416 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 6f 54 81 a5 ae 8d 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 3a 6f 54 81 a5 ae 8d 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da76048 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.144015; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008888 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da7d508 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #407 | libevent_malloc: new ptr-libevent@0x7f49a40122d8 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 7c cc 4d 20 5a d2 2c 65 5b 2f 55 b8 46 f0 85 | db 61 64 0c 14 21 34 61 0d 07 9d d8 32 c0 47 e0 | 31 ad a1 b2 9e ea 70 5d 35 d9 46 03 83 95 16 f4 | 33 e3 f5 66 38 1d 24 f0 6a 2e 18 1e 90 65 69 e4 | 4a b5 32 af f0 0e fe 68 19 a8 a4 66 81 38 ee 41 | 35 c2 66 a1 83 e9 5a a5 7e 79 a2 42 ac ff 42 54 | a3 07 ca ee cb 30 d7 32 8d f6 3d ed 48 ae 8e 83 | cd 2e c6 73 21 cc 33 20 1c 8a 23 9e 19 e1 87 85 | 55 1d 9e d7 f1 30 90 21 57 b2 41 f5 1c 1c 2c 8d | 47 49 48 43 f2 07 6b ba 1b 7e b9 ea 8e 4c 8e bd | 15 d6 73 16 40 6a 82 1f f5 c5 9a 48 46 ed 11 3d | 2c 34 9e 89 fb dd e0 db 7a 8e 19 99 a3 fb bd 82 | 6e 44 88 45 72 5d 27 4a 7e 64 21 0f 53 d4 9f 78 | 8c 27 0c 2a 1e ba 29 1e 4b 46 25 6a 99 a5 a9 e9 | f6 20 cf 7f 09 6d f4 4d d2 1a d5 fd 70 e1 69 d0 | a1 58 34 c5 1e 86 1e 66 59 20 a9 c8 77 cf 73 17 | 29 00 00 24 c7 0a c7 9e e9 b6 68 70 65 a8 3f 04 | 3b 91 fc 9b 82 4a e6 ab 71 93 60 d3 96 8b 7d 3d | 0e 73 8c 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 66 d4 7d 58 5a 5a ca bf 3e bd 4f | fb b4 6a b1 e4 fa 21 05 00 00 00 1c 00 00 40 05 | 7b 6b aa 70 02 83 2e 07 84 4b b3 a6 69 a0 89 28 | 0c 75 a6 89 | libevent_free: release ptr-libevent@0x7f4980044f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da76048 | #407 spent 0.417 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 03 ad 98 d9 fb f1 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 56 03 ad 98 d9 fb f1 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47ae8 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.211977; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da76048 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #408 | libevent_malloc: new ptr-libevent@0x7f4980044f08 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 f3 f4 6d f5 2a d5 33 99 58 88 b1 eb 6b 95 5b | bc 53 bf a9 81 5c e4 a3 b6 06 82 5f ae f6 53 e5 | 5c fd 76 99 ae 3c 36 0a 53 f2 9f 84 fe 3a ed 09 | bb c4 98 9a 9e 2b 3e 0b ed 34 33 cb a4 df 22 3b | 1f ed 56 22 8f 8f 1e 18 6d 86 eb 72 70 5f 88 1e | 24 61 13 c9 49 f5 85 ea c9 ad 29 69 11 03 cd e7 | dd 0a b9 0c 87 75 80 c5 79 7c 09 fc 3d d1 2f a5 | c6 7f 65 b5 88 91 8f b1 40 ea 26 5e e5 28 d6 ac | cc 71 a2 4f cc bf c3 00 65 a3 b7 e4 34 cb ad e3 | 7a eb db 91 9a 27 8a a6 8c 2d 8d e3 84 d9 27 88 | 0c 61 cc 35 fe af 27 d8 9e c5 48 41 db e9 0e 0f | 1a 4c 28 49 2b 4f 6b 4a 8c 6c 0f 13 b7 ac dd 3d | f3 ce dd 80 ac e8 da a6 b4 f9 36 33 5c 35 a8 ef | 05 26 a5 dc 65 21 64 10 5b 3c bb 07 26 70 89 52 | 19 57 f7 61 5e d8 01 4c 17 1c 2b 95 91 70 49 d7 | f4 0f 71 4d c5 01 ef 0a 26 50 5d 70 9f a0 68 f6 | 29 00 00 24 72 2d 30 18 e6 48 e4 99 28 d5 ca 1d | b6 de e3 82 e9 8a 89 87 c1 cf 1d d7 60 a6 f7 8d | 55 76 11 bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 e5 53 02 74 5c a4 f7 ef 11 8d 08 | f8 20 87 f9 04 a6 c4 03 00 00 00 1c 00 00 40 05 | ef d1 2c 3e 3a ed 51 47 16 64 20 b6 7f 01 43 7f | 2d 8e 3e ce | libevent_free: release ptr-libevent@0x7f497c02de08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47ae8 | #408 spent 0.608 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f9 15 8f e1 6a e9 5a 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | f9 15 8f e1 6a e9 5a 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78f48 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.272172; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47ae8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #409 | libevent_malloc: new ptr-libevent@0x7f497c02de08 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 31 54 33 d4 8b b4 46 e3 83 86 18 f1 dc 42 f8 | d4 83 80 63 ef 51 06 73 21 39 a5 cf 6c a5 44 86 | 8f 10 97 23 9d a6 43 4d 39 ee 75 ce 33 b3 50 bb | 0e 62 bc 56 3b df ed 4c e1 46 9b bf 67 28 cc ae | 08 c3 56 b2 48 09 81 ac 3e cb 05 6f 8a b5 98 22 | 12 ab ef c7 9c cf 12 a1 be 02 7c 2e 5c 4f 76 20 | 37 82 71 ba 9c b4 ba 8b 71 ed a9 6c da 2c 6a 59 | fd 7e 1b f1 d6 17 8f 7a 40 56 b0 e0 b4 73 bd 39 | 30 cc f2 5a 1d a1 04 dc b8 cc a6 8d 6e b4 41 23 | 92 fa 53 22 b5 c6 dc 85 aa ff de 81 c5 7f f6 b6 | 4e 4a bd 32 25 e2 8d 5c c0 41 ad c2 61 d0 13 f4 | 9c b1 47 e0 5d 47 cd cd 1b 67 e7 bc df 3c 17 0f | 78 a6 81 4f e0 76 38 c2 6c ea 5f 29 65 15 bc bd | a1 0f 02 77 8c 51 82 5e 29 5d 4a 12 a9 3b 9b e1 | da 62 d8 09 ab e5 77 09 9e f0 a9 b8 35 1e ba 77 | 3e cd 73 ab 2f 0b ba 70 fa bb be 08 ea bc 73 5a | 29 00 00 24 af 94 da bd a1 d9 00 ea a2 d4 ab 1b | af 29 b7 5c 1f be 1c 86 41 6a 54 60 7f 53 16 07 | 42 64 a3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be e1 77 c8 24 e1 ae 41 ea 33 d2 12 | cd 46 e4 15 64 84 84 70 00 00 00 1c 00 00 40 05 | 7d 55 e7 d2 ae bd 2a d6 78 e8 03 d4 65 9f 8d c3 | e3 47 4b 27 | libevent_free: release ptr-libevent@0x7f498c0283d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78f48 | #409 spent 0.269 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 c3 2c 09 e3 85 a6 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | e9 c3 2c 09 e3 85 a6 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b9b98 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.331834; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78f48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #410 | libevent_malloc: new ptr-libevent@0x7f498c0283d8 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1b 93 cb 0c a5 78 94 31 af 85 46 67 59 37 f7 | cf be ed b5 f1 a4 e2 54 b4 f0 da 2d 20 7c 7c 14 | 46 55 09 31 87 2a b3 62 79 24 65 91 b2 2b 30 59 | 68 ae ea 9b f7 07 48 9b b7 f0 ad be f1 c2 af 11 | 93 51 dc ef da 65 f2 87 5e 07 46 31 d6 ae 21 94 | ca 74 a5 6b 58 de 54 e8 b3 58 7a f0 1d 6a f7 30 | 87 fa 15 52 97 7e 05 c0 f1 b2 71 59 0c 41 c7 17 | 94 ac 40 79 7d ed 00 c5 12 78 6a 00 59 9a d1 29 | b4 e8 5d 8a b4 29 13 32 b2 83 11 7d f5 c5 0c cd | 64 45 26 09 27 05 e8 b6 23 50 0c b2 90 77 58 16 | c4 5e 49 ed b0 a0 df ae 96 9a 5f cf 1e b3 7a 52 | 0d 2e 31 75 0c 0a 53 fd 53 39 d4 7f ea e4 a1 4b | 36 e2 8b 0f 2b c4 45 27 2d a5 c5 22 97 f0 0e 9d | 4a e4 68 c0 c3 09 e3 38 84 11 da 47 a4 80 52 c5 | 89 8b 6c 24 1b 9b bc e0 b0 31 64 6d 6e 64 28 ea | 74 c2 de f6 9b f1 e6 21 1d ad 77 5d 08 10 1b e8 | 29 00 00 24 41 d0 af a5 ec 63 ff c3 ab b2 9a b7 | bc e1 a4 d1 d1 a6 2a 1b 06 85 47 76 b2 8b 68 2a | cb e6 7d d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 7e b3 19 89 26 d7 a7 ce 05 60 89 | 15 f3 9b 6e e2 7d 3c 21 00 00 00 1c 00 00 40 05 | 8b 18 68 ce 28 b1 af 44 43 60 f8 a7 e8 90 44 b0 | 75 be 05 51 | libevent_free: release ptr-libevent@0x7f499402deb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b9b98 | #410 spent 0.259 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 d9 7c 0b 08 2d 0d 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 02 d9 7c 0b 08 2d 0d 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.117 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da20978 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.388468; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b9b98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #411 | libevent_malloc: new ptr-libevent@0x7f499402deb8 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 5a e9 54 c2 8e 83 a8 1b 59 73 97 f1 5d d2 f6 | db a7 49 52 61 36 61 3b c0 82 d4 94 bf 6c ad 4d | a5 0b 59 0b 49 e6 6a eb ba d4 92 c6 40 95 9f 4d | 89 81 0b 2f b0 25 87 f6 a6 68 b9 fa b6 ef 44 35 | 69 4b 99 19 09 53 f5 67 87 77 ab e0 77 a3 a1 e5 | c0 49 fe c2 74 12 ff 07 06 c8 d4 13 66 19 f3 f8 | 8c f0 8d af 83 c0 da 5a fc a0 40 28 d0 e7 9f db | 9f 24 a8 a8 8c 65 95 67 1e d5 cf 87 12 09 29 39 | b6 a7 f2 04 4b dc f2 a1 ca 2f 4f 4c b3 41 47 04 | 9f e1 cf af b0 c3 31 25 c1 d3 97 cb 5f 44 fd 77 | 06 12 6d 8c 33 ce 2b 0b 6d 81 1f 0e 31 28 c2 c6 | 6d cf ca 97 62 5b cc 06 1f 46 ee 1d b6 ba 7f 72 | 9e d8 ab aa 70 ba 65 d0 44 f6 e4 db 8e 20 36 42 | d1 72 f2 a1 6c 0f 01 b0 54 00 5c a1 23 ca 20 1f | 81 5e 56 75 82 b5 8a 8f 5b 8c be 17 c0 68 17 4b | 5f 6b 5d 66 c4 e4 38 00 67 d9 0b d2 94 9b 00 16 | 29 00 00 24 68 d7 a5 dc c7 e6 56 00 b0 18 48 55 | b2 1f 1d 15 a5 f2 b9 36 57 91 23 eb 13 e6 3c f0 | 06 2c 3d 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 c2 4c 08 71 5d e7 3c dc 81 28 54 | 0e 33 3c f2 c4 43 7a 9e 00 00 00 1c 00 00 40 05 | 25 1a f3 25 9a 1c 1e 22 bf 58 e4 62 4a c0 67 f8 | d3 f1 d9 e2 | libevent_free: release ptr-libevent@0x7f49bc046848 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da20978 | #411 spent 0.447 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 7f 15 f4 dd 58 dd e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | 02 7f 15 f4 dd 58 dd e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a6e48 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.452449; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da20978 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #412 | libevent_malloc: new ptr-libevent@0x7f49bc046848 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c4 6f 53 29 df 00 19 1e 81 17 d9 66 b1 56 ec | 40 51 1d 38 d5 65 e7 b4 a9 1c c1 0b 59 3d 2c 32 | e1 87 35 da 25 95 9d cd 69 54 fa b7 96 fb 9a 21 | cb 88 ce 82 7d cf d2 e3 68 1f ef e9 8e 25 8d 66 | b9 be a8 d8 66 bc c5 b6 59 9a 6b 6a 11 3d 44 1c | f5 34 d2 bd c8 b9 22 85 c6 6e 03 98 d3 36 fa 5c | b6 8b db 5d 11 e6 64 0c 49 2f 90 cb c4 43 b6 3a | 4e a7 86 bd 0a 42 55 d3 70 72 73 e1 2f b4 a3 f3 | 56 84 2a 3d ad bf 00 d1 59 43 c4 29 c1 8e 76 10 | 28 4d 36 38 26 db be 19 64 e8 df 4a f4 f1 83 76 | 81 4d d6 f5 5f 0e 88 62 02 fc 7e 84 1e 59 32 3e | ae c2 a1 23 e4 0c 34 39 30 f3 71 95 79 fc c2 55 | 0c 7f de 2d de 5c 69 25 4f 57 d7 74 13 62 fa c0 | c3 76 fa 23 b2 ac f9 24 e4 cd 8b 7b 9a f8 69 f0 | 7c 0f 80 c2 7b 51 78 97 12 32 1a 52 d3 4a 32 22 | ac 2c 0b 36 eb 60 65 7f 14 f2 39 0c 0b 33 f1 7e | 29 00 00 24 7e 50 9a a3 8f 21 d1 62 5d 18 03 a2 | e5 2a c6 ea ae e2 c3 62 e7 26 0c 47 ba 2a ca 6c | ce 5f 26 46 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 52 ca ab 72 fb 50 a4 66 4c 3e 11 | 99 31 40 12 1b 6b 0a 6a 00 00 00 1c 00 00 40 05 | 30 56 5a 91 96 7f 33 59 94 e9 77 51 20 3f e5 2b | fb 4d a0 1f | libevent_free: release ptr-libevent@0x7f496c02dea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a6e48 | #412 spent 0.629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 c1 df 20 71 f0 88 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | 68 c1 df 20 71 f0 88 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.299 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24ff8 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.530548; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a6e48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #413 | libevent_malloc: new ptr-libevent@0x7f496c02dea8 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 31 19 11 05 38 96 2b 00 36 e6 d2 f0 3b 5d a2 | a9 a9 73 fc 4f a5 d0 b2 e5 e0 05 62 9a f1 e7 ad | 39 70 c9 14 4b a8 e2 c0 fc a4 09 4d 7d 37 3c fb | a1 a2 61 2f 83 05 56 f7 d6 3a 78 bc 0d 2f 5b 59 | 9b 15 98 26 60 13 b0 63 96 39 c1 71 51 59 da 75 | 99 b4 52 d2 76 0c 90 96 3f 18 3f 4f 45 f1 8f 02 | 71 b2 f9 cd 65 87 1a cd 42 81 33 cc 58 e1 e1 e0 | c6 fe 22 a6 21 ba 7a 53 74 29 87 3d 35 7b 2b b3 | 8d fd b9 cb 51 07 dd 52 6e 97 ab 4c f9 15 cf f1 | ce 40 9c 49 91 80 1c 36 70 91 66 2a aa ba b5 43 | fd 5b 28 19 a8 18 71 75 39 a6 26 8c 2f 24 c6 8d | a4 d2 1e f7 cc ce 2a d5 53 5d 7c 51 60 49 21 bd | 5a 9c 1d aa 60 09 eb 9f 73 3d 48 e3 c8 e1 93 a1 | d6 66 cf 53 1d ee 82 fa 4b 2a db 24 ee ba 26 b5 | 01 99 92 7e 03 88 f2 54 94 c7 18 37 ca 4c c2 5c | b2 cf 13 06 3b dc 6f 75 77 56 22 66 6d 6f 66 96 | 29 00 00 24 eb 26 51 cf 1b ef 1a 27 b2 48 0e 83 | 4b c6 20 a3 18 c3 c2 81 76 ae 20 1b 60 64 3e 10 | d1 39 26 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 eb fc 2c b0 10 e5 b6 2b d5 e5 39 | f5 a3 dd 7c 7a 5b 9e ec 00 00 00 1c 00 00 40 05 | 2f 3f 7e c7 37 61 7b d7 06 55 70 1b 81 7f c8 8e | a8 56 a6 b2 | libevent_free: release ptr-libevent@0x7f4978038e98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24ff8 | #413 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 00 31 51 51 51 eb 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | 1a 00 31 51 51 51 eb 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f498c0058b8 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.591858; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24ff8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #414 | libevent_malloc: new ptr-libevent@0x7f4978038e98 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 27 3e 9d a9 98 6c 4a 73 c8 9f 66 5c 79 3a 79 | 0d 3d 39 d8 ba a1 da e3 b2 ba c0 8a 98 d2 7f 1e | de 9d 1c 40 b2 00 c0 29 a8 d9 9b e1 26 3f 5d 0a | 51 54 2a d8 80 4e 06 03 6c ac 34 14 2b 63 87 ca | a9 3a d6 65 b5 01 99 7c 22 bb eb 72 08 4e 9a ae | 3d 30 68 98 5b 4e 82 3c 1f 79 db b2 70 aa c3 85 | 9b 30 88 91 ad 9f 2c 49 a5 30 95 03 91 bf ee 21 | 61 3d 75 81 e7 06 14 87 0c fa 4b b1 7a 00 42 f1 | 13 d8 34 76 84 df c2 7d cd 39 6b bc 37 c8 8e 7f | 83 17 ec 41 e3 30 f7 94 0e 7c 89 1c d5 e8 91 30 | a3 89 7e dc 63 bf e6 5b ae 08 d8 fd e6 d9 17 f6 | e6 9c 21 6a 0c 89 30 a8 95 10 fb a5 6d 8d 67 5d | ee 27 3d 79 9d 60 8d e5 63 69 9e ed bb bf 3a eb | 68 d5 7f 17 d6 5e ec da a1 58 6e 6c 0d c9 be 5e | c2 ca c4 3a 38 3b 02 09 5c 59 5f cb 50 3c 56 ec | 1b 8c a8 df 3b 49 61 cd e2 b2 b1 13 15 58 dd 7d | 29 00 00 24 1d a3 3c ad 3f 12 46 b7 be de f4 62 | df 14 50 e1 35 0f a0 e6 ff 77 86 2d 6a 6c 32 de | 3b ac e3 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 4f 4b 15 0c 01 ac fb f5 b1 92 46 | f7 e1 9b 87 cb ae fe 8d 00 00 00 1c 00 00 40 05 | a2 35 8d 6b 65 a3 48 36 75 f9 ac 29 b5 97 97 f4 | 95 df df 2a | libevent_free: release ptr-libevent@0x7f49a00333f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f498c0058b8 | #414 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff ed 27 6d 5d 11 37 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | ff ed 27 6d 5d 11 37 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da05028 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.651161; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f498c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #415 | libevent_malloc: new ptr-libevent@0x7f49a00333f8 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 f5 fc fe 7d 96 3c 7a f3 60 72 b1 11 c5 84 67 | b0 53 bd 67 77 a9 e8 0b 33 cc 7b a5 31 3a 10 a2 | f9 21 c5 39 bc bf 59 c3 01 5c cf 7d 59 97 6d 12 | 34 ef 34 c6 d3 15 c2 51 28 0d 4a 38 5b b9 29 91 | 82 db 2e 1d d4 33 f3 8b ca 3c ad 5f 26 0d 7f 7e | ae 39 51 ad 2d 9a 89 2f d5 cc 3f 5c d7 c5 9e 15 | 8d c9 58 e0 00 0b 5b 61 0c 56 44 03 26 0b 46 67 | aa 23 7c a9 7f b8 16 11 79 b7 d7 92 f4 3e 4b 31 | e3 50 0c 2c 3b e7 f7 29 dc 25 a1 03 9e 68 94 62 | 53 a6 92 47 18 9d 23 6b 39 59 d7 8c ef 17 7b 4d | 0e c7 df 49 96 20 3e 31 df f4 77 fb 63 7e bf ca | 20 b4 59 e0 7e 31 39 f3 ec ae 44 f1 34 e3 1e 66 | 36 22 24 e6 03 5a 39 7c 87 58 b6 23 b4 2a a7 b9 | ee d4 6b ca b5 42 aa 27 c2 93 a4 24 b0 66 9f 77 | 4b a3 04 4c 29 43 65 47 37 b9 72 b1 34 b4 63 f1 | 2e f4 81 d7 50 22 49 bf c5 3c 9e f5 bc ca ec 15 | 29 00 00 24 ed c2 a7 b2 ea c7 d0 1e cb 27 57 cb | ab ab 41 d7 4e 4d c9 a4 63 64 10 9b 8b ac 7b 91 | f1 9f 37 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 f4 32 69 64 d8 1f d8 15 da 4a 28 | ea 06 77 c6 b2 e9 9f 59 00 00 00 1c 00 00 40 05 | 29 bd 6b 2b d6 fa 6e 1f 85 3a 62 f4 64 9a 94 74 | d2 b4 e7 6a | libevent_free: release ptr-libevent@0x7f49ac01d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da05028 | #415 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe b0 b4 ea cd f1 db f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | fe b0 b4 ea cd f1 db f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaff58 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.712456; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da05028 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #416 | libevent_malloc: new ptr-libevent@0x7f49ac01d3b8 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 50 49 67 4a ec b6 12 05 57 a8 14 1b fd 7e 11 | dd ea cb 3b da 05 73 83 d7 b8 55 98 2c a5 da 5f | ac 1c 34 5c 08 c3 da 6d eb 7f 60 a4 a8 d0 d4 08 | d4 bd 51 f7 d9 81 7a fc 63 2b 89 dc e1 f3 6d bb | 7a 46 34 ac 88 df b1 50 6b 2e d3 f5 48 da 05 9e | 47 42 a1 d9 3c f1 6b 94 f5 04 1f 0a 7c e0 95 75 | 90 65 9c a4 19 22 5a f4 16 aa 25 db a8 d7 bf 1d | fa bc b9 65 09 a2 73 8f 1a 2c d5 1d aa 48 bb ed | ae 0c 05 ce e1 bc 11 64 2b 89 67 26 1f d1 43 98 | 6e c6 ce bf 8f c5 02 34 e5 8d 80 75 bb ed c9 90 | 68 ee 0a 88 24 fd d5 6f 74 3f 57 3b 9f 81 c5 61 | 2f ad f7 f9 c0 3d 92 4f 35 97 a8 cf 4b 08 97 6e | d8 06 b7 e4 ba 64 d7 b3 ab 63 3e 43 20 6e dc 56 | 34 50 1f 11 5e 7a a4 e4 a6 98 b6 85 99 8c 7d ff | a9 12 6e b2 c7 5b 94 68 50 a3 08 39 cc 41 64 16 | fb 01 3f f6 9a 94 9d 7b 5d 61 24 38 69 d0 70 fd | 29 00 00 24 4c c5 61 75 aa 11 7e 68 38 e1 af e2 | c8 fe 76 22 83 76 74 3a 9a 79 b5 82 5b 8a 1d 4a | 5e 6f 8c e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 ba 9b 35 d3 55 a3 16 c2 a7 47 de | a2 76 6d 15 ba 41 16 03 00 00 00 1c 00 00 40 05 | 42 23 01 0d 8f df 82 cd 11 d7 0c e7 4b 11 71 1a | 31 38 63 c7 | libevent_free: release ptr-libevent@0x7f497c02df08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaff58 | #416 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a 1e a7 af 79 81 d7 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 3a 1e a7 af 79 81 d7 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a80058b8 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.774857; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008294 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaff58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #417 | libevent_malloc: new ptr-libevent@0x7f497c02df08 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 8a 20 5b 81 2c d2 50 9c 48 6d 17 f4 5e 0c c2 | 9c 2a 59 b8 82 24 8a c2 dc 76 19 5b fd dd ed 14 | 73 ce ba e0 79 d0 0d 7f f7 84 82 ab 01 08 7a 23 | 9b 51 cb 57 83 cb 9b 34 25 e4 ef 4e 04 32 17 df | 1b f0 d3 53 64 60 95 52 d7 e6 3f 59 e9 69 3a 2c | 48 32 de cb 51 c1 f2 5c ee 8f e4 c9 be 6a 16 d0 | ac c2 b9 d6 07 e7 2f 89 76 f9 65 00 f6 db a2 0e | c8 8b 7a 5b ed f2 b1 c9 71 15 79 15 c1 84 ae 49 | 2e 77 00 f6 b1 d5 d9 5a 03 83 58 dd 76 ad ac c9 | 2b dd 93 a7 29 f8 3f 12 1a dc 5e 4f 24 d9 21 c0 | 7f b1 4f cd 18 e3 9f 86 f5 5e 55 f8 52 61 4e 27 | 64 11 a9 0a d5 e6 7f c1 d8 99 5c e6 2c d5 be b1 | 66 33 38 f7 1d 54 f2 9b 26 6e 7a 38 50 8e 3f e9 | 41 1d 19 cc 1f fb 5b db 6b a9 d6 ea f8 a1 89 b1 | 5a a8 dd 2c 2f 72 a8 a6 bf 40 3e 5c 46 1e 04 79 | 9d 09 0f 0a 64 f8 f1 5a 6a e6 4f 7e 6c 3c 3d 2f | 29 00 00 24 e7 e7 c2 a7 4a 99 30 04 16 20 0e 8e | d3 37 ce 9f 58 a1 ff 64 e4 31 27 33 f4 1b 5d f9 | c3 e4 56 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 60 ae 14 24 f3 94 e6 5e 62 e8 ce | 94 b1 b3 70 0b 59 71 a6 00 00 00 1c 00 00 40 05 | b6 82 99 1f e2 3e 2d 58 a2 89 c3 16 36 2b cf 36 | 62 bc b8 b8 | libevent_free: release ptr-libevent@0x7f49b00283c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a80058b8 | #417 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 0d 86 72 48 be 53 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | 5a 0d 86 72 48 be 53 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9fc528 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.842251; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a80058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #418 | libevent_malloc: new ptr-libevent@0x7f49b00283c8 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 c8 8f 13 75 77 01 fd 10 69 00 ea 9e 19 26 17 | 19 61 cd 06 1b ac e3 8f 5d 56 2e d1 5d 86 74 99 | 95 9e 67 88 7f 11 71 f6 17 5c 87 6a 82 3b 05 73 | 79 85 09 dd 03 a7 52 37 02 f5 63 21 29 10 85 b1 | 3e 80 f8 26 9f 62 74 57 8a 4f e3 e4 f3 03 26 1a | 8e 1f af fb ae 91 05 a6 6b 8a e6 96 a4 b4 47 b6 | 84 39 ac 97 51 84 a4 57 e1 96 39 f2 88 a1 7d 28 | ef 1f 4f f7 30 44 3d 50 1f 0a 6e 8e b8 a4 44 72 | da 95 6e 13 4c bf e6 22 57 06 ac 64 d4 a7 55 1e | ea 08 b6 b5 fb 97 52 ec 5f 67 16 fe 86 fa 23 d0 | 71 54 7a 3b 4a a0 74 83 15 12 3e 98 1c be f6 b7 | ac 99 da 24 99 5b b6 70 c8 d0 4c b5 96 2a 21 b3 | b8 ad 86 6f 50 0e 70 67 d0 06 f5 df 4d 4e 05 71 | 30 50 be 84 9a c5 3c 2c c7 f7 71 4e ce 98 cf 47 | 44 3c 72 7b 32 cd 57 a7 aa bf ab d3 88 32 36 02 | 08 2a 06 0a 72 50 63 14 1b 6e 04 43 ce f3 58 14 | 29 00 00 24 32 fc 72 05 c1 47 4c 6a 41 95 f6 d1 | 3d c9 bb a7 9a 9d 8b a5 73 1a 01 ea 88 a1 c6 9b | 93 0f 39 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 30 1e 63 f0 e7 69 42 25 75 98 28 | 93 df b5 90 e3 07 33 13 00 00 00 1c 00 00 40 05 | d0 83 31 72 95 48 02 93 4e 58 30 1b 66 af ee 23 | bf 65 d4 bd | libevent_free: release ptr-libevent@0x7f498c033448 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9fc528 | #418 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c e3 55 93 ca 83 3b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c e3 55 93 ca 83 3b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d53d8 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.902527; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9fc528 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #419 | libevent_malloc: new ptr-libevent@0x7f498c033448 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 20 3a 77 6b 01 94 b4 49 7d ff e6 9f 2e 50 d4 | 89 2e f7 63 6a b8 84 ca 24 54 f1 1c 7f 15 68 b3 | aa 91 18 75 64 ae 09 89 63 7b eb 1d f0 20 f4 15 | 18 7c 83 09 65 39 4c d8 ef 27 8d 85 52 68 21 c1 | 26 74 f2 ed ed a2 2a ad 4b d5 ce 47 cf 76 39 aa | 9d be 00 6f ad 37 93 91 65 17 2c 62 4e de c6 a2 | 96 41 9a 86 8f d5 ac f5 c9 1c 05 0e 0b ee 9b f5 | 24 8e 7e 1c dd bd 8f 50 20 a3 18 5f 57 6b 3a c6 | 9d 99 50 eb 29 32 c7 74 6f f6 2b f9 45 8a b7 de | ea 41 a9 5d 95 d0 bb fa 4b 6e 7b 2a 03 d6 16 f3 | a1 7a 7b cb 1e d6 40 07 a4 72 26 f8 42 36 57 1f | 10 0d 89 5b 06 36 14 89 84 fe b9 50 9f e6 d9 e8 | 66 2e 7b db bb 4a 85 02 ca 17 ba ad bb 68 19 4f | ef c0 d8 31 25 1b cd 7d ad 3f ef d9 fa ac 48 1e | 09 07 24 dc 22 1f 72 32 d3 00 6e 4c 77 1b 25 c8 | 1c f8 1d c7 d1 ce 67 3f 3f 73 21 eb 64 58 d8 24 | 29 00 00 24 48 13 75 4c 1a d8 68 62 b0 7d 02 25 | 2f 53 4f cc 80 9e 71 cb 68 79 cb 61 f7 af 48 d6 | fd f4 a6 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 04 60 56 4f 6c 8b 42 81 19 9f b2 | 56 a2 3a aa 3d cd 8f cd 00 00 00 1c 00 00 40 05 | ea 27 04 fb c7 5b 25 bd 9a 80 74 7a e4 95 95 65 | 5c a3 e2 a6 | libevent_free: release ptr-libevent@0x7f49a00495f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d53d8 | #419 spent 0.408 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c eb b2 99 55 80 e1 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 5c eb b2 99 55 80 e1 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daeb7d8 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10666.962417; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d53d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #420 | libevent_malloc: new ptr-libevent@0x7f49a00495f8 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 6b 64 0d 42 24 35 bb 5d 5c 73 03 b9 37 83 2d | 04 ae bd d7 af 91 68 1a dd 85 50 c1 cd 65 c2 36 | c4 4d 2b 2f f0 65 3b c1 76 a0 c9 d2 57 57 1d cc | a8 0a a4 e4 4b 71 b5 cd b5 14 87 16 13 72 22 31 | b5 0b 73 92 d6 94 b8 d0 71 ef 06 15 6d d5 ef d9 | c1 2b 37 da ea 6f 04 9f 0e 3e 0c b2 32 06 b9 e2 | 80 3c 24 9f bf 7a dc 70 ee f4 04 8d 0f 39 42 88 | fa 5b 72 87 f7 66 25 1d 8b 87 56 99 71 d3 cb 61 | db 40 fe d5 5e d9 90 46 71 bf 96 a5 69 be 64 a5 | 84 d8 5d ee 33 7c 7f 69 a2 84 9d e0 50 e7 8f bf | ec f8 a5 18 f9 23 87 8f 08 58 be 69 a5 53 33 f5 | c6 7b 34 32 a6 fe 86 4c 28 f2 c4 ba 77 be 39 69 | 1f 42 22 89 ef e5 ff 86 68 8b b1 e0 d1 f3 10 47 | 5d 85 c2 9a 8b 84 c8 a2 51 24 34 64 40 ae 88 a8 | 2d c4 f4 68 cd 0b be d5 69 33 14 15 f0 a7 8f 5f | f2 4b 81 8b 39 89 86 de 74 e1 bb 6a dc 4b 15 cb | 29 00 00 24 1d 73 81 bb 0d de 7c 45 b5 b8 d0 50 | d2 f9 67 af 0e e4 70 6c 50 10 46 bc e7 2b 1f 41 | f0 5e 63 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 b1 c3 ae 60 b1 a6 de 19 88 da 5b | b5 43 db 7b 59 35 ef ac 00 00 00 1c 00 00 40 05 | cf cb 64 83 a4 6d 0f 14 a7 c0 1e 6f 49 29 c7 0a | 44 4f a0 dd | libevent_free: release ptr-libevent@0x7f49a0028418 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daeb7d8 | #420 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 6a 2b be a9 7d e6 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 43 6a 2b be a9 7d e6 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab44f8 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.038881; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daeb7d8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #421 | libevent_malloc: new ptr-libevent@0x7f49a0028418 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 49 e7 e9 57 25 66 4d e4 56 d7 4b dd 11 70 37 | 47 1d 55 54 a5 fc f3 16 3e 78 99 a6 e1 72 70 f9 | a9 f2 28 3b 9d 43 d2 b1 4f da 7b 7a ba 0b 8c 31 | c1 a3 e6 00 d9 b7 e3 8a f5 32 67 b1 6b 67 a6 49 | c1 59 37 7c 3a 19 ff 87 d9 c1 e6 a7 d1 ba f4 c1 | 1f 46 c1 20 0e 60 04 72 51 d9 c9 30 12 5b 85 28 | cc fe 7f 5a f6 dc 27 64 3e ec 7a 85 d9 8d 6c 52 | 1d 5b 42 71 94 c2 18 1e 69 83 75 e9 b2 0f f2 a6 | b8 90 89 41 da 39 fa 5f 8f e5 25 d9 7a 37 bc 2d | 0d 47 b3 50 7b 6c 96 bf 8e 6b 1e 9e 4c f4 7b 7b | b9 af dd 6b 8a 1a 5d 04 e2 c0 81 ca 87 ee 15 a2 | 40 bd 76 7d b4 29 c8 d2 0f a5 58 2e 68 b4 e7 83 | a3 67 45 13 38 b7 84 68 46 1c 62 3d 7b 5a 08 1a | 7a 3f 03 ed 25 ed 32 b4 7f 33 d4 1b 19 96 4a 05 | 94 15 e2 b7 c6 f7 1c 56 11 48 dc ce 13 3b e2 5a | 84 88 5d f1 b2 9b 8c af cb fa 42 ce 0f 32 2b 30 | 29 00 00 24 2a 9b 83 8c ba 74 61 1f 01 b9 c1 eb | a9 0b 58 7a 58 f1 f3 ed 56 1b 76 b8 58 4c 5e 8b | 04 24 92 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb a5 57 11 94 3a 39 7c 8d a3 55 ac | b8 39 cb 0e 91 27 f7 89 00 00 00 1c 00 00 40 05 | a2 82 bc be cf dc 3f 17 25 38 aa 53 dc bf 3a 3f | c4 49 90 ca | libevent_free: release ptr-libevent@0x7f49bc014f58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab44f8 | #421 spent 0.284 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 6d 6b b2 23 ef f9 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 28 6d 6b b2 23 ef f9 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.126 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe828 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.115474; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab44f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #422 | libevent_malloc: new ptr-libevent@0x7f49bc014f58 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 2a 0f 23 71 e6 fc b7 db ac 97 fb 6b 1e 64 ef | b0 1d 01 1c ee 22 f1 90 64 69 b2 06 df c8 4b b1 | a5 e9 f4 74 f6 35 94 37 9d d3 2a 09 e5 76 d6 77 | c6 fc b6 88 a1 cf ef c1 c3 6a 92 52 38 3c 5c 5a | 0a 4d 00 b6 1c 56 c4 bc c1 17 f6 d2 2f 4d ff d8 | 38 f8 2e 45 43 66 2f d9 44 5d b8 43 f6 b0 6e 32 | 9b ab d2 4b f0 b8 14 9e 43 0c d6 8d 59 a7 01 d9 | 64 e7 e9 b8 85 28 6a cc a9 4e 90 5e b7 a3 55 5b | b5 cd 76 13 3b e2 53 98 52 8f 6f 6b 3d bb cf d1 | 04 7a 05 9d 7e b1 ba 5e 96 84 22 4e 4c 24 8c fb | 8e a9 cd 54 72 0e 2d 95 8a 7c 10 8c ce 5e 57 b0 | 3d 5f d3 e6 67 c9 b2 43 f1 c4 87 75 3a e2 49 96 | cb 97 0a bb e6 a7 de 06 92 f0 e6 25 b9 d9 8f be | ca 55 2d ed 7e 79 0e ab d5 4f 3b a5 eb 87 98 1c | 17 ce 01 4a e0 2e 92 9e 64 4c ad 02 56 df b6 50 | 31 2a df 64 53 29 5c 73 28 14 3b ed 59 c3 0a 38 | 29 00 00 24 6a da 3f 2e 67 d2 ea 8a b5 4c 69 00 | 31 90 a6 bf 6d 8f 33 91 6f f3 54 32 f1 9c 7d c2 | bd 27 1f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 24 34 e7 d9 19 5c b4 10 7c 18 a0 | 07 a9 c2 bb b5 3a 62 c1 00 00 00 1c 00 00 40 05 | 69 7e 13 79 d5 6d eb 69 bc 65 60 fc 43 f4 0d 23 | 32 38 17 68 | libevent_free: release ptr-libevent@0x7f498c049dc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe828 | #422 spent 0.195 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 a2 a3 94 d9 05 0c 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | 51 a2 a3 94 d9 05 0c 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da777c8 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.183863; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe828 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #423 | libevent_malloc: new ptr-libevent@0x7f498c049dc8 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 11 4c e7 b1 b9 de 44 c3 c9 16 b8 f7 fc 57 12 | 00 7f 50 85 7e 33 c5 bf 2d 8f 8e 47 d5 bd 0f a0 | a3 24 cb 9a d8 b9 cc 59 24 85 9e 16 be db 6d 37 | fc 3b 76 d5 7b af 02 92 00 20 65 5f d7 be 34 c8 | a9 5c cb 15 51 02 43 3d 79 5b 3b 58 d7 a3 12 01 | 92 f4 e7 5f 44 ea e0 d8 b0 ca c0 7d 26 a8 7b 46 | 75 55 62 00 f1 36 37 06 cc 31 3a 51 0a c3 50 d9 | ad 17 df 92 a6 02 9f ce 6c d5 9c 04 6a 76 f1 14 | 0b 15 7a 2e fa e6 3e c5 dd 69 41 8c df 1c 68 b8 | ab ea ec d1 ed a8 f8 94 41 7b 4a 1f d5 ad 23 71 | 75 6c 4a b1 c3 df 89 b3 24 aa ad 26 1f e6 c2 56 | 51 0d 79 7a ca 7b fc 54 1e 6c 21 f3 c2 61 e9 3b | 94 30 ef d7 a6 2f 8e 43 42 63 73 c8 2e 57 72 b6 | e8 44 c7 63 33 31 42 92 d1 93 d9 8b 63 58 1b d1 | b7 a1 b3 77 8a 2b 89 12 27 c8 bf 2b 21 90 98 4a | cd 32 6c 4e 13 56 30 7a f6 c4 b8 21 8d 2d 88 fe | 29 00 00 24 37 29 3b 24 17 73 c2 19 33 a0 67 76 | 13 de f7 5a ed d3 6f cc 8d 74 f3 06 36 82 d8 e9 | 13 ae fc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 95 f0 ad 78 b2 eb fa fd 16 19 31 | 70 e3 50 14 7e 84 55 d5 00 00 00 1c 00 00 40 05 | 54 19 4c 44 05 ed 0f 21 7f 85 b9 b8 8b 53 c6 ee | 7e 31 ae b5 | libevent_free: release ptr-libevent@0x7f4990038f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da777c8 | #423 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 76 fd 28 c0 8f 44 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | f6 76 fd 28 c0 8f 44 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b6d78 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.245176; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da777c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #424 | libevent_malloc: new ptr-libevent@0x7f4990038f08 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 7d 6a 42 69 90 79 ad 56 32 8d 8f 98 df 63 55 | a7 e0 2e 38 31 02 63 f6 67 cc 2c b8 27 40 e8 36 | 1d 05 26 4b 73 ea c9 f6 58 b8 60 f6 cd 6d 95 e3 | 1d 82 2c c8 36 c0 fd e4 53 66 60 45 0a 89 78 54 | 5d 2a b5 25 73 5c 0a 1a 13 97 35 2b f6 02 aa 2a | 94 92 cc ed 3d 7c 6f eb b9 2c c3 ff c9 61 e2 dc | 24 03 1e c4 80 60 32 4a 02 f1 6d e0 e8 d0 85 22 | ab 7d 3a 15 e2 7d e2 f7 69 b0 8b a6 f5 60 74 4f | c6 23 68 86 f9 1f 93 f8 7d 54 ed 53 01 1e e5 e2 | ac 40 ad ca 37 a7 85 c3 14 ae 87 4e 50 53 79 23 | e0 8d b1 88 c9 1e 04 3e 23 5b 58 20 a8 91 53 f1 | 36 b8 02 cd e1 5f ee 5d 60 68 a0 cc f2 57 4e b1 | 92 55 c5 73 24 1c 57 db f4 7e 7b 0b 04 0a 72 a3 | 4d 77 b7 1b 92 d3 67 74 6c 31 ef 08 0c 43 e4 e2 | ba d4 58 00 2e 66 26 f8 b4 08 51 6d bf 44 9a 68 | f6 46 9f bf bb 76 48 7b e8 70 6c 13 a5 66 27 6c | 29 00 00 24 00 80 4a 36 9e 20 dd 58 59 57 3e 23 | ee 19 b1 12 05 46 c7 5c 42 b5 d7 00 c3 06 e4 36 | 0f a0 d6 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b ea f6 4f b4 6a ea a8 b6 db 24 c0 | a7 b2 49 c8 5b 5d e1 63 00 00 00 1c 00 00 40 05 | 04 8b aa 22 22 40 27 8a 13 31 ba eb 11 ee 93 c9 | 4e 66 b7 e9 | libevent_free: release ptr-libevent@0x7f49ac01d4b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b6d78 | #424 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 6e 87 96 61 2a c9 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | 83 6e 87 96 61 2a c9 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd0b8 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.307585; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00819 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b6d78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #425 | libevent_malloc: new ptr-libevent@0x7f49ac01d4b8 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 22 61 09 2b 3b 49 66 f2 6f fa 83 6f 62 ff 97 | b0 17 31 31 c5 4c d7 ae ce 62 94 0a 9c b0 b6 4f | 2a d6 af b8 45 65 95 79 58 e4 85 7b 48 fa c6 44 | 62 d0 96 e9 90 6f e7 80 8e e8 7e 62 b5 04 1e 42 | d4 66 99 a4 d0 83 14 69 c1 9d 93 f5 c3 bf ee 47 | 54 2c 20 22 75 19 41 b1 3d 33 2a 0b a6 58 c9 1b | b4 6b 1a 5e 85 69 b2 01 99 20 12 6d 0a 0a 42 ef | da a1 cb a4 8c 77 bf 07 2f ee 57 0a 55 bf 3c 6a | 89 5e 82 a1 21 c2 46 2d af 56 32 0d 30 4e 5b 97 | 35 53 b6 61 9f 06 9d e4 5c ee 0b 39 28 92 3a 25 | ff 8a 9d 7c 28 22 e7 86 62 8e 6d 75 21 45 e3 28 | 11 c7 89 08 63 6d 41 4d f7 91 7b 63 ec e7 1c 64 | 7e f5 de 34 be c8 bf 62 87 9c 37 95 d4 f6 39 6b | 29 54 d8 23 e7 9b 58 e0 0c be 6d ce a3 41 99 2f | 66 52 f7 f0 3f 62 bb 32 18 94 bc ba 6f 44 73 f7 | b8 41 f1 73 b7 04 e4 df c1 bc b7 84 1b 27 28 cd | 29 00 00 24 5e 2d 59 43 5a 9b 6f 8e cf 6d 6c 98 | 04 67 fe 85 74 19 4c cc b0 03 53 8b 00 75 6d 1b | 1d 92 9b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 4c f6 91 42 50 3b 6e c9 ec 58 43 | 41 96 f8 50 f9 a4 aa 14 00 00 00 1c 00 00 40 05 | d7 67 56 69 f2 85 66 c4 d3 cf 93 32 8b d7 e0 b8 | 02 c7 26 47 | libevent_free: release ptr-libevent@0x7f4990028428 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd0b8 | #425 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 16 a4 bf 49 82 21 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f8 16 a4 bf 49 82 21 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac2e58 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.367832; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd0b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #426 | libevent_malloc: new ptr-libevent@0x7f4990028428 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8a f7 c7 60 8a 58 70 13 94 d0 f1 1b ad 7f 3e | d9 13 42 ac 70 4f c3 f0 d1 30 06 8b fe f2 45 68 | e0 2a a2 63 79 4b 0a a7 a3 32 e8 cf 6d 1c c2 df | 9c b5 d5 c5 f6 40 15 9f 40 18 0c 49 df f1 99 16 | 2c 6e 96 7a ca a3 18 39 a7 84 7e 3f 86 37 5c 1d | 7a d6 91 19 6c 48 b8 5b 57 bb 6a 9c 9b 56 e0 d6 | 7b 30 d1 ad c5 d1 fd df dd 93 fa f0 98 99 77 a1 | 2c 21 81 00 c7 0d 1e 79 bc 52 fb b5 7f 41 b0 42 | 0e 8e 57 3f c6 21 77 e2 6e 81 7a 69 47 42 41 34 | 22 f4 d0 1e fa 5c 75 05 ce 9f 91 f5 93 c8 b0 01 | 80 9c 90 43 58 fd 08 44 d0 96 95 c3 8e 49 fa 16 | 27 a2 89 c7 4b 92 8b 55 73 b2 f3 51 8b 04 4d 96 | 78 5a d1 c2 38 f6 e9 87 68 3e cd c4 bd 1c 29 2e | c9 61 98 73 4d 17 86 3b 10 27 9e 46 4f 5d 27 7b | e5 8e 11 7b 03 3a 02 08 2e e9 5c ba 12 01 f1 73 | c0 02 e3 e7 8e a5 b1 f7 a3 7d 0b bb 37 c9 e4 40 | 29 00 00 24 21 14 88 c7 4c 7a e7 44 9c 88 36 3f | b4 8b 0e ec 4e 41 62 4d 86 3a d0 f7 bf bf a3 61 | fd 35 09 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 0b d5 63 13 ed 1b c0 df 05 40 2a | 7c 5e 2b a6 61 27 24 67 00 00 00 1c 00 00 40 05 | db b0 b4 a2 31 8f 2a 21 e1 15 43 6e cb 58 e8 93 | 34 de 29 14 | libevent_free: release ptr-libevent@0x7f499c02dd48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac2e58 | #426 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e3 3f 86 4b 60 d2 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | be e3 3f 86 4b 60 d2 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad16c8 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.42513; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008458 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac2e58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #427 | libevent_malloc: new ptr-libevent@0x7f499c02dd48 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 66 5c f5 a1 6d 4d a9 78 39 8b 36 91 99 86 d8 | 11 f2 7a b5 54 fd 9a be 36 c1 49 95 30 5b ef 9c | 8c 5e cf c5 e4 58 ce 10 e2 ef d3 5e ec 5f e3 8e | f5 79 00 df d0 30 4e 65 e6 ce 2e 47 be 9a 93 c1 | e7 73 75 72 56 49 36 fc e0 14 72 11 0a 4a 30 73 | 71 2f a9 ec 16 0c 84 7a 9d ab cd e3 29 5b 57 a2 | 73 fd 17 8c a0 41 d9 49 00 16 8f f6 0c 9d e8 65 | 77 71 16 a8 35 fb c4 bd 2b 1d 79 04 38 5c 51 31 | 9b c3 33 81 e2 91 a0 0f 03 ce fb d7 94 0d cf 3a | 75 bd 0f c8 8c 30 81 47 11 4e d8 e2 4e 04 91 db | b9 90 95 c8 17 e9 05 33 a1 20 4f 96 94 2f 9e 88 | cc 1d e2 77 63 56 47 6b fb e4 c4 7c 08 d4 a8 b3 | 72 b6 a3 dd ff ef b7 9b 40 b7 8f e1 03 5d fa 4a | e4 e9 d4 5e 32 52 a8 81 62 a5 b0 72 1b 4d 0d e6 | e9 42 2e f7 36 ae 98 0c 80 dd 13 4f e6 75 5a e0 | 72 42 04 0e a6 09 a7 38 38 48 09 42 29 03 12 38 | 29 00 00 24 73 5a 6d 1a 58 87 02 09 62 80 20 5e | d8 9b d8 56 8d fe fe 02 00 a1 29 c5 8d 31 91 9a | ab af fc 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 dc 64 cf 79 77 40 d7 3a 16 1f 24 | dc 95 7d 1e e4 94 8a f4 00 00 00 1c 00 00 40 05 | b5 38 65 91 20 2a 17 2f 73 69 2a 8a 34 5b 21 aa | fe a8 29 4d | libevent_free: release ptr-libevent@0x7f49b0012388 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad16c8 | #427 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 0e af 24 ec b9 a2 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 44 0e af 24 ec b9 a2 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa2a8 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.483432; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad16c8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #428 | libevent_malloc: new ptr-libevent@0x7f49b0012388 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 04 93 9c 2e eb ba 3d 39 b1 c8 3a 6b b6 36 b9 | d1 be b4 c6 b6 bc 1b 91 35 76 6c 3f f2 d9 32 8f | 83 9d 86 4c 50 c7 7b 45 cf 31 71 88 6c 54 ac 78 | fa 32 df 92 e3 3c ad ee 41 9c 0f 89 54 be 9f 72 | 99 a0 97 de 61 8a 3d cd ce 43 71 5f f5 a1 8b 10 | ff 0d 25 7f be 1a b2 41 eb 22 a9 da 0c 14 cc b3 | df ea 21 57 d4 8a 6a b0 f1 88 a8 da af 44 cc df | 50 d9 83 c4 5a 46 74 cc ed 26 1c 4e 81 8a 14 42 | 5e 04 83 0a e4 e1 03 1e dc eb b7 ac 6d 09 b6 a1 | e7 35 28 ab e0 eb 98 b4 ec b1 f8 f4 f0 fd d2 70 | 8d e2 27 ce c4 c4 8a 2b d1 43 ec 79 30 c5 60 46 | df 8e 51 69 c5 8e 16 ee a8 a1 10 e0 ba ca 5c fe | a2 cb a8 f5 5e 98 da db 65 e0 2b 1e 1d b0 44 ac | 35 0d 99 24 a0 23 16 83 12 49 f1 25 96 4f bb 7b | 71 18 0e 9c 0e fb 2d bf 0c cf a6 a4 89 1d 5e 20 | 56 0a 49 e0 2c 7e 51 0d 52 14 f5 91 bb c7 02 1c | 29 00 00 24 f9 db 39 38 e8 bd 5e 4a 34 d4 4b e4 | 1f b9 58 b6 cd c7 51 58 c5 90 65 a7 7b 66 67 3c | e5 fb 4c 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 e5 73 63 7b 6e d7 f4 f0 02 4a 00 | 2e 16 53 66 83 d9 cc 17 00 00 00 1c 00 00 40 05 | e2 98 28 5d e9 a5 0e 38 d2 c5 98 3e f7 c2 4d cc | 7f a6 4c 09 | libevent_free: release ptr-libevent@0x7f4990022cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa2a8 | #428 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 72 d7 75 6c 59 c5 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | 8a 72 d7 75 6c 59 c5 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d0e8 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.546708; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa2a8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #429 | libevent_malloc: new ptr-libevent@0x7f4990022cb8 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 b4 ef 35 99 2f bf a6 8e 09 49 66 1f c7 d8 e5 | d0 b8 bd d9 5c 5b 0d 0c 20 9d 02 08 ed 3d f3 41 | 0b b1 6e 35 42 e2 5c 20 1c dd 3c ee 3c e0 fe b6 | 41 6d d7 76 01 57 91 e4 00 e7 53 e2 b8 f1 d6 90 | 50 db 82 0d 6c 01 f0 de 84 ef 03 cb 28 5c ab 12 | 37 f3 12 72 e4 7e 51 f2 4a 74 71 d0 b7 fe b9 55 | bc 32 85 8e 5e 15 38 8f 2a 89 ea ec 1f 6b 32 ac | 40 01 a8 9d 6d ef 9a 3d 49 f5 0e ed 4b 25 bf 66 | 4a 3a 1b d3 5e 8d e8 4b 86 eb 9b 22 f3 66 65 1f | 34 4f 1f 2f f9 5f 2f 03 c4 aa 93 99 67 82 03 93 | 8d 1d bb ad 82 4f 31 d6 ce d9 70 50 6a cf 98 1f | be 25 81 8e 89 fc af f0 bb 00 8d e6 17 50 b0 46 | 63 2d 33 46 30 2c 83 0a b1 42 06 36 2f 86 49 e1 | cb 96 2d 2b af 45 5d 0c f7 20 3f 2c 9b ee f5 cd | d3 ad 2a 5c d6 ff 9c 19 8b 4c bf 7c a2 ce db e6 | cd 42 ce 17 39 18 0c 06 e0 0a a2 34 c3 1f f8 bf | 29 00 00 24 a4 99 99 81 e2 43 a4 ae 1e bc 25 13 | 66 c3 4f 83 45 b9 e7 1d 5e 88 a8 5f c1 28 5f c9 | 26 3c b4 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd 95 54 b1 69 3b 7e f4 29 7c 0f ac | 98 50 71 70 b6 8b 96 c6 00 00 00 1c 00 00 40 05 | 6c 42 8c fa ff 99 73 81 25 ed 39 5b 20 de c3 d9 | 1f 48 3f de | libevent_free: release ptr-libevent@0x7f49b40256e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d0e8 | #429 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 0e 15 f2 87 ea 0f 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | 4f 0e 15 f2 87 ea 0f 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da1c2f8 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.637071; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008239 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d0e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #430 | libevent_malloc: new ptr-libevent@0x7f49b40256e8 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 2e 01 31 6e 0d 53 7d 44 46 b6 86 db 9d 24 c3 | 8e 20 b7 09 88 fd 7f 5f 42 77 94 9b 2b 14 26 1e | 19 d9 59 c7 15 e6 b3 4e c5 b4 00 75 df f6 df 78 | 92 b6 52 da b2 f5 c1 7e 51 6a 19 42 75 d8 d6 1a | d2 1b bf 77 c2 a1 fd 60 92 55 8c af 82 3a ff 2b | da d3 d8 7c b8 64 4e 67 ad 1e 94 e0 d6 d5 bc 8b | 38 8c f0 e0 2f 7c 67 dc d0 7e 79 1f 3a 2f a8 39 | 0a 25 e1 f1 40 ed 70 ce 5f bc 78 1e 53 b7 5d 96 | b5 f9 01 a3 fb d9 1d 7f 0f 28 88 26 24 1c 86 de | ab 9c 71 99 9a 21 9a cd 65 b7 61 23 91 b7 38 5a | 91 fc a4 90 51 d4 61 68 27 f9 fc c2 8a c2 6e 64 | a3 8b ab 08 3f 1b 03 1e d8 88 e6 8e 7b a8 80 04 | c0 46 14 34 7d 41 9b 3b 78 8e 41 4a af 95 1a cb | ff dc bf 03 bc 6f 9c 5c 40 ce 9b 29 80 d6 e6 7c | 06 97 c2 9a 3c 28 e0 fd 51 4d a7 dd b1 ca 90 ba | 05 83 33 96 6f f3 42 4b 52 4d 9f fb 46 0f d5 49 | 29 00 00 24 88 5d 6b cc 4f 81 ea c2 84 27 4a 2c | 22 a3 fa a2 6e 77 2d a3 52 05 8c 6b 2c a3 9c ae | 01 33 fe ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 e5 24 41 b4 9f 18 3b bd f4 38 10 | fc 39 a4 3c 7c f1 9b fd 00 00 00 1c 00 00 40 05 | 21 51 e6 25 66 b8 f1 19 bc c9 d3 24 17 fc 88 c2 | 70 cf bc 06 | libevent_free: release ptr-libevent@0x7f4994033778 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da1c2f8 | #430 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 7b 88 df 2a f4 91 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | 77 7b 88 df 2a f4 91 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49880058b8 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.725394; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da1c2f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #431 | libevent_malloc: new ptr-libevent@0x7f4994033778 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 68 f5 99 c9 8b b3 3a 65 87 55 a5 27 dd e2 59 | 99 5d 4a 1a 87 aa 0f c1 7e f8 05 16 5c f3 3d 09 | 2e 35 14 7b bb 47 86 a0 83 a8 d2 42 f9 f7 05 cb | 1e a0 19 0b 33 94 79 d0 c5 3f a2 f9 db 0e 9c ed | e3 fd 0a c6 49 63 29 0b b2 2b 9d 57 0f bd 46 94 | d8 37 df 02 96 4f 8a ea 85 16 60 30 8d ff 70 68 | 2d 73 c0 e7 ac 2f 8e 94 ce ec e5 01 cb 5f 1e bc | a9 51 2b 3f 9c 80 f6 1e ae e6 00 02 65 32 8b b7 | ff 20 bd 58 a9 d4 0a 5a 56 48 ec 46 21 a3 55 b4 | 83 ec ef 39 eb 3d b6 cf 53 fe e7 9f ac 71 fa da | c9 98 8e fd b2 e5 c2 e5 63 53 fb 30 b6 47 a2 3c | 1d cc 01 07 82 8e 57 d6 be 3f a7 25 d3 67 2d 03 | 1a 2f 23 54 a4 22 86 05 92 df 40 d3 f4 c1 37 37 | f8 0a 9e dc f5 1a 97 17 0a 35 35 70 ef 8b 0d 4d | 8e 4e 38 60 2c dc 2d da f8 b4 9d af de 75 89 61 | be 27 80 a6 91 c1 9d 58 d8 42 93 c7 d7 7a 5f 90 | 29 00 00 24 c9 7f 16 fa d3 e9 a8 e6 73 ae 3c 3d | ec b4 74 d8 dc ab a4 ec 7e 2d a0 33 0f 36 34 9e | 47 2e 27 dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 1c 57 e7 38 8d bf df a2 76 c7 16 | 53 ed 22 1f 0c 2b 6b a5 00 00 00 1c 00 00 40 05 | 6c d5 6b 1c 1b 2a 94 db 63 74 e9 ed c9 85 c0 f9 | 8c a0 47 af | libevent_free: release ptr-libevent@0x7f49780335d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49880058b8 | #431 spent 0.0993 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 65 a2 c4 e2 1c a4 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | fc 65 a2 c4 e2 1c a4 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da24f18 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.81172; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49880058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #432 | libevent_malloc: new ptr-libevent@0x7f49780335d8 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb c8 07 8c 0c 19 18 99 c4 00 30 d9 d9 dd 0f 74 | 93 21 f6 99 6a 63 25 41 68 af b4 b8 49 7b 3d db | 55 ce cd f7 a3 9b c3 cd e8 5a 5e 06 34 87 10 fd | 2c a0 3b 4c db a7 f7 89 62 e9 04 af 5f 30 44 8a | 06 7f 53 af 82 3f 18 6b 58 a7 eb cb cc 22 97 52 | e6 b6 df 18 d4 c1 41 5c 4a 9a 6b 1b 7d 02 1a 7d | ea 85 77 40 47 51 66 88 1d 10 a8 19 9b 7b 1c 43 | e2 4c 4f d5 a2 60 73 ed c9 3f 9b 29 14 b2 86 0f | ad 75 50 11 8c a6 27 8e 2c 47 b4 bc 86 c0 fe c7 | 1c b8 4e f3 da 9d 02 57 04 f1 50 6e 83 ef 0b c9 | df 78 50 89 d7 f2 ab aa f9 1f cf 58 2d 85 0a 9d | 29 38 98 94 bc 4a 57 c8 78 ed 3a 74 29 96 5a 55 | 12 06 98 4d 93 d4 90 9a 20 98 2b 5d e0 8d b9 a2 | 49 f1 95 18 d1 86 d8 54 36 ab 2d fd 6a 7d 25 e9 | 6f 47 19 8e 96 18 03 06 0e 84 02 1c 34 2d dc 22 | b8 1f 0b 1d 57 be c1 6f 2d 28 78 22 58 9f 53 1e | 29 00 00 24 53 53 b8 0e 82 69 74 09 02 7c 3b be | 29 24 6d 4c 79 c3 82 da bd 3f 78 99 90 0a 47 7f | c8 50 92 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 07 9a 53 af 68 a2 ab f2 b2 4f b4 | 32 e1 fe 4e 8b 84 fe 29 00 00 00 1c 00 00 40 05 | dc cc 11 70 7e a1 b7 71 a3 0a a9 7d cf 2e 1e fd | 4f 8d ed 8c | libevent_free: release ptr-libevent@0x7f49b803c198 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da24f18 | #432 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 bb 12 ef 62 43 9f 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | e5 bb 12 ef 62 43 9f 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da875f8 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.873064; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da24f18 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #433 | libevent_malloc: new ptr-libevent@0x7f49b803c198 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 01 0d 73 41 29 0c 2b ee f5 bd 33 34 8f ab cb | c4 c8 b9 8f e2 80 a8 ba f9 cd 91 6a cd c5 ac ec | 58 04 2a 29 a5 f5 10 9f a3 d8 af 83 42 4e 14 68 | 1d bc 63 ba bb 92 99 44 14 96 91 68 b3 4c 3d 82 | 2e 94 05 34 12 9c 2d 0f 82 f2 cf 3a 58 bd 1b 6b | ec 76 02 0d a5 b2 3f 6e 1d ee 7d 4d b1 6b 90 26 | 59 f6 a7 b2 10 f8 09 45 0a 2d d5 3d b8 98 c6 b0 | 36 56 f6 58 87 b5 4f a7 0d fa 92 88 da 83 04 8e | 43 2c 46 35 24 78 16 a0 cd d7 65 12 37 7d 9e d1 | 50 b9 2a 6b 94 9e 97 be c4 34 a0 61 32 de 4f c7 | 6f 03 81 69 74 59 db f9 b6 91 8a cc 1f 3a 2a ff | e6 ad e0 61 d6 77 27 57 be d1 ed e5 4d 11 b6 8b | d6 eb bf 32 47 7d f4 9d f2 1b 28 10 4a 22 c2 e5 | f3 cc 0d 80 22 89 93 91 dd fe cd 58 5d 35 09 f8 | 9b 25 08 03 c6 f3 b1 17 99 ac 6d 59 ed 26 6c d3 | ad 5c d2 fd 34 cd 02 68 38 f7 14 27 f4 30 36 ab | 29 00 00 24 41 0f 2a f1 d8 76 24 b5 21 3a 9d 6d | 84 fd 1c b8 73 8f c7 1f 0f 06 1d 14 e1 cd 80 0b | ef 18 57 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 90 ec e0 31 1d 7e b4 f3 b6 c3 b3 | 74 e5 1e b8 1b 6b 28 ed 00 00 00 1c 00 00 40 05 | 49 01 37 53 b3 43 40 7f fe e0 4c 74 0d c6 0a c2 | 55 ee 65 bc | libevent_free: release ptr-libevent@0x7f49bc035f08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da875f8 | #433 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 aa 33 3a 7c f4 c4 a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 61 aa 33 3a 7c f4 c4 a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dabe7b8 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.935379; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da875f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #434 | libevent_malloc: new ptr-libevent@0x7f49bc035f08 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d bb 8e 28 41 95 e3 e6 b1 59 a8 f5 ad 71 72 d8 | 2c 79 90 c8 58 d2 b6 16 13 94 e2 66 25 e3 f4 35 | 0e d9 17 66 fd 6f 1b 9e 76 6d d5 e5 9e 4e f5 0a | 74 a0 8d fb 41 aa 82 c0 d2 dc 45 3a b7 ab ab 44 | 71 16 bd a8 10 7c b1 ad e6 ae bc 52 7c f5 67 5b | 60 97 fc 06 f4 e1 63 dc 43 98 5d d8 51 09 9e 97 | 3b cc fa 61 54 9e e9 97 de b4 68 77 76 88 5b ca | 48 88 38 0a 08 f3 eb ac c7 e4 d9 03 8d 1e fb 55 | df ff db fe 2c 76 73 14 a5 42 f0 92 7b 0e a7 6c | da 4c 82 84 e0 96 ec b7 32 3f 9e 1f f2 c3 08 ea | ad ce 81 da 4e 3a 74 0f 7e 19 34 3c 4a 23 3d 62 | 16 ca d8 8f 00 fd 14 07 2b 0f 50 21 48 21 40 1c | 79 75 30 2e f4 64 fb 6b 2e 1b 0c 1b 57 79 78 ad | f7 4e eb e8 6a 29 a2 c6 f5 05 b7 50 95 86 7e 9a | 30 6b b1 2f 7e c4 e2 08 c3 8e 06 40 96 fe 13 16 | 0e f6 99 e6 7f 32 3e 81 7e 98 a7 2a da 4d 4d 99 | 29 00 00 24 7f 4a ca 31 dc 8c 1b 7a dd 0f f5 dc | 6c 99 ee 2e 32 15 5b 35 2f 4d 61 03 b6 7a f1 20 | 27 64 84 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 73 8e 61 68 4f 5a d7 3a e3 f6 50 | 89 23 ec e3 d8 4f 48 05 00 00 00 1c 00 00 40 05 | fd fd 19 e5 f8 ef 92 c7 c0 29 9b 81 9d 4f 00 fa | e7 0f 15 23 | libevent_free: release ptr-libevent@0x7f4988033508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dabe7b8 | #434 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 6c f7 06 90 54 6e 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | b5 6c f7 06 90 54 6e 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49a00058b8 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10667.989724; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006218 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dabe7b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #435 | libevent_malloc: new ptr-libevent@0x7f4988033508 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 49 98 f1 19 2b 71 dd b1 ea 03 05 2a c2 d0 e8 | 01 02 37 43 aa fd 6b 98 b0 5b f7 fd c8 08 fb 4a | 08 ac d3 ce e7 6b 3c 6e f3 c2 62 81 68 70 f0 1d | f1 d3 c8 ba 29 bc b1 2e eb 42 af 56 52 32 a3 ae | 34 30 3a f0 bc 00 18 5d b9 c6 00 e6 66 15 5d 19 | 1a 6e d0 e1 73 39 88 2a 0f 12 e2 94 71 ac 75 7c | b9 a2 6b d7 7f 9f 16 04 a6 25 d0 6e fd 4f 1f 0e | 7b 97 ec 6b ff f8 e2 01 62 3b 95 5a 2d f5 77 d7 | 98 75 5c 07 27 ae ec 2f 44 bc d9 46 42 7d 71 65 | 15 eb 77 25 e6 89 2b e0 76 5f eb ce 6b 25 4f cd | d7 02 5a e1 b7 73 5a 3d 8c 4e bc ec e8 0d 09 0d | 3e 9c 5f 9f d5 6f 3a ba 16 ac 2d 8f ca 21 13 33 | 98 35 87 2f 12 35 eb 39 e3 40 12 07 90 d1 d0 69 | e5 33 98 fb 1e 9b c6 7c 60 af fe 30 f0 13 9b d9 | 9d e7 02 58 49 f3 08 aa d5 14 ea 07 b2 83 89 40 | ab 50 32 c8 66 3b a0 e3 ec 50 4c c9 af dd 62 81 | 29 00 00 24 70 9c 41 d1 17 16 95 8e c2 d2 5f 1e | 5c 0e 98 ac 9a 46 1d d4 c3 54 c9 8a 35 73 7f 5d | 71 1f a9 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7f dd 3e a4 1c 97 a7 d2 64 96 e8 5a | b0 8f aa 8e 05 df 4a 28 00 00 00 1c 00 00 40 05 | fa 0e d2 0f be cd 31 20 3d eb 78 76 75 05 89 de | da b0 04 02 | libevent_free: release ptr-libevent@0x7f4984043c18 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49a00058b8 | #435 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 02 ca 9a 7a 53 74 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | f5 02 ca 9a 7a 53 74 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eddd8 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.049126; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49a00058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #436 | libevent_malloc: new ptr-libevent@0x7f4984043c18 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 ab fa 98 37 8a c4 d0 a7 82 0c 0d 08 50 5a 8e | e5 8d c4 dd 7e f3 12 e4 c2 80 3d 39 6f 90 ef de | 9f a0 cf 1d 40 e3 ea 91 4f f2 6c 2b b3 0e 4e 1f | 56 97 e7 d5 2b 69 25 0a 47 4e f2 7d 5b 26 5b c4 | ff 50 81 57 e9 62 4c 77 3e fa 42 55 b9 85 0d 66 | f9 70 99 70 09 33 12 a6 65 1e 0b 30 27 26 68 8c | 88 e0 2c 6c e2 bb 0d f8 37 43 b0 12 24 3e 09 68 | b0 a2 a3 e7 47 e0 a7 f9 6b 4d 52 0b 6d c0 01 da | 9f 5f 52 56 0c 55 29 71 cf 8b 64 76 f8 41 83 76 | fc 59 c6 6c 5f 4a ba 4c 56 4c 68 7c d8 d1 27 ef | dd a4 6c e3 7f 4d f7 1b 06 90 e3 46 b1 1e 03 7f | 8e 4e 6d 81 a4 51 3f 29 9d 7a 29 33 09 4e 4a 4b | 9b 4b 07 a8 65 ca a7 e5 1c ff bc de db 65 a5 9f | a0 39 2d 7f 0d 88 d7 c9 e0 6b d8 8c 0c 10 a2 ed | fc fc ac 58 6e 11 93 6b 7f 04 45 24 b2 e1 b4 c3 | 7f 19 e1 99 69 01 53 8e dd 6b fa a1 6e 07 eb 40 | 29 00 00 24 e3 c2 65 d8 ad 78 6a bb 79 d3 52 14 | f4 b6 fa dc 05 c6 b2 36 36 a1 0d c6 81 54 96 fa | ea 87 65 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b de 84 8f 8f 5f 4e ec 83 23 fa 44 | 84 98 d9 6c 10 3f 8a a6 00 00 00 1c 00 00 40 05 | e3 9b 2f a0 5e c1 9c 99 1d ce f0 7c 08 bc e7 3e | 70 10 c3 ac | libevent_free: release ptr-libevent@0x7f49b801a678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eddd8 | #436 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 41 e2 8e 98 1e 22 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | 3d 41 e2 8e 98 1e 22 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da46368 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.106465; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eddd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #437 | libevent_malloc: new ptr-libevent@0x7f49b801a678 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 16 ee b5 af 7f 2c 8b 69 f2 a8 44 e1 16 58 31 | ac 79 92 5f e6 fe a1 7a cd 21 ee c7 48 d7 f1 69 | 16 ff a9 ca 2e 33 88 38 3c 69 22 99 16 03 bd d3 | 48 96 fe db 22 6d 24 8d 03 c4 bb be 26 c9 31 b4 | b9 c0 de 0b 8e 0e c5 c6 14 10 54 7c 8a 72 8c b9 | fb 4b 24 d1 e0 6c af 9b 09 df c4 01 8b 5c 5c 84 | 67 95 6c d0 3c 04 32 3d e7 41 e2 51 25 73 d8 c1 | ea 83 b2 63 c0 da bb 6d ba a8 06 2d 0f e8 90 ca | c0 e9 c6 74 dd 3f 14 7a ed 5d 35 eb c3 5a 79 63 | 0c 12 02 04 b3 82 cb 4e fb 63 b7 12 f9 94 88 d6 | ab a4 28 9e 0d a9 0d 4c a7 5b d5 10 9d 11 c5 8b | cb db ad 27 85 cb ab 04 be db ed 4e 4e 18 81 f5 | eb d7 24 f0 a0 ca f4 1a 02 5d 55 1f 17 bb 9d 6a | 4c 35 23 2b 12 db c9 77 96 ee 02 d7 9f 10 0f 63 | 01 8c c6 17 cc 2b cb 29 56 52 fe fb e0 94 3d b8 | c8 8f eb 6b 70 cb b4 2f 67 fa 2b 0d 88 e9 84 e4 | 29 00 00 24 27 9c 36 3a f8 79 33 20 46 93 98 e2 | a2 a1 a0 9d c5 d6 4a 8a 31 2e 3b 57 95 d1 37 32 | a6 bd 1f 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c b9 aa e9 91 f9 12 bc 4a d0 15 9c | 2f 32 59 7b e6 f3 78 0f 00 00 00 1c 00 00 40 05 | 55 22 0e 17 02 d5 45 56 7e 86 c7 67 51 d0 cd 3d | 3e 17 09 16 | libevent_free: release ptr-libevent@0x7f4988022c68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da46368 | #437 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 f5 41 05 b0 05 7b d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 07 f5 41 05 b0 05 7b d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa16f8 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.18084; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da46368 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #438 | libevent_malloc: new ptr-libevent@0x7f4988022c68 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 7d 5d fa d6 76 f0 f5 45 42 c1 20 22 f6 7f 13 | 54 ec c8 0a ad 71 90 a7 c7 ce 98 2c c4 f6 c3 13 | e5 a6 39 50 bc 79 8a cc b7 cc d7 53 78 eb 6f 49 | 7e 8e 2d d0 31 18 c4 a7 e2 ad 87 3e 6b 76 e2 3a | 6a fa 5d 22 d3 47 79 a5 d9 82 95 74 38 ab b8 72 | 6d 40 94 40 00 91 1f 32 f4 53 28 83 20 01 b3 25 | 1f cb ec 92 23 02 21 ad 0a 01 45 ed 89 17 04 90 | 0e dd 7b be f8 be 02 0f ae b5 a9 1c 3e 8e d8 fb | e8 31 26 25 56 a8 48 a0 23 62 6e 51 84 c5 6a 78 | 7b 04 9b 07 1b 68 6b 3f 76 e4 b9 4b 55 f8 30 44 | b5 67 e2 d6 95 5f 3f eb 2e 03 98 31 1b 51 f5 e0 | 86 86 10 90 64 2d c2 0c 61 57 54 a2 f5 0e 2c 7a | ba 44 cc f8 4b c0 34 c2 bc 42 ae 63 f7 0e a0 18 | cd fe ad a5 e4 bf ec fd 08 db f6 35 d4 b7 b6 34 | 7b d3 4e 0d ca 4e c0 da d5 51 8c 85 d1 a3 4b 21 | 67 5e fa d1 cc 5c cb 9f 45 89 a1 a8 11 6e d8 34 | 29 00 00 24 d1 0b 6d f4 8d 1e 71 b1 d5 f6 c3 f6 | c8 85 7e cf 8f 8e 79 fb 39 87 98 ee d0 9b 1d 75 | df 31 ca bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 e4 ab 6f b2 31 66 da cf 29 37 f4 | 92 2f cc 5d de 95 b4 ed 00 00 00 1c 00 00 40 05 | 5f a8 25 6a f5 79 6c d5 db c9 59 74 e7 45 e3 a3 | 62 71 e6 61 | libevent_free: release ptr-libevent@0x7f49a401d3f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa16f8 | #438 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 7f bc 9a 4f d3 17 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | b5 7f bc 9a 4f d3 17 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da56228 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.275233; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa16f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #439 | libevent_malloc: new ptr-libevent@0x7f49a401d3f8 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 fd ef 2b 87 61 56 67 8d d6 28 85 e3 2f 5c d8 | 78 fe 53 b8 14 e8 2f ac 76 21 7f 6a 64 4b 15 80 | e6 14 73 eb b1 56 be ee 9f 87 0a ee f0 a0 d8 9f | 49 50 69 7a bf 6b f0 64 70 67 67 27 83 7b 7f 1e | b4 bf 5c e5 ef 28 9a ab 0b 47 af cb 13 27 8c da | 99 81 45 f5 2a cb 95 ac 58 0b 67 d2 7e 9e 41 74 | 61 92 76 e9 8b c1 f5 28 29 05 a3 e3 9d f3 d0 80 | 68 89 7d 32 e0 0f f1 51 16 6f 70 d4 0a c7 0f ab | 80 66 14 95 a3 5b 9f e0 9a 86 26 09 01 9b 0a d4 | 2e 18 2f c3 23 92 81 9d 4f 5c 98 fc 87 a7 74 f1 | 74 57 89 83 23 b3 b2 ab fc 09 0d d6 8c 95 cf e1 | 7d 55 5b 1b 60 8d 54 b4 0f 17 b5 73 f1 42 d8 6a | 78 9e c1 ba 12 f1 7b 92 df 11 27 b9 38 56 14 f1 | a7 72 85 36 7c b2 29 ef 33 83 20 22 da e1 3d 7d | 3c d3 b8 7c 48 e3 2f ef 58 98 a6 0c 93 c5 ca 16 | 9d b0 9a c3 f5 81 69 69 9c 66 16 36 af 18 f0 5e | 29 00 00 24 d0 76 e2 b5 de 54 c7 32 af c0 6f 31 | 8a 71 5c 66 da a8 62 de 0e 5e 86 e9 53 4d f3 e7 | 7f dc 14 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cd 15 30 d9 2c 1b 97 9f 55 a9 ad | 43 1c 4c 98 83 ee 24 7e 00 00 00 1c 00 00 40 05 | 97 cc 79 6b 6a 77 90 88 ba c8 76 83 48 ca a4 2f | 5f 99 af 7b | libevent_free: release ptr-libevent@0x7f49a8049798 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da56228 | #439 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 11 ad 01 05 35 6c 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | b8 11 ad 01 05 35 6c 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da6be98 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.336538; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00835 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da56228 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #440 | libevent_malloc: new ptr-libevent@0x7f49a8049798 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 cd f4 ff 3e b8 2d 03 5a 9b 1b 8c e2 4c 38 c4 | ad 4e 33 88 f9 5d 86 86 e2 5c d8 bb 02 07 b5 8a | 86 0b 07 b9 d2 65 58 d5 7d 98 85 75 9b 88 b2 4b | d4 99 5c 4c 98 98 69 64 ff 16 b2 02 cc 77 e5 30 | ca 72 20 ae 75 7d 99 1e 38 c5 15 ee 9d c4 a9 19 | 70 13 d1 00 5a 0a 55 6d 59 d8 76 cf 86 8f 28 dd | 8c 6f 6b f6 55 80 99 cf a4 a4 60 97 ea 6a fa 37 | 32 23 f4 04 11 57 7e 97 76 e2 3a 3c 43 3f f8 23 | 7e 9e de 2e 2a 5c 04 aa 5e 2c 0e 1f 72 cc 4a cb | fc 9d 33 1c 45 f0 d0 ca c0 51 0d 58 26 05 f1 35 | e8 f8 2d 08 6a 16 41 cb 66 c7 3c ae 7b d7 76 84 | ce 75 dc e6 bf 1e c0 e7 90 6e 4d a6 50 c4 51 9b | c5 77 73 97 9a 14 a6 e5 ea 43 c2 0f e5 21 06 9c | 83 ab 10 67 40 1c fa c2 29 6f dd 2f 1b 53 b5 a3 | cf 2d 64 bd f5 c4 aa f7 d0 cb d0 e4 93 fa a7 3b | 57 8d 11 39 58 17 a8 e3 b2 49 f0 9a 0c 63 55 4c | 29 00 00 24 f8 06 81 84 30 b2 da 7c f0 90 67 bf | 36 23 0f 43 13 e8 78 57 cc c8 2f ed b9 99 6d 49 | 96 a1 6a 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 99 76 59 b8 c8 cf d8 0e 69 27 da | 53 db db b3 6a b2 75 34 00 00 00 1c 00 00 40 05 | 3b f6 0d db 65 ba 6c 87 69 1c 85 ce 6c c4 51 21 | 53 0e 09 8e | libevent_free: release ptr-libevent@0x7f496c033718 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da6be98 | #440 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 dc f4 ee a9 93 db 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 66 dc f4 ee a9 93 db 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da78e68 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.393861; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da6be98 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #441 | libevent_malloc: new ptr-libevent@0x7f496c033718 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 79 02 aa d9 e4 e9 67 40 60 5e 96 63 fd 38 57 | a8 f5 05 15 a4 12 df 7f e5 36 18 28 38 a7 56 21 | f0 34 6e 75 ee 12 ba 79 cb c6 10 a6 70 d8 71 9a | c6 15 91 ea 1a 78 ed 52 d8 9f 4e f2 e5 95 b7 3b | fb 66 fa e5 21 3e 58 1b 65 ee e0 8a e9 02 fa bf | 65 ce 87 36 e2 d9 d7 8c 0b 95 96 a2 f7 d1 a1 a1 | 87 f1 6c 41 c6 40 b7 b6 9e 83 f5 8e f3 e5 49 46 | 29 c9 94 37 3d 71 c2 1d 1e 10 b5 ab 7c 72 39 32 | 7a ca f8 fd 45 21 a0 d3 43 92 de c6 36 52 ff 43 | 91 ea c6 75 c2 38 d1 6c 26 c6 fe 6d a7 88 0a 4f | 1d 36 4d 98 8a c1 51 25 65 87 30 95 4a 3c ec 7d | 29 c0 60 cb 6d 83 fd 99 09 4b 0a 76 27 07 c4 8b | 15 7a a2 3d 1d 05 b4 e1 bf 99 df 3a cd ed 61 18 | a7 4d 18 78 aa 36 8e 1e c1 b3 38 6d f7 16 27 51 | 08 80 26 0e 94 24 5a 8b 8d be 74 5a 03 5a 18 55 | 5c a7 71 f9 31 78 d3 bd 00 a0 ae d9 82 50 d4 42 | 29 00 00 24 d5 45 5f bd 1f 23 a3 1c 8a a4 72 fc | 13 1e 64 a0 c8 19 9b 60 ac 82 0e 36 4c b7 1c 9d | 15 ea 25 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 e2 9a e8 b5 8f 49 cf 15 68 7d 8e | 8e 4a 99 7a f1 5a d5 e2 00 00 00 1c 00 00 40 05 | 0d be dd a4 fd e4 15 9b 6e 45 1f 66 6f dd b7 44 | f4 89 c7 ec | libevent_free: release ptr-libevent@0x7f496c033618 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da78e68 | #441 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 91 9e f3 ee 98 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 26 95 91 9e f3 ee 98 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0494 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3e78 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.454192; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006789 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da78e68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #442 | libevent_malloc: new ptr-libevent@0x7f496c033618 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 cb 58 17 95 a4 54 1a ca ab 2d 80 c2 fe a7 c9 | 98 4a c1 c5 a0 e7 4b 98 0a 3d f0 ad 87 51 1e ff | e4 64 d1 5b 8d 93 43 83 eb dd f7 a8 8d 47 de 78 | a6 ff 59 7f f5 d2 bc 64 da fb 95 25 61 c9 fc 37 | 65 27 f3 6b 84 6c 08 65 f6 d9 d7 7b c8 5d 1f a3 | 82 39 c7 2c 69 8a c9 a5 38 97 4a 50 1c 75 7c 85 | 2c 37 0d 02 f8 3c 93 84 9f f1 4f 50 9d b6 02 52 | 0b 3d f6 99 6b 07 c0 a3 c8 98 04 24 da 80 b0 cc | bf 79 88 15 a2 ab 49 94 f2 9a 86 45 5c f8 48 d5 | 3c 51 07 61 b6 50 78 b7 a0 4f a0 3b 70 5b 3f af | 91 cd 8c 00 24 7d 76 7c 96 53 13 f8 8a e2 63 9c | be 55 40 82 e4 19 62 be ab 43 65 4b a1 d9 d2 06 | 65 d0 f8 4b bf 7c 87 4f ff ff ec 79 5a 36 a6 cb | 2a 8d 79 0f 10 19 56 cf 8b c1 f1 0f 3e 56 58 83 | dc 4a 10 c7 30 f2 70 d3 a1 87 df fd 4a 5a 06 5d | 4e f2 a3 3d ce 68 6a e0 3f b9 d2 93 03 94 bc d6 | 29 00 00 24 e3 33 df f8 78 8f 44 77 90 e2 9c 0d | 1c b4 e7 8b 05 41 1f f0 f6 1d ee 81 f4 97 54 5e | 1b cc cb 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 5b 66 b1 da b1 5a c0 a6 85 45 cc | fc 9d 59 ff 4f 1e 91 c9 00 00 00 1c 00 00 40 05 | ba 42 fa 3d 7f aa aa c3 84 26 b8 54 f6 d0 86 0e | 66 47 5a 2e | libevent_free: release ptr-libevent@0x7f49bc03b5c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3e78 | #442 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 42 fe 3b 06 7d 03 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 7d 42 fe 3b 06 7d 03 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da220f8 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.511555; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3e78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #443 | libevent_malloc: new ptr-libevent@0x7f49bc03b5c8 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 c8 6e 3f d8 a8 94 9a 85 68 ea 77 e2 cb 17 07 | a2 8f 22 8b 08 0c 45 ae 09 24 07 4d 25 70 1b 14 | 7e 42 3b c5 3c 18 c3 66 3d 1c 3f 35 10 57 70 10 | 8b 32 54 59 b1 d9 bf a2 00 3f 95 f9 b3 e4 2e f9 | 3b 73 5e dc a1 db ec c4 c2 1f 04 2a 3a fa 0b e8 | 65 31 0c fe 1d e8 a1 8e fe 37 2a 05 10 e4 f0 5b | 76 90 a6 c0 19 79 2d bf 9d f6 74 e6 96 10 23 95 | 09 48 43 8f c5 bb 62 7d 88 5c be e2 b7 5c 56 47 | bb d9 46 48 04 c8 4f 83 74 35 b8 0f 0d 17 99 49 | 44 96 a3 a1 e8 76 eb 90 ba d1 2d e9 3e e6 00 78 | 7e 5a c8 20 d8 49 e5 61 6b bc de 2c 52 9b 3c b3 | db e4 a0 44 cf b9 b9 16 da 6f b8 2d 3c 2f 7d 49 | 7b ab 33 05 92 1b ca 25 aa ea b2 64 bc 16 9b 6d | c3 6a 97 a8 78 c1 85 c6 f4 4d f9 4f b0 df fa 63 | 18 b3 62 64 76 a8 7e 62 a7 9f 17 31 25 25 95 43 | 63 7b fc 29 82 4e a9 ef 70 54 59 a0 e1 04 bd fe | 29 00 00 24 cf 4e b4 e1 a5 e9 91 cc e1 fd 79 1a | 38 24 66 64 84 ab 82 1a 99 ab bc 26 80 23 55 18 | e8 31 8a c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 da e8 98 56 7f b9 b1 fc a7 af 0f | 4f b9 b7 9d 69 f3 99 aa 00 00 00 1c 00 00 40 05 | 77 e3 63 c9 3b 5b 86 36 ac 50 31 dc 6a 77 7c 0b | 85 c3 76 af | libevent_free: release ptr-libevent@0x7f498c0124d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da220f8 | #443 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 31 39 36 0c d1 c2 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | cf 31 39 36 0c d1 c2 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3c238 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.585835; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da220f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #444 | libevent_malloc: new ptr-libevent@0x7f498c0124d8 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 68 a1 33 b6 54 67 d4 61 59 29 01 c8 26 ba 66 | d5 0c 44 e6 c1 fd 25 04 11 6f 00 ee ea 00 89 8f | 68 2b d3 ce ab 11 06 5a b2 d7 2f bf d3 27 66 8b | d0 29 c4 a6 f3 f0 38 fe 95 4d 14 e3 98 53 15 da | 0b c1 ad f3 f3 d4 8b a0 a4 84 fc 49 ab c4 3b 65 | aa a1 bc dd 73 79 47 31 8b 0d bb 37 f9 ef 06 2b | 4d 36 6d 55 34 9f fb 54 e6 69 84 5d 69 a7 31 69 | b4 ea 32 8f ea ed f3 9d 72 a6 30 39 c5 63 ac c1 | 24 05 7a 8a 13 59 89 fd e9 0c 57 8b c5 25 57 fe | 7c 7e 81 33 20 43 91 2a b2 39 fc b0 2d 00 75 23 | 00 5d fa 95 71 b1 7e 02 28 fe f9 98 3f b6 8a ce | ec c6 25 bd 87 73 c0 d9 bc 75 80 bc d3 8b cb af | 3b 90 53 88 26 fe bc 51 55 6b 07 40 0a 62 04 56 | 33 6b 87 7e 67 da 38 eb 91 1b ba 4f d1 ac 3c 73 | 4c 9c 15 86 0b 1f be 17 30 9f b6 b7 f8 65 e9 65 | a2 4c b0 35 f4 98 80 d5 96 44 e8 8e a4 9e 54 e2 | 29 00 00 24 07 08 91 41 64 ba 86 a7 09 76 72 47 | 3b ba bf 8c 0e 24 29 be f0 c7 04 b7 cc 31 7a 92 | 5f 49 77 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4e 19 20 1d 02 42 b3 ce 03 36 9f | 82 44 92 34 54 56 0f 0b 00 00 00 1c 00 00 40 05 | b5 2a 53 1c 77 a0 b3 e1 14 4b f6 df ce cb ed 96 | 23 2e 79 f5 | libevent_free: release ptr-libevent@0x7f498402dbc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3c238 | #444 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d fa 0c 55 40 f1 70 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7d fa 0c 55 40 f1 70 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9db0f8 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.647175; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3c238 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #445 | libevent_malloc: new ptr-libevent@0x7f498402dbc8 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 9e 4f 85 31 de 18 63 c1 e6 76 55 d8 a1 6a 25 | 3b 5b bc 40 7a a6 34 7d 68 b6 b7 0d d9 f0 e9 7a | b6 ee d1 43 c2 75 e4 b2 5d 2d 6b df ea ed 1d 23 | db e3 d0 09 d4 0f 9c 6b 2c 13 ec 3c 3a 75 48 02 | 71 18 d2 e4 e6 dc 77 61 57 ea 06 22 bb e3 91 75 | 21 34 bb 0b 77 01 67 a8 7b 7d ee f8 1c bd 75 c2 | ce de 64 8d f5 0c d2 20 e2 2b cb e9 85 e8 c9 bc | 77 e2 69 21 06 cf ec 5e eb 1d 9b 0e bd 3b 3d 72 | 72 73 d7 d6 4c 93 56 9d d4 5b 0a 2d 25 87 1b ab | 32 71 1b 36 88 58 f3 95 67 a8 1d 1c 20 2f fe 4b | b6 87 f2 1f 84 d4 81 fe eb cf 5a 01 ed d4 8b bc | 6b 6e f0 8a 2e 7c d3 e4 35 10 c3 9b 74 5b ab 00 | e2 32 da bc 61 1b 1f 63 bb 46 4e 1f ce 27 f7 a4 | d4 68 65 cd d6 21 58 8c fe fa ac f7 4b 21 13 01 | 8a 99 e3 98 5f 2c e6 9e 2b 15 71 35 5b 74 de 64 | a9 63 41 e9 78 e6 fe a0 92 ff dd 8c 6c c7 34 aa | 29 00 00 24 4f 01 48 f4 ed f0 6d 36 84 83 23 f7 | 55 be f8 46 1c 2f b9 e5 e1 3f de e4 65 17 85 2e | bc 5a e8 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 52 71 e1 e3 bd f0 17 1a 82 95 ec | 6c 61 86 98 81 81 12 50 00 00 00 1c 00 00 40 05 | d2 32 d2 c0 4a 52 87 d2 5b b6 9d d2 69 87 ba a6 | 09 86 2d 61 | libevent_free: release ptr-libevent@0x7f49b00284c8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9db0f8 | #445 spent 0.527 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 0b 7c 6d d0 c7 31 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | 04 0b 7c 6d d0 c7 31 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da47a78 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.704939; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9db0f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #446 | libevent_malloc: new ptr-libevent@0x7f49b00284c8 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 09 86 88 3f c0 29 16 53 82 fd a5 ed 7d 69 4c | 27 b0 d4 a0 c5 66 10 4c 51 d7 55 01 0d cf 5b c2 | 27 ed 8d 51 f5 f0 45 d8 12 ac b2 55 96 91 06 37 | ce a6 ad d3 5f b4 91 7f 3a 8b be ad 8e e6 dc 76 | aa 80 2a 01 f4 1f c2 9a d7 94 22 22 c7 fe ba 51 | b7 6e a0 4d b3 72 e6 93 b8 b5 95 b6 81 6f ce 64 | ce 70 5e b0 c9 25 1d 48 2d 7a d9 0d 3f 7a d9 bb | 81 4c a9 e1 ce 67 e8 c3 c9 a4 85 04 e8 f3 dd 05 | f1 ce ad 87 99 55 75 f0 04 ad 2c 74 da a6 50 86 | 88 80 23 62 fc c2 9e b5 8c 6f 22 c2 3e 50 da 11 | bf 6a f5 bd 73 b8 d1 a9 76 3a d8 53 fe 24 3d 16 | 36 55 7f 73 fb 11 49 11 88 ea e2 33 bb ea b9 d8 | ee e2 b6 d0 44 b2 cf 3a fd 55 56 19 ad 05 e1 ad | c9 41 40 9c 61 d3 0d f0 5d 15 bd f8 c8 75 cc 30 | 24 1c a1 87 c8 85 9a 32 8f ed f2 61 08 6f fd e8 | 98 28 48 9d 30 4f 4e 8b cc 3a d7 52 3c 41 37 67 | 29 00 00 24 c7 66 e5 e3 db 53 e3 63 96 1d 46 13 | 16 6d eb 7f fa d6 5c 61 98 f6 2b 7f e6 f9 cc 5d | ac 13 b1 c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 df 17 2f 44 f1 48 c5 48 57 28 bd | 44 6f 54 d5 27 71 c5 63 00 00 00 1c 00 00 40 05 | ce 91 1e 6b 0b 4c e6 92 e2 37 4e 2c 60 1f b9 40 | 7d fe ba 8e | libevent_free: release ptr-libevent@0x7f4994033678 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da47a78 | #446 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 95 58 12 49 41 60 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 5c 95 58 12 49 41 60 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9af988 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.765235; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da47a78 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #447 | libevent_malloc: new ptr-libevent@0x7f4994033678 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e d6 ce e4 07 3b 2e 06 3f 1f 56 51 d7 6e ee 8e | 4b b0 ba e4 01 55 ac f8 30 bf 0f 06 16 c2 60 65 | a2 d9 b1 bd 70 eb 27 e0 fe 3d 70 51 08 d7 79 eb | a0 65 3e d9 d0 f6 8f 59 f4 96 d6 96 c4 da 92 ec | 1a 46 63 3e 94 56 38 52 c0 04 d8 0c 16 12 be dd | 53 8a 95 88 83 c4 be a8 0c a8 22 75 02 63 b3 c1 | 42 25 3d 41 ae 54 3c 5d 44 b3 58 d9 10 fa 3e fb | 33 bf a7 57 d6 00 3b 08 1d 26 fe 4d 22 f3 a6 8c | 21 fb 3d e8 6a 6f 73 30 10 4d c7 1b 5b 06 3e c3 | b3 fe 29 38 78 a1 22 6a 24 fe e2 24 a1 17 ac 68 | 99 6b a2 82 c6 6a 6c 0a ee 8d f1 80 a7 64 36 27 | 03 63 6f d1 c2 75 45 d9 91 ab 15 47 12 4e a4 36 | dd 5b 10 e9 fd 78 38 56 61 b4 86 41 53 14 f0 7b | 00 07 f9 2a 98 ca 20 4a d2 5c 2c 3e 24 04 45 57 | 7b 96 a3 6c cb 6d 28 8c 7a 96 6d 5f 41 9c 59 12 | 79 eb ba bf b4 93 d2 03 f8 8c 40 47 4d 5b 3c c7 | 29 00 00 24 6c 82 8b 5f d0 e2 6b 45 4a c2 60 55 | 65 9c db 9e e8 7f 00 f9 98 25 96 b4 0c 4d 1f df | 61 95 61 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 69 92 df 10 17 d1 6d a4 a2 1a cd | 61 1a 9a 77 11 f9 4c 76 00 00 00 1c 00 00 40 05 | 4f 11 20 b2 20 6c e7 52 2c 23 21 ea d9 ee 8d e7 | 1e cc be e7 | libevent_free: release ptr-libevent@0x7f49a4038f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9af988 | #447 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 59 14 14 b8 b3 1c 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | fb 59 14 14 b8 b3 1c 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da8d238 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.82762; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9af988 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #448 | libevent_malloc: new ptr-libevent@0x7f49a4038f28 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dd cf 05 13 a3 d6 0c 67 c1 b2 8a a0 31 fd f6 | b6 45 59 38 79 12 1e 63 ee bf 22 a4 83 ff 74 f8 | f9 44 d7 47 db 7e 5b f8 b9 e4 66 41 52 7f 25 10 | 54 76 f4 06 19 64 60 64 6f b0 62 b7 04 50 17 07 | 28 dc 22 ee 6d 9d 52 60 17 0f 05 ba 1b fc d4 0d | 6e 43 af 4f fd 26 54 5b e4 bf 07 12 eb 13 ed 3f | 27 99 dd 7f 7a ff 9e 35 b5 2c c4 77 6a 6c 7d a3 | 7d 7b 21 ff 3c 5e 34 c1 6c ae 5e ba fc aa fe bd | 53 c2 b3 d0 e6 c3 1d aa e1 f6 31 f0 01 06 86 39 | 7f 25 b1 70 64 64 1f f3 c4 00 1a fa ec 0a 9a 6f | 70 47 0e e2 66 ef 1a 7f bb d9 4e 51 f1 80 c7 0d | df 71 3c 7c e7 1f 4d 04 63 70 6d a8 50 38 44 68 | 30 8d 95 0d 08 4b 2d f0 75 c0 92 2b 14 5e d2 2c | c2 a0 d6 1e 2a 8b 4d a1 53 a6 d4 a5 26 1f 58 ab | 2a 86 88 57 7b e6 19 11 0a 0b e9 27 ed 0c 85 e5 | 59 55 5f 92 15 13 0a 69 c1 5a a1 bb 24 41 c0 f6 | 29 00 00 24 4b 01 4d e9 f5 36 09 d8 34 b8 d6 8e | 22 5c a6 36 e4 2a 4a 10 c2 5e ed ef 63 af 80 89 | 2e 3a 2b ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 a0 bf 72 ea ca 90 d2 04 c5 b9 8b | 58 6e ef b8 df 44 8b 9a 00 00 00 1c 00 00 40 05 | f5 f9 cb 32 e2 a1 3f 5f 00 2c 8d d1 af 41 a8 a6 | 66 3f 06 fc | libevent_free: release ptr-libevent@0x7f49bc01a7b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da8d238 | #448 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c2 fe 28 a0 c6 93 5c b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | c2 fe 28 a0 c6 93 5c b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac5bd8 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.887016; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da8d238 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #449 | libevent_malloc: new ptr-libevent@0x7f49bc01a7b8 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 1d 86 53 c3 53 9f 08 83 8d 07 ee fe 51 50 a6 | f6 5c 8d 76 a9 16 d8 1f ff c0 42 95 6d 87 94 f1 | 5c bf 42 2e 91 b8 3e f5 17 76 98 b6 87 ed 33 63 | b5 7f d5 a5 2e 1f 65 82 13 54 9f 18 e7 34 58 c4 | 63 a9 0a df f1 cd b5 59 90 26 bf 62 a0 2d c1 c3 | a9 ba c1 43 11 e3 1a d2 3f f5 c8 c8 65 ac 8a 63 | 50 a7 e8 40 2a 80 10 f4 85 6f 96 51 aa 81 5a 01 | f1 86 80 81 80 78 7f 39 b0 e3 a7 d2 1a e0 df 04 | 48 f6 0c 2e 80 87 63 5b f8 e6 cc b7 c2 21 c8 cc | 0b e4 ad 52 f0 d9 5f 12 53 88 38 4e 3b c8 79 d9 | 96 de f1 a7 a9 f9 a2 e4 4c a2 3b af b7 9c d2 c2 | d5 a5 f3 da a0 bc 57 02 80 64 f1 df d0 a4 71 7f | 76 92 b4 cf 85 b7 1f 84 2e f8 c8 0e 6b 2e 1b 12 | fe 70 a7 bd 4f 7f e6 fa 0f 04 06 5c f0 43 d9 68 | 68 f4 cd de 13 22 fa 6e d4 04 02 1b 26 c9 76 c3 | 26 fb 36 77 55 e0 68 a2 94 c5 58 bd 95 e6 7e 2c | 29 00 00 24 1e 1c 9e 9a 06 8a 50 ff 83 ea 08 55 | 5a aa f6 d0 0d 18 df 46 03 83 97 35 df 56 0f 73 | a6 3f 50 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0e 21 89 04 33 04 96 ff 8c 0e e9 ab | 22 aa ac f0 fb 91 45 f3 00 00 00 1c 00 00 40 05 | 2a a9 5c 38 2d da 8b e7 aa 7e f4 36 91 ba ab 66 | b4 d5 09 b9 | libevent_free: release ptr-libevent@0x7f49a40123d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac5bd8 | #449 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 6f a7 47 8d 37 51 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | a0 6f a7 47 8d 37 51 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da3f018 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10668.950332; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac5bd8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #450 | libevent_malloc: new ptr-libevent@0x7f49a40123d8 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 a5 74 57 ed 8c c0 bd 32 33 11 19 1c 3a 2e fb | 11 71 a8 65 1c d6 35 b2 c4 3a c3 2d 3c 68 8a 79 | e1 e3 c8 3a 4d 82 20 39 61 6a 7b 41 a8 2f ec 7b | bf a0 58 9e 59 a1 87 d2 f7 6d e8 08 85 bc cf c3 | 5e 5e e2 56 db 41 0b 72 41 c5 7e 8a 32 15 94 f4 | 47 47 94 1c 33 75 23 89 e0 4a 79 c4 96 37 bf cc | f9 5a 9b b9 d6 b0 a8 a3 10 b4 15 75 b8 e1 34 08 | b5 e1 80 2f 42 0f e7 4c ea a1 01 c4 c6 49 4a 0c | 5e 0f b4 26 59 50 16 c6 12 61 3e b0 e6 62 15 59 | 8a 9b ae 3b fb 4b c6 74 b1 bc a4 fb 55 cb f2 e6 | ed df 4f 9a 5c 60 89 f2 74 f4 aa d6 31 98 9e 8c | f3 34 46 6b 2f c8 fc 6c fb 3e 01 e2 be 7d 98 3b | a1 92 b3 d3 7c 76 2b 01 2a 62 61 51 46 01 05 c7 | a3 fc 38 d6 77 eb 55 ed 6d 10 fd 0a e5 d6 57 2b | 3d 63 8b e4 cf ac 04 0b f7 0e 5a db 37 10 3f 81 | ab 7c 8a 47 99 f4 8a 90 ee 29 1c c4 bd c2 b2 d2 | 29 00 00 24 dc fd de b4 d6 73 d0 71 9e 0f f0 0d | d0 45 2c 00 56 2f 67 89 d3 63 b6 77 99 fe 80 9e | 37 44 9d a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 22 7d 6a cc 55 b5 f9 0e 76 b8 4d | be c0 53 a5 2b d7 c0 25 00 00 00 1c 00 00 40 05 | 52 87 07 67 02 c4 11 ec 9c 5b 6c e6 f1 18 36 e2 | b0 e2 21 15 | libevent_free: release ptr-libevent@0x7f497802dd68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da3f018 | #450 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 e9 5f f6 9b 5a b4 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 89 e9 5f f6 9b 5a b4 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9f3ca8 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.012646; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da3f018 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #451 | libevent_malloc: new ptr-libevent@0x7f497802dd68 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5f 97 a3 fa e1 79 3e da a6 11 a3 46 af c0 ac | e1 62 f7 23 0b df 3e 75 c8 39 44 58 33 49 6a a4 | bf f6 02 87 20 00 69 c4 48 66 e9 a2 71 19 8c 0a | 30 2f 78 31 e4 9c 00 f8 b9 a9 ce 92 92 97 70 02 | 55 18 01 9d cf 2a 1a 53 40 26 2c a3 a1 f5 3a eb | 15 fe 48 93 0c e3 4d 35 e5 e5 cd 38 b9 6e ad f2 | bb c1 24 c9 ff 72 ed 49 d4 e5 1e cf 6e 5e 51 b1 | a3 d5 6b 47 f6 31 91 27 50 63 00 7d ca d9 f5 f3 | 27 ff f2 2d 74 17 22 ed 7a 39 dd 83 fc 78 c7 4b | 95 3a f9 76 71 35 63 75 5a eb a1 81 5d bb 95 27 | 61 62 81 c9 ae 56 90 bb 01 77 00 13 ed e8 86 b4 | 04 ad 99 35 6b e6 6e 0c 3e 7f 67 bc 42 ec 20 88 | 5f d8 65 6e e8 d0 6c b1 22 12 5f a3 cf 15 b4 3c | d3 d4 29 4c c5 13 34 67 c7 fa 90 84 04 6b f0 36 | a4 87 2a 07 be 3e 25 73 61 ed d4 a1 1d 8e 4a 97 | c0 b6 3f 4e 9d 6a 2d 47 68 c6 99 d1 c4 49 d1 47 | 29 00 00 24 93 8a 5b e2 af 5c 33 1e ea a2 57 a4 | 14 76 db 55 a5 81 94 78 b6 a5 05 23 4b 4e ff 3f | f3 bf 72 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 90 01 82 6b b3 25 12 42 35 ec 12 | 4d 07 71 bb 2c 80 fa be 00 00 00 1c 00 00 40 05 | d4 94 7e fe 45 34 3d 31 33 e4 5c 2e e0 ee 4e c8 | b3 78 cb 7a | libevent_free: release ptr-libevent@0x7f496c02dda8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | #451 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 30 89 d0 c6 fe 2e 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | d6 30 89 d0 c6 fe 2e 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ab2e8 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.068995; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9f3ca8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #452 | libevent_malloc: new ptr-libevent@0x7f496c02dda8 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 e8 20 60 c7 26 6a 12 ca 34 19 82 3e e4 1b 13 | b4 b1 4f 5c cf 33 c9 51 41 03 16 0e 7c dc 23 2c | 11 66 25 f2 fc 31 76 a8 07 99 83 6b 50 aa a6 ad | 1e 91 a7 5e a8 4b 47 41 20 d5 64 49 fe a1 9a 58 | 2c 29 84 65 3b 14 bf d9 c2 33 a2 ae a8 8d bf 4e | 0e 9a c3 0c 50 29 28 e6 18 f0 58 42 2c 54 8c 05 | c0 9a f9 13 8a 62 8c e0 c6 9b 24 f9 57 d9 0e 45 | 25 04 4d 12 ea 81 eb ba 50 63 c1 94 2b a2 ac b3 | b7 0a ac 2a 1a 65 2b f7 1d a8 e7 99 a4 1b 49 f5 | 31 25 ac a2 1e 08 5e af 07 74 ac f9 9c 98 ea a6 | d4 30 b8 de 71 73 6a c1 0c bf 5b aa 04 1f 36 f1 | ae b3 b8 39 5f 77 ee 25 6d 74 96 e9 20 af 61 ed | b4 32 80 38 69 a6 3c 55 5c 24 eb f5 4b 20 38 f2 | 67 f5 9f 61 8a 0c 04 05 a9 f4 38 72 13 38 69 d8 | 64 9b 6a a4 b2 66 68 0e 1b c2 3a 00 14 ec 4a 18 | 65 84 aa 54 2b 28 81 ca 73 dc 24 51 a7 11 01 e2 | 29 00 00 24 05 30 a3 3b c8 9d 07 19 46 94 e1 b9 | 44 ed 19 a7 62 90 f2 46 96 41 d4 7a 8c aa 5b 60 | 87 20 49 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 a2 b8 2e 7b c6 5b 8a 63 08 9a f5 | 77 c1 c2 40 5b 1c 06 ff 00 00 00 1c 00 00 40 05 | f6 f5 cf 16 c1 12 d7 19 4e db e9 50 fa 46 c9 cf | 03 d8 15 e9 | libevent_free: release ptr-libevent@0x7f4974012288 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | #452 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b ce e5 9d a4 44 94 5b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 4b ce e5 9d a4 44 94 5b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da209e8 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.12931; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ab2e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #453 | libevent_malloc: new ptr-libevent@0x7f4974012288 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 12 c6 2a 9f 07 83 14 00 32 d2 f6 d9 78 e1 3a | eb 36 3d 57 d7 f7 73 8f ff fc be 2a f6 b4 ca 2b | 60 c6 ed 81 87 bc fb 8d 07 60 3c 59 19 f3 ea f9 | 86 f6 18 a7 e5 26 14 96 bc 98 e6 fa 7d c9 67 26 | e0 8f 07 ca 3f e0 6e cc e4 3a fc 3a 7b 92 a6 d9 | 3e d4 b6 3f f6 34 9f 7f cf 60 19 eb 73 94 b7 74 | cc 2e 45 16 84 1b 9b 81 8d ed e2 ed fb 9c da bd | d1 a9 9a 9c 41 38 0a 21 b9 4a c1 b6 66 d0 b3 80 | d2 17 ec 79 ca 8e 0b e4 6d a5 42 1d 29 36 67 16 | 70 db 18 7f 36 e4 bc 46 d1 66 20 5f c4 b7 9b 96 | 28 c6 73 32 3c 10 1c 36 e9 9a fb 19 46 96 c0 0f | 30 2a 76 83 c8 c9 6f 9e 03 64 e4 a8 f5 25 21 ec | 7c 57 80 07 7a 9d a3 e1 f8 f0 c2 56 fc 55 6a e7 | 55 c0 a2 21 f9 c0 39 23 0e 98 f3 e8 b7 d1 5e 78 | f6 bb cf 20 25 e1 20 ed 9e 77 5f 37 48 55 a2 aa | 49 3c d4 45 a6 93 9a ae 24 2f 35 23 30 9b 3d 7c | 29 00 00 24 0c 5f 6a bc c5 0c 1b 1a 67 b9 91 26 | 6f fd 42 cd e3 dc db b6 15 17 6d a8 1d c1 72 18 | 3e 8c 11 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 88 6e b6 65 d8 f2 f7 f4 2d 23 d6 | 33 44 bc 1b f0 04 e1 8e 00 00 00 1c 00 00 40 05 | 3b cb ac 23 64 fa cc a4 06 5d fe 94 4d 0b f6 61 | 13 7b 39 a3 | libevent_free: release ptr-libevent@0x7f498c038cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da209e8 | #453 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 3d ec 0d e1 4b 70 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ec 3d ec 0d e1 4b 70 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0716 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dab73f8 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.190651; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da209e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #454 | libevent_malloc: new ptr-libevent@0x7f498c038cb8 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 67 70 66 bc 00 2d 7a 2b 56 2b 6d d4 df 64 be | 85 3d e2 c5 82 20 f4 58 1a 58 d8 f6 70 6f 6a b5 | c3 aa 60 c5 30 f2 1d 7c 65 dd 51 4e 30 74 22 c7 | 4a 2a c6 ca ed bd 15 c5 2d ff ae 9c 4c bc c8 78 | 0a 2b b0 c2 11 e3 87 0c 70 c4 e5 00 12 ba ac a5 | fe 1e bc b7 2a f0 6d 22 ea 90 2f 39 c4 01 9d 46 | 98 d1 d3 2f e6 f8 f3 af b9 c1 f3 f8 5b d8 74 50 | 4f d1 ed 49 62 7e c7 ee c9 e5 04 17 20 bc 9c 47 | 5b b2 1a c7 a1 0c 64 38 c7 99 c8 06 da 57 b6 70 | 27 d0 1d ba 30 bd f7 e8 f7 97 d1 a2 60 48 54 e1 | 78 e6 8a 2d 96 8d 25 20 d4 ea d5 91 fe cf 33 40 | c9 b6 9e 04 2d eb ab 1e 62 22 92 e6 ac 7f ad 87 | d9 d6 51 bb fd f3 09 da 3b 34 94 39 e5 ea e6 20 | c8 3e ce a2 e7 42 23 9a 87 f0 a5 52 78 6e 55 aa | ae 00 02 db 85 7f 08 ee a8 0d 45 9f 1a 3e b8 4c | 50 e1 51 af 9b 37 09 f8 9a d1 5e 06 50 da 5b 19 | 29 00 00 24 d4 11 3d 79 60 e0 94 1d 4d 6f 41 ca | 82 ac 8e c9 67 2c 1f 4f d4 a0 76 9a 23 40 20 93 | 02 22 14 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 95 58 8b 30 74 c7 3e 47 19 4b 3b | 1a b8 2b 0a d6 01 c0 a9 00 00 00 1c 00 00 40 05 | 57 b5 ea 4b 2a 5d 5c 00 4e 32 f8 bd b1 09 32 cd | c1 5d 34 01 | libevent_free: release ptr-libevent@0x7f4990038cb8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dab73f8 | #454 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 6f 21 72 d3 8c b5 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | dc 6f 21 72 d3 8c b5 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae4338 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.276126; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dab73f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #455 | libevent_malloc: new ptr-libevent@0x7f4990038cb8 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 7a 2e db ab 63 53 2d 65 a9 65 71 f0 dc 9a 45 | 10 e5 06 04 6f ab 30 df f9 d9 af 69 c1 ad 03 98 | 00 8c 24 39 ea 91 f8 82 8b 11 4d f7 60 a6 0e 02 | 40 ce 07 a5 94 d2 7c 86 c9 76 c6 8b 28 53 8f 0e | 6e b6 d9 8d 70 82 e3 ce 09 d0 29 34 57 64 21 35 | 36 81 ab 97 16 8a ab a3 7f 40 56 2a 29 04 56 68 | 99 11 00 34 3a 98 44 be fc 29 25 cb d2 5d ad b7 | ba 80 38 5f b2 28 1a c8 46 a3 5f 7e b8 5e 8e 89 | f6 b2 b5 9d 0a c1 b0 98 31 74 f4 63 cf 5d 9a 6a | 4e d2 11 04 a7 48 63 4e 14 b9 bc 96 60 d4 83 15 | 76 da e8 df 71 d9 aa f0 dd 58 1e c0 10 9c 32 0a | 0b a1 b9 11 74 c6 46 82 a5 22 46 dc 93 a8 60 b4 | c1 ca 82 e1 8d f4 2d dd 11 82 f7 24 24 40 d6 32 | f9 a4 98 9a a5 36 cb e3 91 e7 73 dc 78 1a 24 55 | 58 aa 70 54 a3 4b 38 51 dd 98 88 50 aa e8 8e 6e | 39 70 eb dd e4 db 7f 3c b8 83 ff b2 15 56 9d 23 | 29 00 00 24 f8 57 f7 20 f7 4e 55 cb 8f 00 8c 17 | 78 7d ae d5 b6 5a 95 a0 f7 86 ee 8e 4d 60 d9 b9 | ef d5 7f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 9f 44 76 c8 47 af 0d 45 7f ad ac | ea ea f2 ae cf aa 92 de 00 00 00 1c 00 00 40 05 | 96 d3 df b7 e5 3d 7a 00 4e d6 37 5a 49 4a 14 14 | b1 9d 32 37 | libevent_free: release ptr-libevent@0x7f4980022b58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae4338 | #455 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 1b 88 8f c5 c9 4f d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | 63 1b 88 8f c5 c9 4f d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da98c68 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.336411; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae4338 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #456 | libevent_malloc: new ptr-libevent@0x7f4980022b58 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f 6a 56 a1 ac dd d3 91 77 e6 a1 a3 38 e1 a5 aa | c1 da 22 92 54 9b 44 7a 7e e7 21 d8 10 eb ef 28 | 2c 9b 08 2e cf 21 8f d8 92 92 64 11 ef 59 31 8c | ad ef f5 be 93 71 ed 4a d2 b4 91 c6 c0 78 4d 0f | f2 99 58 73 ea 45 4b f6 85 a6 07 bf bb d2 4d 47 | 62 a9 6d 71 16 27 97 fb 9f 90 98 fa a5 30 42 b6 | ac d6 09 55 bc b7 47 93 ba 24 f0 74 c3 b4 2f 4f | 81 73 4e 49 2a ea 00 c2 8a ef 97 2b ad 48 4e 89 | cb ce 09 de 80 e3 bc d5 ec 4f b6 a4 e4 d4 0e 78 | 52 06 5d 75 75 b1 44 9a b8 a9 1c 28 e6 7f 11 34 | df b4 79 0a 5d 24 fc 0a 2f 60 62 49 91 02 ff 53 | 3d 69 48 ed 3f 10 96 04 c3 ee 96 ac 50 fa 22 56 | 1d 65 88 a9 9f 91 dd a3 d2 8f 9f 71 46 00 13 65 | 77 8f 6e 40 34 f0 21 40 08 15 0c 4e fc f0 a1 9d | 88 bf fe b9 32 9a 5e 7b d3 e6 8d e1 54 a8 16 61 | 92 78 5f bf 72 0b 3b 04 0c 5d 38 29 64 41 2a 0c | 29 00 00 24 b2 ab 5f c3 e8 3b 5f f2 b2 8d 26 37 | bd bf a3 0a 36 71 28 10 c8 0d 2f 13 f9 45 1f 3e | c9 f6 01 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a 36 cd f4 cb 98 4c 8e c8 85 05 0c | 3e 69 76 09 0f 66 76 f7 00 00 00 1c 00 00 40 05 | 47 7e f3 d4 75 cd f3 a5 df 90 91 db ed d5 c4 fe | 47 fc 4c fe | libevent_free: release ptr-libevent@0x7f4974022dd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da98c68 | #456 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 5d da 58 eb 15 ce d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 26 5d da 58 eb 15 ce d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c8398 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.397778; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da98c68 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #457 | libevent_malloc: new ptr-libevent@0x7f4974022dd8 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 ee 8b 23 ef 21 5a 36 b6 66 86 ff 16 bd 20 7a | e8 3c 32 44 25 08 1e 79 e6 49 37 c3 a8 db e6 a9 | b1 75 25 6f 39 7b bd 28 e2 89 fd f7 1b 91 84 b5 | 62 2f 03 12 ed b3 2d 41 a8 52 f0 08 f9 c8 02 dd | cd 69 68 75 11 1b e2 1c a1 9d 6b 9a 6d 83 61 1c | 87 c1 59 71 bb 29 02 a0 47 31 dd a7 32 27 91 53 | be b7 5e 52 aa 9f 75 d9 1b 53 ed e7 2e 25 81 37 | 78 83 73 69 c4 4a 64 38 74 9c 4b 1c a1 13 f2 3b | 18 eb 5f 18 8c e0 cf b6 ea 74 ba 03 61 ac 2a 03 | 26 f8 4f 7c 19 b1 38 3d dd d8 4c 12 96 a3 6a 06 | 76 be c1 ba 42 56 5c 18 9e 90 8f dc 91 24 81 c7 | 70 b0 bb b9 81 0d c5 e4 74 36 8b 53 df bf 27 b5 | 2e 07 cb 55 63 a2 2e e5 f4 44 4c c0 7a 9d cd 52 | b5 ce 8f 66 49 6f 0e ba 31 36 7e 60 cc 96 74 26 | 5d 18 22 1d d8 c5 7f 47 3a 04 86 c1 d2 b2 a1 ba | c1 bf 85 46 7e 50 eb 63 df c3 2f b0 ae ff 83 32 | 29 00 00 24 05 49 44 3e fd 20 4a 74 27 21 c8 52 | 92 68 bf 06 f8 80 12 b9 de 4f 2a 31 8a 2b 74 b7 | 3b 0e 36 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 8a f2 bb 64 40 fb 90 2e 17 29 0a | dc 40 4c 55 f1 b0 45 bb 00 00 00 1c 00 00 40 05 | a1 d8 d3 d5 82 c6 2d e3 02 6c e2 9c 2f 34 b3 7e | 47 6a ae f9 | libevent_free: release ptr-libevent@0x7f49b8041748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c8398 | #457 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 d0 a8 65 8e 61 17 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 32 d0 a8 65 8e 61 17 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d158 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.458159; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005178 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c8398 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #458 | libevent_malloc: new ptr-libevent@0x7f49b8041748 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 6d a3 f8 96 1f 97 79 a5 5f 94 88 06 04 fb 11 | 5b d9 0a 56 3e 86 bb 8e ac ae ae 1d c5 b4 c3 35 | 2b 66 b8 fa c9 59 db f7 16 93 a5 1f db 67 72 29 | e2 5e 63 f6 49 2c 0e cc ae 6d af a6 38 bf 6f ce | aa 88 f0 09 d7 f8 e7 5b 2f d7 1d cb bc bf a2 72 | 8d 32 4a b5 4d 37 ec 90 fd bf e9 bb ea d6 35 01 | 42 83 50 78 57 7c 11 d1 07 be 6e 05 59 ae 63 e5 | dc 06 f9 91 27 7b 51 7f dc 47 db 91 e6 6d c4 9b | 78 a9 d9 cb 0e d3 96 50 04 1c c4 93 2e a8 db bc | 5a 55 81 17 11 9f 75 7c 5b 54 b8 9c 4e 21 0c fb | c7 61 05 5c 76 94 86 4f ad ae ee 30 0d 27 27 4a | 52 8c fc db 2e 50 79 b0 db f7 1c b0 1c 8f b2 44 | 3f bd 3b f7 6b 5e 3e b8 fa ed 27 01 a6 ab 9b 3b | 2e 94 0e 76 47 a9 3c aa 83 a0 07 5e 70 ca 93 08 | d4 5b 0f 4d a2 1e 4c ed c7 4f 68 89 4d 3e 41 97 | 46 87 06 64 20 ab f3 e3 51 70 f9 c5 bd 88 10 38 | 29 00 00 24 e8 67 3f b9 f4 44 84 ce 5e 8d f3 17 | 53 59 07 d2 b1 b9 78 9c 89 c3 4b 43 fe 0d cd 4b | d1 c2 c4 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 2d 47 55 3f 10 ae ad 53 09 c2 c3 | 42 4e 44 e2 08 c3 43 58 00 00 00 1c 00 00 40 05 | 25 02 9c 6e b1 23 12 66 a5 55 43 78 c8 52 6b 6e | 0e 47 59 8a | libevent_free: release ptr-libevent@0x7f49a002dc88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d158 | #458 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d bb 2c 0c bb f2 e2 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | 8d bb 2c 0c bb f2 e2 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c2608 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.521474; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d158 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #459 | libevent_malloc: new ptr-libevent@0x7f49a002dc88 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 c4 f2 84 7b c1 e1 6d ce 43 23 6e 8b 87 78 df | 36 3a f3 f3 a3 76 a4 04 a8 41 1f a8 82 bb 8f 10 | b9 43 b9 e3 ba 78 09 8a 2c fa a1 cd cd ec fa 5a | 80 5b 32 fa 43 e3 14 a4 c5 07 f1 8d 2b 25 34 38 | ed e5 6d 98 78 16 51 3c e0 48 a3 e6 c0 28 d1 79 | 09 3f a7 17 d9 65 93 1e 89 ee 1e 15 0d 51 54 e9 | d6 f6 ca e8 5f 85 ef 96 d7 cb f3 2a 64 c4 57 47 | a7 d1 c8 34 1b 8a 41 38 9a b3 93 a1 76 39 a0 5a | ab b3 ef 13 b1 3f bc 50 14 24 6f 05 97 c6 0d 3b | 05 e2 f2 a7 a1 f5 17 97 b5 c0 32 14 9a a7 3a 8e | 3d d8 68 5e 17 21 f1 c5 2b 48 74 2e c3 90 90 fa | a7 65 d8 59 f3 e0 5a 60 c8 ea 18 9a 65 8a 19 93 | b9 75 6c 63 07 6f 57 3b f4 33 c6 ef d7 26 0f f2 | 03 c5 0c d8 bd 87 04 7b 80 97 ca 66 24 85 a7 e6 | 33 d8 04 d0 b3 76 6c 28 94 f8 b5 ce a9 0d fb 2b | d1 d3 0e 6e c7 82 46 ee ce 43 b0 03 50 f4 b8 cc | 29 00 00 24 90 77 b1 40 d3 f8 8e 4f 11 43 62 e0 | 89 f3 c1 29 89 a6 5a f0 24 0e f4 34 99 58 be 22 | 00 7d 95 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 6d 7b ae 40 74 68 bf 01 b8 66 af | 0e 81 43 49 cf c8 62 ee 00 00 00 1c 00 00 40 05 | 72 7a e5 ac 4b 22 3d a2 4a a7 86 14 7a b7 14 b1 | ba aa e2 09 | libevent_free: release ptr-libevent@0x7f498001d4e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c2608 | #459 spent 0.371 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 95 79 bd 78 78 1d ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | a3 95 79 bd 78 78 1d ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daecf58 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.580113; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c2608 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #460 | libevent_malloc: new ptr-libevent@0x7f498001d4e8 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 3f cf ef 51 6e 22 50 b0 ad 3c 12 92 ef 58 50 | 26 75 ee c1 7b 54 1d 0a 75 8d e4 2c 9b b4 2b d7 | fa 10 82 94 ab 21 81 48 2f 60 16 f0 67 35 de cb | 61 6e 7c 18 ef e5 bc 82 07 eb 94 c6 48 7d 5e e6 | 6d 48 45 59 f1 2a 6f 2d cf ff fa 7c f2 12 84 52 | 0f af 5c da 1b ff 34 79 b0 97 f3 16 83 ce fc 38 | d7 f1 0c d6 5c c4 66 5e 1f 7c 7a 00 83 09 43 c0 | 6a 27 0a 6f f8 c3 9b 4e 90 47 49 fd 42 31 d2 c2 | d0 fe 0f 22 b6 db 47 33 4b d2 54 fa bf b9 e2 be | d0 c8 0b 9f 60 3a 93 c4 4b dc 20 89 43 39 7a 0f | 35 4a d2 6a bc a9 22 5f 9e 04 d8 48 59 b1 4f 10 | 7a e7 70 13 4f 1a 42 0e b8 2d 20 bf 9c 7b be 00 | 57 28 b5 30 88 5b 2d a8 25 23 a2 ba 74 ba a1 72 | fc d2 ec ca 17 a9 b5 c6 4c 71 ed 77 58 76 6b 6d | ef a8 e1 a2 6f 5d ae d9 87 1e b3 15 10 87 b9 fc | e4 20 27 b7 f6 b4 55 cf dd ea 2b 3c 10 14 68 d1 | 29 00 00 24 23 b8 c0 39 3d 8c 7e db 92 f7 a1 8d | 0b ae 15 77 2f 54 6d c8 ba ff 83 91 73 aa 73 3b | f6 61 18 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 04 11 98 48 8c fa 95 72 f5 77 7e | b5 d6 a7 71 f3 fb de 97 00 00 00 1c 00 00 40 05 | e4 6e ae 97 a0 2e a1 2e 50 ce 43 fd 08 7c 9a 35 | 86 15 56 16 | libevent_free: release ptr-libevent@0x7f49b40257e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daecf58 | #460 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9d c1 de e7 d9 2c c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | f5 9d c1 de e7 d9 2c c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0897 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da44c58 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.642597; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daecf58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #461 | libevent_malloc: new ptr-libevent@0x7f49b40257e8 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 b2 c8 15 f4 5b 02 ee 1e ff f1 f1 0b 26 35 67 | 95 68 45 35 29 77 32 61 08 f3 bf c7 5b e7 16 48 | 35 11 6c b9 0f bc be 65 3d c1 a2 f9 12 6a 64 10 | 63 ce 56 9d 99 af 5c a3 3d 1a da 9d 53 5b a6 27 | 23 ed f5 68 33 f8 1b 68 23 c3 ac 0f 8b ea d0 94 | 0e ab c0 83 ee 54 57 aa 8d 82 8d 36 1d 0d 34 a6 | da b6 8b f1 2a a2 3f 7b 14 41 68 54 51 b1 26 d4 | 35 eb 39 86 9a 55 02 38 95 84 a0 4d f3 80 5b de | eb 3d 14 a8 68 62 07 61 3d 58 86 1a 39 3f 0b 68 | 6b d6 00 39 ea 16 64 e3 05 9c 80 3d d8 27 34 e0 | 87 c5 d8 ae b3 79 59 24 4f 37 13 97 f8 50 db 56 | 73 da fa 87 57 fd fd 15 11 31 5a 74 3b 93 6d 0b | 78 8a dc 2b 91 7d 18 b4 b6 ea 01 1b 3a e0 e0 d9 | 67 99 6e fb 51 71 74 14 93 80 49 47 dc 08 14 b9 | aa 60 84 6d 6c bd 0f 17 4e 18 2f 7e 97 c9 d0 5c | 58 01 c2 ce 8f 02 09 03 13 45 89 33 e2 51 8c 37 | 29 00 00 24 45 49 4c 9f ca 37 9a 2c 95 23 12 df | 0c 09 6b 96 cf 26 9d ff 82 59 b0 ab 0c 64 2d f8 | 84 a2 b6 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 14 fa ef a7 bb 09 80 c4 8a 40 1a | 8e e3 7d 16 39 f6 b7 11 00 00 00 1c 00 00 40 05 | 9f 5d 13 61 88 3c b6 35 25 71 8b 49 09 28 6a aa | 3e 41 ea 50 | libevent_free: release ptr-libevent@0x7f49a80124a8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da44c58 | #461 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 48 01 01 90 15 dc cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 80 48 01 01 90 15 dc cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9c5508 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.700948; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da44c58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #462 | libevent_malloc: new ptr-libevent@0x7f49a80124a8 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 c3 80 a4 93 9a b9 58 e1 08 cc 11 86 2e 9f 13 | cf f7 dd 05 57 fe e7 8e 2f 9d f8 fa cb 3e c4 18 | e3 17 1a bb 53 7e 8d 29 d2 78 91 34 97 6d 09 0f | 37 b5 6d 04 da b8 dc ff 19 96 e4 7f 8a 07 8b fd | 4e 99 48 08 d4 a1 e1 b6 fe 04 e8 0e 52 82 a4 36 | 77 7c 88 43 d1 7f 50 a3 aa 48 e0 09 e9 f1 07 77 | 10 ed 7d c0 5e a8 ae d5 41 a5 14 88 83 5d ad c5 | d9 d8 f1 de 7d 23 f2 b8 d9 91 ab ff 23 3f 31 3e | 4f 54 60 87 1f fa 40 76 03 d1 9a cb 88 31 3c 5c | 34 5d 75 fc f3 64 e0 2a 43 96 0e 49 dc 85 4d 19 | 10 d4 70 ba ee 29 9c ec 17 22 43 75 91 4e a2 86 | 97 40 83 24 8d 05 fc 33 d1 8f c9 b6 49 c1 0a 68 | a3 73 ef f1 87 90 9d cb db b5 07 49 ed 53 14 11 | e1 2e 4b e4 b4 0d 93 a0 d4 34 c2 0c 83 39 e6 c1 | af 4f ea a8 83 3f 57 b8 5b f5 b1 40 f4 5c 3a ab | c5 aa fc 35 3b 9a 9c b9 2b 98 b8 fb af 50 8a 94 | 29 00 00 24 10 71 67 04 a0 28 14 a9 05 1f 3b 17 | 11 3a fd b3 49 0a c1 fe 08 98 f7 99 92 b8 c4 e0 | 66 47 c6 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 0f 51 53 10 ca 88 5f 6f ec c7 85 | 95 39 e7 67 56 ca 30 95 00 00 00 1c 00 00 40 05 | ea 75 cd 08 8f b1 5b 2f 24 43 74 bd d7 16 4d 31 | 04 93 f2 7b | libevent_free: release ptr-libevent@0x7f496c01d468 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9c5508 | #462 spent 0.0391 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb c0 11 ab 1d f5 b8 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | eb c0 11 ab 1d f5 b8 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b8418 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.758404; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9c5508 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #463 | libevent_malloc: new ptr-libevent@0x7f496c01d468 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 f3 54 68 37 4b d3 8e 46 07 ba 27 bd 9f 65 6e | d9 11 ab b1 7b f5 04 b1 49 8c 12 96 40 4e 6c bd | 64 08 a6 16 16 b8 19 38 09 c8 0d 16 3d 45 d0 2d | 55 41 69 07 8b 3a ca 93 6c c1 41 d7 29 73 fd 3d | e8 a1 a1 33 e1 30 e5 25 c7 02 91 59 55 79 9c c6 | d1 a0 cc 59 93 c1 eb ae 26 52 b6 8c b3 a6 37 5c | 9b 2f d9 e4 80 de 0f 63 de f9 10 e3 2e b7 27 47 | 92 af 86 a9 a7 69 15 ad d6 7f e2 2b ad 41 fb 6c | cc a9 58 96 71 c0 16 87 f4 25 55 d7 d0 3e df 8e | 7f e4 9f 10 a6 8b 4a 5a fc ae 3e c7 be e8 b0 e0 | 26 ec dd cb 12 ca 5f be 8f 33 10 f3 f2 67 c5 bb | 38 d7 72 5a ba f7 fd 33 80 31 de b8 9a 55 db d1 | aa 26 ac 72 93 f6 84 7f 74 dc 43 39 81 10 f3 4a | eb c9 7a a4 c5 16 ce d4 1e 06 11 98 e3 d6 17 ae | 89 b3 f8 aa c6 5d 6d 18 07 6c b0 1b ff c7 e0 61 | 39 d9 37 8b 1c cb e1 bc 52 5d 33 2d 71 38 db ab | 29 00 00 24 9c 0f 41 ed 19 55 65 44 5d 53 7b d0 | 87 8d 28 3b b1 1c 72 e7 32 a3 c1 70 9d d0 7f 55 | cf 5a db f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 a5 ed 66 3a 5c 09 5f 63 29 74 1b | b0 8e 64 5c 81 71 e9 48 00 00 00 1c 00 00 40 05 | 95 e5 ff ec ea 1b c3 ee 45 24 6b 48 b1 a3 f4 14 | 04 a3 af 63 | libevent_free: release ptr-libevent@0x7f498c017b48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b8418 | #463 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 8e 7f 4e b9 e0 b3 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | e3 8e 7f 4e b9 e0 b3 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ddf28 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.840889; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b8418 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #464 | libevent_malloc: new ptr-libevent@0x7f498c017b48 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 3f bc b8 17 db e4 a4 6e 8c d3 da a7 b1 e9 a1 | 29 65 a3 3b 7a 98 c9 4b bc c9 b1 15 1d 90 8f 72 | a7 ad eb b3 d0 7f 9c 5a c9 07 df 4e 30 4c 12 87 | ae ab 0d 5b 79 0f 26 7b 21 fe 27 e8 fb 6b 67 67 | 60 91 db a8 f7 01 a4 60 e6 21 f1 6f b8 e3 5d 24 | f9 70 62 87 cd f9 95 e4 3c 6b 28 5d ae a7 03 16 | 44 ff 95 03 7f cb ae 20 55 af f0 c6 8e d5 25 cb | bd 56 bc e2 65 bb 5c 2f 25 b2 d5 52 e1 cf 5b c1 | 45 ae 97 3f c7 56 ff db e5 5e 0c ba 7a 79 7b 91 | e0 70 cf d0 4a 2c 17 18 56 b5 24 20 b3 15 e1 ef | f3 b1 de 57 56 07 a2 1d 52 75 40 54 9e 30 c5 6f | 09 e3 8c 9e 14 22 6b fe 4d 08 27 2a b0 2e f4 e8 | 58 19 41 32 32 62 b0 87 2a f8 ff 75 e3 5f 55 b9 | 6c b1 4b 62 ee 3b 9b 0b 9c 7b 16 de cb d4 98 52 | b2 79 19 bd b0 37 d9 19 c2 79 7f 8a 67 05 ea 08 | b9 7c dd 35 7e 46 56 2b 4d ec 3b 9f d9 1b fa df | 29 00 00 24 57 18 bb 33 89 dd c7 d0 e8 e6 e6 b7 | 00 0c 76 35 89 c8 69 15 c9 1a 01 6e 43 19 6b c6 | 5b 1d 24 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 67 3a 0a 79 9a 19 29 be 54 17 fa | fd c3 0b 8e 98 f3 d9 84 00 00 00 1c 00 00 40 05 | 4e e2 53 d1 f6 94 47 60 92 fb 04 fd 6b 1c b7 ea | 64 7c 4f 5c | libevent_free: release ptr-libevent@0x7f49a40284d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ddf28 | #464 spent 0.279 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 af 1b c7 b3 d2 ea 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 18 af 1b c7 b3 d2 ea 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.135 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49780058b8 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10669.934473; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ddf28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #465 | libevent_malloc: new ptr-libevent@0x7f49a40284d8 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 60 fb ac aa 36 be 1d 08 24 7e 70 c4 47 5d 8d | 47 8d ed 73 c7 53 1b 0a f6 29 47 f9 23 7d 51 ea | 47 c2 ec a6 0c 0c 1f e9 cb 16 eb cf da cb 18 96 | a9 25 3a 90 84 9b 49 12 19 77 1b ac f1 3a 66 b3 | 2b 08 2e 0f 7a 25 d9 ec 86 f1 d5 9b f9 a7 68 22 | c3 90 02 95 92 b0 bb a6 64 6c 3e 71 06 d1 a7 bb | 8a 8c 3c fe 03 2c 11 77 b4 3c 57 27 b8 a4 48 c4 | 1b ec 6b c0 f8 a7 4b 95 63 17 f1 f5 01 dc f1 e1 | c8 92 cc c2 73 63 91 e1 0a 5f d2 c2 78 e5 1f 30 | a0 bc 03 5b 46 1e 4b 90 5b 85 2b e0 72 82 34 24 | 1e b4 0b c7 c0 c7 fa 37 31 c3 db ff ef ca 32 e7 | 19 b8 34 92 a4 14 f6 86 cd 5b d3 c6 94 8c 25 70 | 29 b0 2d 74 36 ce e5 79 ff 90 7c a7 d9 bb dc cc | 86 bd bd 32 4b 7a a2 a7 79 8f 2e 28 40 05 19 3e | 33 f0 76 38 c5 d4 30 96 80 e5 48 7d 61 67 c8 6e | 92 88 b8 94 5b 3b 80 f3 a0 03 65 a8 ad a0 c6 de | 29 00 00 24 f0 8a 05 df 15 1a 2e ac 80 a3 5c 42 | 1a d2 0d f1 c7 69 24 12 74 11 37 0f 73 dd 2e 25 | 9f 42 89 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a b1 e1 b3 83 6d fe 9f c1 57 51 b0 | e7 ae 0e a2 de 4f d0 c4 00 00 00 1c 00 00 40 05 | 91 ef 31 1d ff b2 a8 dd 2d f7 df 9a 2c eb 8a bc | 8a ba 41 31 | libevent_free: release ptr-libevent@0x7f499802dcf8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49780058b8 | #465 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 9a 33 7c d0 96 23 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 33 9a 33 7c d0 96 23 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0739 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f499c0058b8 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.024842; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49780058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #466 | libevent_malloc: new ptr-libevent@0x7f499802dcf8 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a d0 53 a9 66 c3 38 1f cb 0d f2 0a 1b 80 89 33 | 4a d3 0d 37 9e e2 55 aa 10 4c 59 b0 ad 2a e6 26 | a5 c8 43 2d 1a a7 92 21 11 59 21 cc 7a ef 4f 09 | 01 72 ea 1d 49 8a 9e 55 d3 6e a9 d3 ca cf a5 c1 | d2 50 8f c4 b4 d5 93 2c b7 c4 67 87 e2 73 36 c2 | d5 f5 2c 51 08 b4 f7 b7 eb 4e e8 e5 1c b5 4d 23 | c2 99 56 54 d0 9c 9c 24 39 da 28 52 3c f0 75 f9 | 4d c5 66 dc 13 3b 53 3d 9c 9a 5f e3 61 d5 ec c6 | e4 24 b9 7b ac 9b b0 10 f5 fc fd 74 3b a4 79 ea | 2f bd 5b de c2 82 5c 0d 47 85 65 50 1a d1 16 9e | e9 f5 08 64 ca 0c 83 e8 ae 74 27 4c 5e c9 ad 50 | bb 95 46 2b 56 35 75 8e e6 ad 48 c4 85 f1 6c 64 | 68 93 e9 a6 d6 f2 95 02 94 4f 4c 52 d6 b5 43 3b | 78 12 91 63 73 cb 45 29 4a 2b 49 ff 41 55 8c d3 | 44 29 04 c4 d1 c5 94 27 b7 1b a3 60 36 be 98 cb | 2c 8a 08 c0 cb cc 6a 7b 3e 63 b3 7b 6c 98 01 cc | 29 00 00 24 a4 0a fd 4f 4d c5 ab bd a3 50 55 52 | c1 47 ce 5e c9 d1 5c 02 b5 d3 a3 20 ff eb 91 82 | c3 fb 83 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 66 7c c9 ae 88 04 09 4c 88 1c 79 | 45 94 b2 ca f5 8e f9 62 00 00 00 1c 00 00 40 05 | 2e 28 91 7b 8a ab 07 cb d5 5e 0a f4 3c e8 55 1d | 07 33 a7 05 | libevent_free: release ptr-libevent@0x7f498000ca08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f499c0058b8 | #466 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 0e c3 ea 1f e1 b5 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | 26 0e c3 ea 1f e1 b5 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da9d078 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.080147; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f499c0058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #467 | libevent_malloc: new ptr-libevent@0x7f498000ca08 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f f7 6a 2e 16 53 24 45 46 25 89 4f a8 46 e5 fb | 0a 9d 52 55 da d5 92 fb 35 fe 1c c3 ec 19 12 46 | 8d fb 9f 18 e6 f7 fa 88 6b 8e 8f cc 58 23 f9 68 | 78 4b e1 7e b8 9d 2f de 2c c5 c4 e9 5e 08 3a 71 | 68 3b b2 03 e2 cf a2 45 35 bb 97 55 1a a6 0e 3f | 1f 20 78 2a 46 bb 5c 14 68 9d 03 1e ad 97 2b ae | db 61 84 8e 16 d9 97 15 22 2f 92 fe 04 2b 7e e4 | eb 71 3d 09 12 e8 b8 44 50 c3 bb 20 43 63 18 c8 | eb 47 e2 a3 c7 e4 ef 5b c2 2a 15 de 2a d8 7e dc | 2b d2 ca 9d 29 e9 bd 0e 8a d5 fc 40 85 af 73 43 | 28 30 14 49 71 67 58 7b 5c a9 87 4c 5f 41 24 96 | 19 f6 5a bf 7b e2 3c 15 e6 37 f9 83 4f 81 00 f6 | 23 a2 27 6c 9a 87 28 0e 8e c2 77 e3 11 74 a4 f8 | c5 dc fb 76 b0 c0 4b ea c1 df 0a c2 be bf ed fb | 3c 61 11 ab 46 08 fe 4d 2b 09 4a a6 f8 5a 97 71 | 4b 4d 9d a7 64 9d 91 ee 20 b9 da 0b 65 2b 73 4f | 29 00 00 24 53 93 ef af 46 7b d9 a2 e4 a7 5c ad | 17 56 44 b1 a3 d6 c4 a2 a1 6b dd 04 1a 03 fa 25 | 42 ab ef 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 44 80 52 87 dc 97 e7 86 8d 4d a4 | c0 9d 78 2b fc 27 27 bd 00 00 00 1c 00 00 40 05 | 17 31 b0 a6 6f 20 e9 3a 6f 63 0e 88 6b 23 93 43 | ea 93 38 3f | libevent_free: release ptr-libevent@0x7f49b8009cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da9d078 | #467 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 b3 01 7a 93 4b 01 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | a5 b3 01 7a 93 4b 01 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da17c08 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.144454; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da9d078 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #468 | libevent_malloc: new ptr-libevent@0x7f49b8009cc8 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 66 02 d0 4c 59 48 d9 67 0b b7 d0 82 4e 4e 7f | 5e 7f f6 b8 65 8a cd f9 58 f7 3f 9a cf ba a8 c3 | d8 fb 6d a2 2f f4 ca 4f 6d 73 90 61 48 e1 e2 e6 | 35 76 b6 f9 04 85 77 fb 85 a0 85 1e 53 65 b9 76 | 96 6b 47 49 49 05 99 72 71 d3 f8 b1 7f dc 37 80 | 3d ee ee 9d c8 90 1e 43 91 e6 46 1c f4 d2 fd 85 | 9d d2 38 2f 87 5d 1a 15 e7 b5 11 51 52 44 3f 9c | 3a 36 9f 58 d5 79 d2 cf 00 46 d0 f8 57 3d 0d da | c6 d3 cc b6 ae 51 0b ad 0b 28 e3 7a db 8c 6f 5b | e7 e5 ee 0b 1f 17 d6 6d ef 09 f4 18 90 90 f1 6c | 76 5f 83 a4 94 f5 37 e8 b0 ea 1c 84 f3 97 43 31 | bf f4 8c 14 9e 19 c0 39 be c1 7d ce 00 23 f6 b5 | 4a 9d 9a 38 5e c6 4c d0 5f 64 ed 39 b1 1b dc 9a | 0e ef 65 be 8f 04 e3 a9 9c 6b 28 a5 65 7d e5 95 | 36 f4 9d bd 46 7d 86 37 94 ce 6a 96 c0 87 ad 17 | 7f b7 0c c5 38 58 4a 0d 99 9a 3f 2a ff 8d e4 4e | 29 00 00 24 2a 1c 89 84 1e e2 ed 47 ad 63 ff 1f | 7c 14 15 84 a5 e8 23 eb 08 6b 46 d2 f3 d2 27 b2 | 71 ee 35 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 bc e5 0b 1f f5 94 41 4b 3a 31 bb | 8e ec 4d f1 04 45 0e d0 00 00 00 1c 00 00 40 05 | 14 ea 36 94 64 6d d8 ee 2b c2 e5 89 35 c8 e2 21 | 0a e2 9e 7d | libevent_free: release ptr-libevent@0x7f49a803e5b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da17c08 | #468 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 c8 e0 f4 15 61 84 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | a1 c8 e0 f4 15 61 84 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da60488 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.202765; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da17c08 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #469 | libevent_malloc: new ptr-libevent@0x7f49a803e5b8 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 54 69 0e ca 06 79 74 12 f7 e4 b4 21 9b ce 3e | 9c 2c ed b6 a5 45 9a e7 37 14 79 71 c4 fc e7 d2 | 1f 56 e5 9a 79 0d 08 73 cb 37 12 2d b8 1c 34 23 | cd 50 ea 8e e5 80 0a 96 aa a1 06 2b d0 d1 64 ae | 80 21 ed c5 e3 b4 37 1a cc bd a8 7c ff cb a1 c0 | 94 72 7c f3 f2 66 6d bf 33 10 cb eb b8 9d a6 f3 | 26 1d 1d 90 7d c0 58 24 ed 79 18 ed 2f c7 a9 25 | 98 57 34 1b b3 80 07 ee 7b 43 ec 32 e7 a1 23 39 | 6b 56 6f 57 84 5b 1f 03 94 7f e8 6c e1 3e 85 7c | 13 78 eb f8 46 37 64 b6 25 d3 5a 47 1a 41 c0 23 | aa a1 3e 5e 42 fe e0 96 3f 13 f9 d0 22 d6 5f 61 | be 66 26 d8 7c 6e cc 60 48 9f 9f 0d f6 da 72 30 | e9 bf 23 02 32 f6 8b 33 b7 c1 98 75 88 7c 57 4b | 19 68 b9 49 dd f8 0c ad c1 00 2c 83 ba 61 f4 b9 | 8b f1 04 72 bd b4 2f 51 1a f3 66 5e 8b eb 92 2a | 12 a6 56 c0 62 9c 8f b4 cf 36 db 28 f1 4d 41 b0 | 29 00 00 24 6a c3 91 14 92 14 91 8d 24 86 e7 0a | 25 ed 14 61 03 a1 9c 3e 77 ed 84 4d 3d 7d 0d 56 | 36 42 db 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 f5 5e a0 aa 43 f4 9b 2e d7 3d 3f | ef 04 01 5b b5 6a 80 a4 00 00 00 1c 00 00 40 05 | 5c 58 9c cd 69 77 59 41 63 f3 3b d9 ff 0f 35 4c | 5f 8c 37 0b | libevent_free: release ptr-libevent@0x7f4974033668 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da60488 | #469 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 d4 e9 48 f9 6b 36 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 00 d4 e9 48 f9 6b 36 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da12038 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.265063; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da60488 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #470 | libevent_malloc: new ptr-libevent@0x7f4974033668 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba de 39 de c5 f8 56 d0 21 ec 5c ed 1d 0c e5 20 | ec 11 92 91 42 73 fc 45 14 58 b5 f5 31 dd 55 ef | d0 00 bb d7 ea 83 66 da 2d 67 12 c2 b8 a3 cc 1d | ea 17 e5 2e fe 63 f4 17 a9 8f c7 91 1b f2 64 d0 | 3d 26 90 18 01 46 40 bc ba 19 64 78 f2 9c 84 fd | 71 32 96 4d 39 76 af 6d 17 b7 a5 86 c9 4a 32 f2 | 72 df f9 ce bd 8e 5e 5f 9a 44 bb a6 29 81 80 8d | 34 d1 77 da 1e 54 25 4a c3 08 20 1b ec 26 3d 89 | a3 c2 bc a8 6a ca 1b fe 9f 94 70 f7 37 37 5c a4 | aa 2e 09 85 44 3a a3 47 a5 f1 c4 95 d7 07 d9 2e | b5 61 2c f7 5e 84 97 8f 4e 3e b6 ad 5f 8e 87 12 | e4 e7 fe 01 f6 7a 1b 2c 63 50 ba 54 58 e1 16 7e | da c0 8a 8e ac 61 50 9c 43 16 25 de 6d 83 b3 01 | 76 c0 b3 f5 ff 7a 42 14 b6 d2 e0 a0 bc 01 c1 bb | 67 68 f7 63 90 9c 54 b7 92 0f 97 71 cb 6c ac 95 | 0d 03 8d c6 4e 8b b6 5f 05 65 ae d1 bb 81 02 10 | 29 00 00 24 f5 d1 b1 3b bc 86 4d d4 4b 7d 8e 73 | 06 6e 9c 2a 44 7b 52 b1 cb 83 32 73 c1 dc 7a 59 | 61 56 8d 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 54 d3 21 aa c2 da 7e 42 15 54 b5 | 90 79 8b f7 d4 b8 db 9c 00 00 00 1c 00 00 40 05 | b0 29 bd dd 71 5c b9 63 bc 28 6d b0 fc cd d3 11 | a1 4b 6a 99 | libevent_free: release ptr-libevent@0x7f497c022e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da12038 | #470 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 0d f6 78 7b 90 48 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | 28 0d f6 78 7b 90 48 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9eafb8 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.325527; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da12038 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #471 | libevent_malloc: new ptr-libevent@0x7f497c022e28 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dc 77 75 a1 bc 77 d5 14 ef 74 b7 2b 5f 22 a8 0b | 72 68 60 b7 f4 68 35 24 a1 20 93 7e 26 ef 93 43 | 27 77 f6 13 bd da 87 d2 63 39 60 99 86 3b 4f 53 | 35 00 16 a4 0c 71 10 08 cf 3f 39 c4 f4 1e 05 92 | cf 04 03 50 92 76 c3 f3 f4 2f 1b 88 1a 82 28 61 | ac 45 72 46 ec 5a e7 b7 9c 26 95 91 9c 10 f5 46 | e2 a4 db 07 72 a5 01 93 52 a6 df ca 40 03 3e ff | 3a 14 1a 97 fb cc 83 88 6f cf 3c aa 8a ea 82 77 | 13 64 96 8f 8f 5d 42 07 83 d0 7f 51 84 f1 e8 fe | 3b af a0 46 60 8b 30 e7 b8 dd c2 ed c3 4c 3d a7 | 4a 39 ba d4 83 5a 14 28 81 30 c3 a1 5a 3a d4 3f | 2f 35 0d d7 84 fb a0 c4 8d 87 f6 06 69 a9 d1 a7 | c2 1c 1c 91 0b 38 06 32 3a e6 03 c8 cd 23 99 56 | a0 5e 6a 16 33 7b 26 c5 77 9e 65 90 8f 7a fd a1 | 2f e1 6a 8f 9e 7f 38 54 77 26 65 7e 9d 13 cc 81 | 8a ad 99 da ad c2 fb 94 21 f8 ca 68 2f f5 8d 4e | 29 00 00 24 36 f3 8e 3a e5 23 3e 21 60 3e 0a 80 | fa 72 a9 1f 82 b4 03 94 e0 a9 21 16 41 a6 ba c8 | 4d bc f0 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 34 43 49 15 52 ae c1 19 58 f4 8b | 2d c1 6d 53 4e 4a d1 b8 00 00 00 1c 00 00 40 05 | e7 88 91 9f 8a c0 4b 59 80 75 fc d7 55 3c 86 a5 | 31 b0 d4 58 | libevent_free: release ptr-libevent@0x7f498002dd38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9eafb8 | #471 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 57 9c 61 6f 0c 62 aa 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 57 9c 61 6f 0c 62 aa 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da64a28 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.387992; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9eafb8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #472 | libevent_malloc: new ptr-libevent@0x7f498002dd38 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 b4 38 13 9f f7 1e 03 50 c8 1a 8f cc 34 7b d4 | 0e 7f cf a9 93 9c 0c ec 6c c4 09 17 02 86 50 4c | ec 07 68 90 8b 44 ab ee a9 f4 5e fe ea ae 31 dd | 04 3d ab 79 99 f6 7b 6d 0a 46 72 30 e9 23 e3 24 | ce fa db c1 64 b1 e1 b2 06 72 b3 21 0e 28 b4 d7 | e5 e1 3e a4 18 4d 36 7e 5f 37 b1 18 f1 06 67 ee | 29 1b 64 cc 9c 28 1e 7a 79 a9 45 2f b6 6f 9a 6a | cd 00 b8 e8 16 bf 0c 29 22 7e 6b b5 43 7d a2 4a | b6 cd d3 8c 13 d5 5f 65 b5 69 61 3d 9d c8 cc 62 | f0 ec fc 5a 16 01 42 d3 ea 39 f5 1d a0 2e ae b1 | f7 78 2d 6c 14 ba 3d 96 be 31 b0 e9 86 f6 74 c4 | e7 1b 84 cb 3b d5 d8 1e d3 41 ce 43 e4 0b d8 4f | 00 ee b4 48 45 b7 12 e3 5e 69 c6 c8 7f 99 62 a1 | 9e e1 c6 df ce ee f0 60 69 cc 22 87 1a 7d b2 8a | 61 56 29 32 47 87 9d 68 2b 2b 96 5f c9 3a b3 65 | b1 99 fa 0b 67 79 fd 3c d0 fb df 31 77 98 45 ea | 29 00 00 24 47 41 c1 04 88 06 e2 02 7f e1 a0 fa | d8 62 de e7 bb 17 e8 e5 d4 a7 dd 4c e0 1d 04 70 | 64 54 93 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 f0 31 05 4e d3 c0 76 2e dd 89 da | b2 f1 f8 3d 8b bb c9 b7 00 00 00 1c 00 00 40 05 | 10 44 23 aa 44 d5 b6 2f 17 4f 54 03 f9 77 d1 17 | 61 e6 5a 5e | libevent_free: release ptr-libevent@0x7f499c038e28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da64a28 | #472 spent 0.438 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b 36 08 ac c5 b0 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 2b 36 08 ac c5 b0 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9df6b8 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.446992; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006441 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da64a28 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #473 | libevent_malloc: new ptr-libevent@0x7f499c038e28 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 50 8d f4 48 e7 de 44 07 29 bf 6a 13 eb 53 99 | cd d4 a6 68 69 ae 2b ed 90 86 3b 12 53 8b 47 b8 | 50 d6 f4 0e 0c a9 14 7b 41 a7 d1 c5 3c 71 14 08 | f7 a8 e7 a3 53 35 9f 3a 1e c3 cb 40 38 d6 7e 6b | a0 fb 97 b6 8b fc 2a e1 63 40 40 b1 bf 70 bd 68 | d9 56 68 27 76 d0 97 9b 3e 02 68 37 e0 6c be 30 | 71 47 e6 ac c7 8b cc 54 83 de 5a ff 4c 37 c8 7e | bf 4a 36 e1 57 d8 7d 40 aa ab 58 29 be b6 45 b4 | a0 32 3f 11 ea 66 6b 0a f5 0f bd 93 9f 9b 6c ca | bf 68 51 6b ec 0f 88 07 d7 b5 8a 90 b6 b4 11 5b | 8a 2b f6 9c 2b 80 98 be eb d0 d1 ff 60 1e c8 33 | 71 8d 58 ae 5b 5f 19 f4 9f 36 7b 2b 2c 24 de 4d | 53 f1 47 43 21 b9 f4 30 c1 1a 65 49 a6 82 9e 91 | be 5b e8 f8 9c 0d d8 55 66 65 7f b4 54 5d 5d 43 | cc 3b 36 7f d0 7c 44 fb 62 5c 9d 90 98 95 87 72 | c9 19 b4 4c d8 88 c8 3e 2a 4f bf 83 bb 65 4d 2f | 29 00 00 24 cb 19 b0 62 1c e6 cc 13 2a d8 51 b5 | 81 d2 c6 e0 8d 99 5d 28 d2 b5 08 0b 79 70 89 f5 | 8f f9 b9 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 44 16 e3 37 07 f0 10 8f 3b f2 c1 b9 | 1e 99 38 50 8e ff d5 bd 00 00 00 1c 00 00 40 05 | 28 6a ce c4 42 67 fd 30 d8 c2 d9 9f 81 b6 2b 3e | 1e 39 62 7a | libevent_free: release ptr-libevent@0x7f49b4035d78 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9df6b8 | #473 spent 0.599 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c 57 6b e8 a8 0b fa 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 4c 57 6b e8 a8 0b fa 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.318 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daaa388 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.541113; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9df6b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #474 | libevent_malloc: new ptr-libevent@0x7f49b4035d78 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 60 51 d7 4c 42 59 1e b2 7e 46 0a f4 de c4 da | ce e8 a7 7b 04 7b 61 b1 f6 1d 8a 63 dc 19 69 69 | 22 c8 aa 6e 5f d8 cc d0 21 d7 46 ae 78 35 44 3b | 6b a4 b7 9f 59 7b 26 23 fc 8c 57 79 e5 88 b7 43 | ee 7e 97 8a 0f cf a2 f1 fd ba ee 02 aa 1c 60 5d | 3d d9 ad 35 9b af 3f 7a 92 b4 f0 85 d9 56 e2 c3 | 6f cb c9 60 40 a6 8f e1 af bd 45 78 e1 e5 64 1e | 9b 8d 1e 92 df fc e3 4b 29 8b 3c a9 a2 55 0e b5 | 65 7f 86 ec 25 a7 a6 77 43 f2 f5 a8 d8 ac a2 63 | d4 29 55 2b 88 f6 df f6 f9 36 01 c7 91 17 81 ab | bc d8 64 30 ff d2 f8 87 68 6c 2e 8c 58 cd 6b 5d | d3 24 10 92 bb bd 9a f1 a5 33 98 f0 91 24 39 9d | 78 d0 d1 7e 01 a0 15 c6 64 45 10 e3 bd 64 b6 d7 | 17 a8 22 9f 5b fa d6 0f ff c7 fd 62 90 ad 11 bd | ff 07 97 74 0b a0 21 03 b9 7c aa ad b1 ad 49 72 | 5f 2c 47 a9 f3 63 c1 b3 15 54 6d cd c4 7d 13 32 | 29 00 00 24 df 38 21 9b c8 79 39 a8 97 b7 e7 63 | ee 58 b2 42 1a e1 b0 cb df 35 eb af c7 2a 6c bf | 74 ce 41 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 b5 b7 4a c6 20 18 db f0 ed 70 df | e7 b2 6e ac cf 7e 53 29 00 00 00 1c 00 00 40 05 | 24 32 79 2d 89 4f a3 7c f7 62 0e 7f 87 b5 46 ae | 93 84 e8 69 | libevent_free: release ptr-libevent@0x7f4978038d98 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daaa388 | #474 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 27 f5 f5 1e 00 e6 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 05 27 f5 f5 1e 00 e6 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da505f8 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.635465; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daaa388 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #475 | libevent_malloc: new ptr-libevent@0x7f4978038d98 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d5 10 82 6e 7a 09 62 88 74 c2 67 20 4f d0 65 | ec eb d4 21 d0 b6 6c 6b 97 1b 53 84 18 72 e1 19 | 03 48 34 6b 50 93 85 09 0e 03 b3 c3 20 a0 67 6d | 08 29 97 fd fe 52 0b 1c a6 3e 60 3b 5d 87 64 fa | 39 1a ae 3b 3f 1e ed bb 00 47 a4 2f 98 e1 8e 90 | b7 96 0e 71 ca c0 0c ae 68 70 7c 7a 14 c8 60 87 | 1f 79 a3 af b2 99 cc ea c7 37 62 ee a5 f4 49 8d | ed 4d 8c b7 b3 c6 b8 2a 52 bd 54 65 ee 8a 40 5b | e4 38 ac 8b 7d 26 69 e0 50 6a b4 85 3a 5e d4 6d | ac 50 f0 c5 92 d8 4d b4 12 75 bd 6d 26 6a 59 f5 | 24 54 04 12 43 48 bb 4a 14 54 16 89 6d 78 a3 08 | 2d 0a a8 ec e2 03 dd a5 f2 e7 5d 59 93 c9 8e 5a | d3 2f 6c b9 2e e7 56 4e 5c 5a 7c c0 e7 bf 41 5c | f9 80 b1 ef 47 1c 65 d9 82 76 fb 8b c9 c6 3b 07 | 07 f9 54 3e ab df f5 40 ba 76 bd 4a 81 b7 8e 37 | 17 42 b4 c6 af 28 ac f1 23 46 bf b9 a9 33 8d c2 | 29 00 00 24 9b 07 8e 8b 97 fc 8f cf 23 38 4d a2 | d5 75 9a 37 39 5f ae fb 2c 95 d0 eb bf 84 bd 8c | f0 00 eb 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 25 42 6a ab df 08 2f 4e 08 28 ee e9 | b6 c0 a2 76 b1 1a 80 3a 00 00 00 1c 00 00 40 05 | 1d 59 54 4d 81 53 fa 2d 5f 5b 57 60 8f aa 0c 97 | 34 34 48 f4 | libevent_free: release ptr-libevent@0x7f498803e6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da505f8 | #475 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 3e 78 64 22 25 1e 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | 8d 3e 78 64 22 25 1e 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd048 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.732808; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da505f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #476 | libevent_malloc: new ptr-libevent@0x7f498803e6d8 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 a5 44 ac 2f 74 93 7d a7 1d 33 d7 57 cf 69 68 | b5 79 4a 8c 47 2e 14 87 6d c1 77 7c 9b 3b dc 73 | dc c4 7f 82 31 c2 a7 77 fc 15 46 c3 fd e5 9a a2 | 60 5e da bb 4d 16 33 b6 ef a2 d0 4a 21 e9 8c e5 | 8c a7 78 38 2d 61 a3 3e fd 2e 15 38 41 c6 b3 55 | b2 ca 4f b5 a7 42 56 3e c8 90 f2 5d 17 c4 1f 3f | be 3a 68 4f 83 01 7b 7f 2e 6c 32 14 d8 b8 24 f3 | 23 8c e8 40 62 ab 72 6c 23 c1 e5 15 24 5b 73 6f | f3 b5 b6 4c a6 8a 1e 48 cf 96 3e 36 7e a5 8f 92 | c5 7f 60 50 91 92 a8 10 09 02 f2 ba ed ef 4d bf | 99 d2 ca fa bf 7e fe 04 77 a1 63 d3 d6 57 21 c0 | f8 51 e8 92 4a 79 0a 69 28 e6 61 55 aa 07 35 74 | 45 69 73 ae b0 4b 96 bb c9 ad 3e 9e 01 e9 58 74 | 74 60 eb b9 69 08 3a 59 9a 65 43 12 c6 55 2e 02 | 52 5c 12 c1 e6 05 f2 fc 02 f8 7b 07 a9 b9 a2 a4 | bb b9 47 8f b4 3c 90 ea cd 41 7d 8e ea f6 bd 2c | 29 00 00 24 25 55 de 16 56 16 6e d2 6a c3 9f 4a | d0 a5 11 72 aa f8 26 b2 90 04 d2 34 93 e8 c5 56 | e3 6a bb 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fe c4 3b fe 5a f9 49 45 55 46 ff 60 | 42 a7 b9 12 b7 5e e0 df 00 00 00 1c 00 00 40 05 | f8 33 09 fb 8f a0 4c c3 19 1b 76 63 f3 db 75 2a | 38 af be fa | libevent_free: release ptr-libevent@0x7f499c022b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd048 | #476 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 27 50 bf 31 06 86 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | ad 27 50 bf 31 06 86 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9e8168 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.827273; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd048 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #477 | libevent_malloc: new ptr-libevent@0x7f499c022b68 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b da c1 92 51 66 06 4a 55 07 8c 65 29 a4 78 be | 4e 27 0a 17 85 32 9b 52 ed d3 02 99 fb a2 02 4c | 39 0c 5f 5d 36 21 d2 7f 81 6a 8e 33 c7 8a 14 01 | 5a 65 ee 4c e0 4a e2 39 dd 96 64 a7 73 94 2a 81 | 37 96 39 4c c5 bf 76 95 91 b3 bc ee cf ed ac 1d | f8 d7 26 37 3f 5e 43 68 b2 ec d4 2d 7b 5e fd 21 | ff f5 7f 6f 4e 3e 73 68 57 ca 68 33 1a ad ac 5f | 26 81 ff b9 58 3b d1 4e 93 61 65 4a 15 af 41 6c | d4 36 a9 d2 af cc 37 05 7a 66 48 b7 58 bb d1 7f | 5a a7 63 11 52 7b 55 b2 58 bb 3f d2 94 ff 36 c7 | af 86 4c a0 8c b6 27 8c dc 47 17 5d 2b 5f f0 3d | 21 e6 f2 68 59 3b 8c 9c 05 67 b1 10 30 fb db a2 | 41 d9 c7 c2 ff b4 af 7f b7 7d 6f a7 fb 44 4c dd | 18 19 4c 0a 20 7c e4 2d 0c 15 9e 6d b2 d5 90 eb | 4f 54 2d b4 51 be e0 94 e7 db c0 8d 9f bd d6 e6 | 3d 82 3b 29 f0 c0 7e 39 c9 6a e4 e4 29 ea 34 17 | 29 00 00 24 29 bf 50 b7 6e c1 89 c3 7d c4 ee 2c | 09 52 1d 2f 1b b5 89 1b ed eb a5 53 3e d1 34 17 | 23 ec 94 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 0b 06 37 64 b1 0a dd 7e c6 1c 15 | 18 18 1b d7 3e 7a 1d 00 00 00 00 1c 00 00 40 05 | 31 e3 01 8e f4 e4 69 64 cf 1f 44 1a 25 b8 d8 e0 | e1 7d 70 a8 | libevent_free: release ptr-libevent@0x7f496c017ea8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9e8168 | #477 spent 0.248 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 07 ac 1e c1 b2 a0 f3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 04 07 ac 1e c1 b2 a0 f3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.109 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49800058b8 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.900975; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9e8168 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #478 | libevent_malloc: new ptr-libevent@0x7f496c017ea8 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 dd b7 d7 7b ee 4d 46 22 ad 27 5a 29 6e 4c 0b | 79 05 4b 99 3b ce ca 35 45 85 a9 5c b7 7f f9 77 | b7 9b 84 d5 91 59 e6 8b 23 f2 83 d9 f5 10 df 19 | 64 92 8f 8a 00 2f a1 53 5e 05 e6 d6 b9 d2 7f e4 | 56 61 12 f0 a7 ff 1e a0 d1 88 ea 1c 5e 1d b9 c5 | ca 7a 65 a7 20 76 3e 44 16 84 ed 61 f1 dd d2 9d | ab 1f cd 96 92 8e 78 23 d5 b2 f8 fb a0 6d 5d 9f | 12 25 4c 01 99 03 c1 7a db 9d f2 bf 8d 9b 02 3b | eb 5e 59 a0 ee 91 02 99 14 09 19 4a 7f 33 e4 a7 | 97 97 af 04 e4 9b 7e e4 a1 43 95 1f 00 59 78 c7 | 85 92 ae 0a c1 c2 13 29 2f 67 ad 38 cb d4 32 32 | ca ce ea 9b af f7 ce 8b 49 d1 75 5f 95 02 58 f2 | ad 67 b1 24 bf 58 52 c6 df c0 1d f6 bc 30 fb 5a | d7 e2 97 44 a6 1d 65 0d 31 0b 81 dd 8b 7d dd 39 | d3 ad c0 c1 78 5e 76 96 46 4a 42 0f 41 32 6d da | 5e 27 57 93 6f df 96 28 71 d7 0c 91 46 83 6a ab | 29 00 00 24 c8 35 e4 d2 17 52 32 e9 d5 09 b6 f1 | 08 91 c3 2a 59 e6 69 03 a0 22 6c bc 34 1c ab ab | 31 ab 29 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 55 77 5d 49 8b 6b aa 3b 8d 12 61 | 36 da bd 15 b0 47 af 3c 00 00 00 1c 00 00 40 05 | 97 d4 70 09 8b 0e 34 2e 09 20 6c b1 cf ec 4c 82 | 68 14 18 52 | libevent_free: release ptr-libevent@0x7f49780242d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49800058b8 | #478 spent 0.605 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 b2 13 6c 1a 0a 8a 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | a3 b2 13 6c 1a 0a 8a 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.306 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9ec738 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10670.972071; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f49800058b8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #479 | libevent_malloc: new ptr-libevent@0x7f49780242d8 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 c7 eb 19 5d e2 c7 ad 24 ed 7d 02 7e 4c 0d 34 | 7e 69 15 d5 96 9e bd 90 2b 9c 9d d8 9e 7a 4d 40 | 01 85 42 fa 8e 36 eb 27 06 ba 17 41 56 39 82 8a | eb 0e 27 b6 eb 90 dc 40 8c 50 aa 20 81 3f 26 1a | c0 6c 24 99 f2 2a 4c 72 83 9b a9 bf 36 84 2b ed | bb 29 24 4e bf 7d af dc b8 2c e3 85 36 70 c9 8d | 0e fd 0d e4 b9 33 0f a7 90 46 01 51 13 87 80 16 | 0a 72 34 07 9a 92 3b c7 9f 40 e6 52 d2 97 5c 87 | ba 05 a0 e3 2b 16 85 d1 54 87 dd 25 2e 84 02 40 | 54 00 5c d4 b7 89 b7 3a 70 cd 2d 41 33 87 83 3e | 54 da 08 04 b9 ad 5f 02 27 6c 4f ad c8 17 16 3a | 4f 64 55 36 f7 c6 5a db a4 f0 b7 0d 88 6a 49 b5 | 2d 74 d8 bb 11 a1 3a 93 df f8 e9 cf f9 a1 9a 17 | a1 76 09 8c 11 a7 75 be 1e a3 f2 3e 3e 65 61 18 | f8 67 84 8b 2e a6 48 8d 28 3e ff b2 60 17 0f 99 | a9 ca ca 8d c9 8a 4e 7f 82 03 eb 70 47 20 c2 7a | 29 00 00 24 99 8e a9 15 a3 46 79 f8 db 8a 63 e1 | 56 e8 e6 21 71 39 e8 a7 63 2a 01 98 6f 30 e8 78 | bb ba c5 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 c8 ef c1 95 cb ef c5 26 7a 68 b0 | bd 33 c4 5a 73 5d 0b 72 00 00 00 1c 00 00 40 05 | 85 8c c9 da fe 67 ef 8c 17 e8 8a f2 41 66 0d b3 | 79 5c e1 1d | libevent_free: release ptr-libevent@0x7f49a8028768 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9ec738 | #479 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 9e fa 5e 40 c6 fe 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | d7 9e fa 5e 40 c6 fe 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da43548 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.041547; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9ec738 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #480 | libevent_malloc: new ptr-libevent@0x7f49a8028768 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 35 1a c2 cb ad b7 89 9c d8 6b e5 9e 16 01 0a | 9a 66 bd 1f e2 ed 14 75 3e 99 dc 0e c3 bb 39 d3 | 37 48 5f 6e 28 49 31 1d fd bd e1 5a 65 c9 72 51 | 97 60 55 eb 72 2a e4 bb df 29 1a 45 5c 9c 83 2c | 7c 08 61 41 75 20 18 97 43 07 e6 19 0b e5 dd 2e | d1 0a dd f9 c4 91 47 af 8e 57 56 b3 5f 4b f0 5e | 8c 8f ec 92 a6 fc 43 ca ab 61 51 14 52 0e 66 1b | 41 06 20 81 7b 47 f2 ca f7 b6 50 2d 65 ff 1c 6f | 24 1b 1b 68 1a a6 5f 14 72 2f a4 a0 b3 85 6f 81 | dc ae be 0c ce 8c c4 9e 62 59 79 b0 15 36 b3 cc | 94 b8 93 be 0c 50 37 dd 6b 60 26 d4 22 bd a3 95 | 31 40 7e c9 1b a6 85 33 4d 76 87 ad a0 3b a0 64 | d9 e5 07 5b bf 36 63 f2 d1 f3 6d 50 77 65 60 66 | 8d 68 0b 98 d5 a4 4f a8 49 c4 a4 7f 91 7e 46 52 | c3 37 41 db 17 98 90 83 33 83 6e 50 b5 c3 c0 77 | a2 54 ba 16 90 d5 62 2e 9f b7 d8 64 99 d0 21 41 | 29 00 00 24 01 dc df 51 f3 4d c7 f5 6e c9 9c ae | e4 87 69 d0 94 da 30 14 3f b9 29 38 f5 cf e7 4a | 36 0d 4c 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 d7 6f 48 4c 5d 7c 1d 2a ba 69 2a | f4 97 8a 8f 2d 52 c9 e8 00 00 00 1c 00 00 40 05 | 4c a2 cb 9f 6b bf 19 75 12 cf 60 79 3b d3 26 32 | 25 ce 33 a2 | libevent_free: release ptr-libevent@0x7f497803e648 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da43548 | #480 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 96 f6 31 50 66 7e 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | 5d 96 f6 31 50 66 7e 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0776 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dae7238 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.104965; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da43548 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #481 | libevent_malloc: new ptr-libevent@0x7f497803e648 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 69 e9 ce 16 86 98 4a d7 95 01 38 2f 52 64 a2 | a1 88 a0 25 ce aa dc 8d 6b 02 89 2d 43 7f d6 8e | 2c f4 de 8b f0 41 c7 df dc f6 30 67 90 de a3 05 | cc a6 b1 51 00 ab 8f 5e 73 f9 15 69 c3 05 00 1c | 2c 89 4f 1a 1c a7 3e b2 ad da b0 0f 38 d5 2f 08 | 31 19 5a db bc 68 d0 bd ad b6 0d 9d bd c4 ee c5 | 3d 7b c0 5f d5 0c 19 39 82 01 1d 4d 3a d0 4b 17 | 9e 28 2c 37 48 18 38 59 f2 fa 26 f5 ff b5 70 e6 | ba e6 22 76 f6 7b 81 33 58 3d 7c 90 22 61 a1 46 | 41 5d ae 07 30 65 c7 6a 2f 26 27 82 e2 64 a9 d8 | 30 0d 59 fe f1 0e 27 ef cb 3b 25 a4 bd 8a 6f 18 | dd 56 a0 ac 51 91 f7 ea 14 29 67 0a 31 c5 66 8b | 18 03 1c f8 f6 9e 0f db 6e 0f f9 86 79 7a ba 89 | e0 e2 73 59 b3 03 17 ee 5f b4 d9 98 95 cf 2c d3 | c9 52 30 d4 b2 58 66 aa 5f 87 a1 7d 6b 46 81 9a | da 18 7d e5 c3 1f 3e 69 2e 6c fa ba 2e 9c 28 59 | 29 00 00 24 ff e9 98 c9 d0 c3 30 48 f4 6b 0a 4c | 7a c5 f0 99 78 21 04 1c 53 96 36 91 5a 6f b6 78 | f8 34 08 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 c0 34 de db ba 71 bb 7d 20 8d 44 | 59 4a e4 c3 5d 9b 48 8d 00 00 00 1c 00 00 40 05 | 66 0d 1b c0 07 1d f8 8e 66 b4 06 08 dc f5 02 53 | 67 40 94 f5 | libevent_free: release ptr-libevent@0x7f4998039588 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dae7238 | #481 spent 0.238 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 72 23 ad 6d 0e da 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | 81 72 23 ad 6d 0e da 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da320e8 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.166466; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dae7238 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #482 | libevent_malloc: new ptr-libevent@0x7f4998039588 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 4a 85 39 84 65 17 1f 77 dc 52 db 31 06 e9 d8 | 6d cd 21 f2 22 24 bc ce 0c 6a 34 0d ed 18 aa 09 | 7e 67 47 8e dc 3f 2f 6f 7e c4 78 84 04 e1 0c d5 | 07 5f a3 e6 aa fb 29 d7 6b 01 34 92 a9 c3 49 00 | fa a4 52 a2 98 b9 01 0a a5 40 e0 e0 6a ff 10 40 | 95 6c 46 4c c6 80 13 27 ae d7 fe 61 27 69 41 64 | 51 6d 2b bd d1 2f 87 3e 8b c4 16 cc 0b 2c d5 cd | a1 78 84 5c 46 7c 53 93 5a 81 7c 75 9c ae 50 d1 | ea 90 9e 5a 9c 6f 3f 40 1d aa 16 6d 5d 7f c1 28 | fe a6 dd 18 32 73 1f 90 b9 4e 35 2c 10 6f 38 b2 | ea ba 27 2d f0 d2 fb 64 82 39 e1 2d 76 25 15 a6 | 0b 72 2d 7f aa 1e 16 f7 5b fd 9b 5c 74 36 86 c1 | ba b6 86 19 71 5d 5d 13 4b f7 03 5a 78 51 16 6a | ec 13 40 4e 9d 6d df 0e 74 c9 54 4f 70 39 61 56 | d5 14 20 28 e9 e0 37 d6 56 10 f6 b2 d6 48 9d 83 | 36 1e 93 bc 82 8d 57 9a 3b cd c8 50 2a e5 7c 56 | 29 00 00 24 9b a2 d0 0a 24 ee 74 f8 9e f1 39 ae | b7 fb ac f0 4b a5 e3 07 b1 a7 e9 96 a5 91 14 45 | d5 09 70 e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bc 98 3a 93 9c cb 5d c8 74 e3 e2 | c9 70 14 59 fa a1 2f 65 00 00 00 1c 00 00 40 05 | f2 ce 14 a4 bd bc 34 3f d1 ff f3 b5 68 25 65 38 | 21 30 9b 9f | libevent_free: release ptr-libevent@0x7f499801d6d8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da320e8 | #482 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 48 51 f2 5d 06 da c3 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 48 51 f2 5d 06 da c3 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dacd128 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.237773; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da320e8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #483 | libevent_malloc: new ptr-libevent@0x7f499801d6d8 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 75 e4 0c 94 b8 78 af e0 b5 10 c6 2f ab aa 8f | 41 6a c8 e2 37 54 f6 0b 8f dd 92 8c 0a 63 25 47 | f9 49 ea 83 80 9b b0 bf 82 40 cd db b7 55 a6 55 | c7 8a 0e 5b 68 98 5c 18 ae a2 94 e0 b6 b4 00 78 | bf 31 4c f8 09 a7 02 fd 4a 4a 5d d1 78 7b df 6a | 81 62 46 a9 77 08 2c e5 8a 98 52 7d 99 55 f1 ad | 7d de 63 23 16 86 a3 c2 c6 d1 58 98 8c 45 01 3c | 7c ef 53 c4 33 6c d1 4f 3f 96 9f 5f f8 8b c9 be | fc 16 5e 01 2a d0 bf e6 4c 11 a6 00 da 2b d6 ad | 07 fe 5e 24 d9 7d 75 ae b3 ff 0e 45 82 51 7d 7e | 94 9f 4c cf 52 7e ea ed a2 51 da 1a a4 42 e6 e7 | 5f c8 e4 a7 d3 29 ba b0 20 72 13 be 49 de a5 5e | 9b cf 4b e1 86 5f 40 c5 bd b8 57 25 ef 91 7e 87 | b0 a9 dc d1 e5 5a ab 09 bf c0 80 a3 a5 0c 1d 02 | 28 8e 49 92 ae 53 8b 50 8d ac 3a 2e 5b b5 ef 40 | 4c af 1b 90 b8 26 1d 01 1c 75 cf fa fe 14 27 14 | 29 00 00 24 f8 f8 84 9d 22 9d 27 ee be 88 c5 00 | 49 72 1e 3e cb b1 3f a8 8f 85 26 d9 03 43 77 74 | 78 e0 4e 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 83 6b 50 f6 39 be 1b a6 63 89 d9 | 98 d6 24 99 e5 16 17 4e 00 00 00 1c 00 00 40 05 | 8c 55 e6 13 f4 3f 28 2d bb cc 76 2a 3a db 60 79 | 77 c5 97 6f | libevent_free: release ptr-libevent@0x7f49b4041098 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dacd128 | #483 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da ff be 60 98 28 4e c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | da ff be 60 98 28 4e c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564daa45f8 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.304076; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005584 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dacd128 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #484 | libevent_malloc: new ptr-libevent@0x7f49b4041098 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 0e b6 2b 3a d2 d3 94 91 f7 50 08 db ef 78 | 38 ee b7 67 f0 f4 bb 42 d1 db 8f 48 de 0b 03 5b | 29 bc c5 ca 2e d3 51 78 6b 02 df 70 de bc 8f ff | d7 0e d3 b8 a6 7e 36 97 5f 87 18 3e 68 8f 7c 54 | a1 9b 39 d7 92 51 6b 55 32 ae c7 f9 b4 ba 56 dd | 35 ad 9c a9 38 40 11 3f e2 7a aa a2 71 4c eb 8b | fb a0 c4 4b c1 24 27 9e 80 8a 0b 66 a4 4e ce 75 | 6d 71 54 dc 05 df 15 60 a3 32 dd ef 12 c4 5f bd | f8 41 19 aa fd 91 6f 30 02 bb 69 5f 79 d9 fc 98 | e0 e5 3a 27 68 90 94 6a 70 1e 0c 2b 80 87 06 b7 | 9b 3c 6c 32 4d 96 fe 34 1d 59 19 a0 c8 a9 55 e8 | b8 b4 d2 43 7f 18 40 28 17 19 51 3f 3e 45 b7 cf | 85 18 72 7a f1 8e 4b 09 63 6a 58 54 0d 1b 09 16 | 0c fe 34 e6 a7 87 37 8a eb c6 1d 9a ee 79 3f ae | ae 5d a7 4e b2 12 b8 18 ce f0 39 b7 ba 07 4a ab | fd 7e 07 6e f9 f3 70 df cf 04 1a ff b6 5e 96 12 | 29 00 00 24 30 9a 5c f9 e6 ce 21 55 ee 4a 5b 5f | da 9f 36 f7 a5 a5 c3 16 f4 dd 40 8c 78 94 c7 0e | a4 7a 0e ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 c5 44 0e 59 ee 70 43 76 92 01 fa | f5 7b c0 3d e7 51 e7 dc 00 00 00 1c 00 00 40 05 | c2 1b 22 e7 62 45 f1 04 6e c6 a9 dc 37 72 3c 29 | ad e4 a5 82 | libevent_free: release ptr-libevent@0x7f4984038b38 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564daa45f8 | #484 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 03 6f 76 47 a2 6e c6 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 03 6f 76 47 a2 6e c6 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9a5538 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.367535; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564daa45f8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #485 | libevent_malloc: new ptr-libevent@0x7f4984038b38 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa 0b 73 99 74 2d b4 5f f8 cc 03 b1 29 5c 89 | 67 43 7f 6b 6c 44 90 be 68 ce fe 4a 4a b2 78 31 | 7c de 38 d6 5c c1 25 6a 75 b3 85 d0 a7 2f 76 50 | fc cd 58 d7 a4 ab 19 08 e3 13 10 16 75 74 f9 7e | 09 48 85 5f b2 82 e6 f5 56 a5 0f 41 ae 37 54 b5 | a0 1a 4b ac 0b 0b 31 6b f1 f7 35 53 d4 3f 67 c3 | 6d 17 4d 52 12 86 a0 ae 8a e4 0f 1c 06 14 bc 66 | ab 1c 2f 34 58 da 6e f1 c4 b0 ba a5 b7 26 67 d1 | ef dd f4 36 ae b0 aa 93 f3 1f e9 cf 4e cb 2d b6 | 59 fb 91 e3 f4 e8 79 f7 ac 9c af fa 96 c7 cd 62 | a3 9b 34 58 b6 68 e7 55 00 ac 3d 2e 42 bf 65 73 | d6 57 05 aa bf b9 6f 54 e8 98 2e 81 6b 37 76 83 | de dd 1d 4d 34 f0 0c 9a 8a c2 24 67 5b c5 a5 42 | d9 91 c0 d1 4a 95 ed 10 24 20 82 54 38 69 3b f6 | 80 ec 6b 92 8b df aa 3e 8f b3 9b 07 89 47 e9 ef | 8d 84 24 64 b8 80 06 19 c1 31 a2 4b dc ae 7b 39 | 29 00 00 24 22 e9 02 db ce c4 64 cf 59 cb 7e 7e | 2e 91 92 85 c1 2b 55 06 88 64 df ff d4 61 eb 43 | 84 a7 ab 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 06 fc 1a fe d8 83 97 86 d0 70 | ff 7b d2 d5 e6 7e 21 01 00 00 00 1c 00 00 40 05 | 0b d0 2d d7 69 8f de 0e a9 c5 cd e0 98 15 ed 77 | df c2 f1 a5 | libevent_free: release ptr-libevent@0x7f49b0043cc8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9a5538 | #485 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 0b 91 d5 9e 08 9f b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | e9 0b 91 d5 9e 08 9f b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0986 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9b3f58 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.435119; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9a5538 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #486 | libevent_malloc: new ptr-libevent@0x7f49b0043cc8 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 a5 de 4e ab 87 84 58 e6 e1 39 97 3c 3c 6e 06 | 3f fb 4e bb f9 48 13 21 86 56 0b be 50 cd 8c f1 | 21 fb 85 84 2a ce 29 ec 4f 4a c3 a2 77 32 12 de | f3 c4 fa 52 c6 fd 56 7e 18 c8 e2 14 b3 83 69 f1 | 35 55 cb 52 35 1a c9 5c a6 eb ec 8c 44 b5 eb b7 | 9b 38 a1 63 71 da 77 59 57 20 17 91 87 99 f1 f5 | 9c 85 a1 f3 db be 2c 80 c8 06 9c e6 69 04 6e d9 | 85 c4 51 56 fe 9f 36 ad 99 b7 f4 f4 54 98 c6 93 | be 18 25 b9 c0 e8 d8 be ff 36 1c ff a7 a4 2d 23 | fa 0d 9e ff 0b a7 44 67 40 12 b4 77 b5 11 4a ea | b4 84 b1 8a f3 91 5f bc 70 88 79 a8 f7 30 f0 92 | e9 42 54 75 7b 4c 22 c2 d7 35 4a 49 3c 60 30 63 | a6 2a de ca 66 78 62 77 ac 6d da 33 c6 74 bf 03 | 31 c5 a2 86 9e b4 be 1c e3 fa 36 bd 2e 44 fb 48 | 94 9b d7 25 10 d0 2b fc 25 86 fc bf ba 31 a3 aa | 4e 68 df ea 75 8b 99 a4 46 26 63 b2 73 ba 78 e5 | 29 00 00 24 c4 4e 76 14 ad ba d5 3e f8 2a c0 f0 | e0 d4 b1 4a ab 8c f9 bf 5f a7 37 a2 46 be b1 91 | ad ac 7a 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a c3 48 3c 14 19 2d b1 6d 78 a4 a1 | 69 6b de b7 d6 44 b5 42 00 00 00 1c 00 00 40 05 | 4e f7 b8 08 cf 97 b2 a8 f3 e1 e8 f6 96 bb ba 9f | 51 51 fa f1 | libevent_free: release ptr-libevent@0x7f497c038b68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9b3f58 | #486 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 0e 3a 86 80 34 c4 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 55 0e 3a 86 80 34 c4 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564d9d6b58 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.499062; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9b3f58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #487 | libevent_malloc: new ptr-libevent@0x7f497c038b68 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 08 a7 e2 78 25 a4 9d 5e 90 41 89 af 81 f2 6b | c1 ca d4 c6 78 d0 8c b7 6f 53 9c 1b 91 40 aa ee | a2 4e bc 3d 9a dc 0a 56 9e 91 e4 85 ba cf 2a 18 | 59 e2 0d 4e d7 14 fd 48 12 f2 73 ac 54 64 3f 38 | 65 89 ae d7 15 ed 0f 5c b3 bb 19 f1 a0 20 01 6a | 6d bb eb 1e 4e aa 41 56 84 3e 9e 0a 37 67 3d d5 | 32 b9 86 c0 3e c6 99 37 77 69 1b 2b 72 75 ff 3a | 8f ab ef 28 c7 9b 3c 57 15 a2 58 76 62 41 8a fa | a2 5d 1b dd f5 89 c3 d2 aa e7 e8 5d 22 22 d1 54 | f9 5c c5 cf d5 a1 65 42 9e 2c af 02 54 cf b8 a5 | 11 69 c1 39 14 4a 19 b9 0c 95 b2 35 58 ee f5 cd | ab a8 29 4a 3f a2 a4 c9 9d 4e 9d 51 c0 13 25 c9 | 73 a8 32 03 b4 ec 76 72 de 93 cf 0c 44 af 41 a5 | 45 c2 3d ae 70 8a 23 16 a2 60 16 79 ad 5e 17 6d | 6e 9b a3 10 1a 40 95 b2 ed d8 35 eb 1d a4 29 46 | 87 d4 d9 80 cc 9b 3f 30 ad e4 29 9d e2 e1 ec 68 | 29 00 00 24 5e 7b b9 6a 27 9b b9 32 6d 49 b5 35 | 88 3f 70 df 9d 08 9a 96 8e b9 7e ac 37 e2 0e 00 | 5c d0 cc ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb bc c0 11 92 f1 7c ce 7a d4 ce 7e | fa 41 f4 42 19 90 92 64 00 00 00 1c 00 00 40 05 | c0 96 e7 7b c7 39 6e 0a bd f6 58 53 0b ba b6 39 | 2a 0c 8f df | libevent_free: release ptr-libevent@0x7f49b401a508 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564d9d6b58 | #487 spent 0.432 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 97 38 bc eb ce be 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | bb 97 38 bc eb ce be 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da5bee8 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.561822; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564d9d6b58 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #488 | libevent_malloc: new ptr-libevent@0x7f49b401a508 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 40 3a 54 94 de c8 1a 8a a1 53 b6 35 ff 54 0c | e3 5f 29 ce a5 0d df b7 61 ec e7 b7 06 72 4b a9 | 5f 86 2e 73 58 38 9d a7 e8 69 13 cc da aa 0f e4 | c3 04 a9 da 64 63 20 e1 94 9e 65 be 34 11 ae a8 | bd 51 ca 95 4e 56 22 85 fa a3 b5 7c 63 2e 54 45 | 26 9a 36 79 73 74 30 d0 f3 bb 88 27 12 16 16 33 | 79 1b 8c 89 aa 0e 60 87 b1 a6 ee 04 9c bb e3 a8 | 21 a6 cc 5b 70 98 9e d5 8a 35 78 73 a0 8f 80 51 | 01 5a 96 32 8a a1 97 fb 2b fa fc 80 0e 12 8c f3 | 88 da 12 e5 19 89 c5 66 69 f3 35 02 d7 7f 13 67 | 34 cd 02 94 a0 04 71 96 ab 9d fd 99 34 3f 20 7e | 13 cb ad d8 c5 30 f0 23 b9 c6 5d cb fa 48 47 90 | 0f 7a 92 4e fa c9 fd 2b ea f9 83 85 79 a8 ba d4 | 8e 84 e5 8e bf 5f c3 35 88 57 da ea 08 c6 61 3e | d7 cb cc 4c 1c 75 4f 7b 4f 19 50 71 71 ee d8 14 | 29 06 2e f9 af 84 23 ce 9a 4b 55 cc bb ba 4f 94 | 29 00 00 24 f0 fe 71 d6 7e c9 e7 90 b7 63 7f 01 | 16 da 58 9f f5 12 b5 1a 57 0e d2 45 6a 1c ca 91 | c5 e0 92 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 62 bd a5 a2 32 eb 4d 9c 9d 7c 1a | 29 8f c7 b6 31 c3 8d 8b 00 00 00 1c 00 00 40 05 | 8b 10 84 37 8b e0 86 ac 43 5d 83 c7 f9 11 5c 5a | 27 df 7d 5b | libevent_free: release ptr-libevent@0x7f49a8044028 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da5bee8 | #488 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e dd 0d 7a 41 6b da ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 5e dd 0d 7a 41 6b da ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564da04f48 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.628192; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da5bee8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #489 | libevent_malloc: new ptr-libevent@0x7f49a8044028 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 0e 79 53 2b c4 93 d9 6c fd ec bc 6f 62 dc de | 39 fd 15 51 a7 d5 8a fb 10 51 03 1f 31 40 26 e8 | c7 79 07 8c b6 7b 10 d0 84 b7 ec 29 d6 90 e8 d1 | 77 05 5c f8 b9 3d 4d 26 29 98 6b 07 b3 ea 03 d9 | e2 17 42 38 ea c9 9b d1 37 56 52 dc 90 0b ad 72 | a8 ed 89 15 bf d4 d7 4c 3a cb 11 b3 a5 e8 82 f3 | fa fc 2a d4 7b 00 83 da 00 eb c8 9b fa 28 ba 8a | 74 01 fe 61 34 d7 fd 70 90 a3 0c f6 fa 25 f6 04 | 11 cb 90 fd c5 14 e5 09 0c 9e dd c0 7c e1 04 3e | a0 6e 2d 61 c4 11 cd 77 f5 32 aa a8 09 ff 83 88 | d4 ed dc e9 0a dd 0d fd a0 a9 68 0c e7 e9 e3 f2 | 46 c1 74 12 1b ab f3 ed f4 9f 23 dc 1b 70 67 8c | 69 1f 50 45 9c 1c 4b 59 5f 5a 34 20 eb 78 55 41 | 31 67 32 c9 6e d6 88 d6 81 b6 48 51 83 4a 3a 3c | 82 5b 3c 3e a6 78 17 60 0d e2 f1 e9 7d 4b 5e 64 | 45 8f eb ad ed 9b b5 29 6b 16 62 7f 38 92 d0 52 | 29 00 00 24 2f de dd e7 2b 33 09 16 de 76 0e 1f | 62 7e 38 3e a7 07 6f 2e c4 a6 47 06 da e2 5a 7b | 64 dc 20 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f b8 f6 75 6b b5 61 65 d5 92 3f 4f | 28 f5 d6 dd 88 eb 93 a4 00 00 00 1c 00 00 40 05 | 39 9f 7b 55 a8 2b 11 aa eb e6 ad 3e 63 be 13 9e | 15 3f 09 8d | libevent_free: release ptr-libevent@0x7f49a0022ab8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564da04f48 | #489 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cc d5 00 b6 45 21 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 4d cc d5 00 b6 45 21 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dad8af8 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.691538; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564da04f48 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #490 | libevent_malloc: new ptr-libevent@0x7f49a0022ab8 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b d4 69 32 83 fe e4 22 02 84 38 71 27 d8 8e f4 | 33 4c c2 ad 75 8a 52 ee 5b 70 0d ae 41 81 d7 e1 | 51 dd 34 28 cd bd 0b d7 27 61 98 18 df 14 a1 2e | 9c 91 e8 0e 37 7a 34 ef 3c 82 b7 c8 5c b5 8d 25 | 57 b7 28 fd d6 1d 93 61 aa ae 55 51 68 c5 8e ec | d2 8c c5 fa cf 37 d5 43 ac b4 a6 4f e5 b5 30 83 | 76 51 da 9e 05 99 23 c6 f4 17 8f 05 6b 5b b3 26 | cc 67 0f 31 dc cc 57 62 07 f5 ac b6 c2 cc 6a 76 | 91 22 3c 21 9c 80 af 4f fe 40 d1 0f 8f e4 f1 11 | d6 c7 af 69 32 16 29 19 5f 2d 64 ca 85 44 ec 0f | d8 f8 97 30 34 fa a7 83 75 ac 4e 24 9b b0 de 54 | b8 1a d9 33 3a 9b 4b 9c 07 3c 80 5f 27 2e 8c a8 | 40 5f 4b c2 00 a7 43 da ed 4c 30 15 c8 e0 34 0f | 57 9c 97 2c 38 be 35 e6 17 4f ed 7e 5b 23 cf 46 | 9a 1c ce 5f 57 05 c9 aa 2c c6 8e bf 10 e1 6f ae | ac e9 2c 39 fd 6c bf be 3a ce ce 88 5f a3 25 98 | 29 00 00 24 0b 81 2e 3c 6f 1d e6 eb e1 e2 3e 22 | 02 d4 5b 03 86 58 b1 ad 2a 3b b4 89 92 4a 44 91 | 89 68 47 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 cf 44 1f 27 b2 02 f8 7a c2 1f 96 | f4 6f 78 7d f7 11 02 f5 00 00 00 1c 00 00 40 05 | 18 c7 ee bd 66 7f 16 eb 0d 90 a0 81 7a 36 ca 3e | 04 22 74 eb | libevent_free: release ptr-libevent@0x7f4974043e48 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dad8af8 | #490 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 99 c7 81 b9 d2 d1 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | 38 99 c7 81 b9 d2 d1 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x55564dac1658 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.751832; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dad8af8 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #491 | libevent_malloc: new ptr-libevent@0x7f4974043e48 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 44 6d f0 9a 6c c3 dd 6d de e2 c3 f1 de 72 fc | 6c b3 b3 d6 23 87 93 d7 7f 8a f9 84 3c 26 00 33 | db 4b 79 ce df 06 5d 0d d6 d3 78 47 6b 7f 10 5a | 55 c6 3e 9f c4 98 5f 56 f9 50 73 0c 55 8c b9 f7 | 10 d0 17 49 17 69 e7 ec 73 4e 0b a4 52 b3 78 9e | 5d d8 98 b6 5d 62 da c4 58 07 d0 fc 33 b8 a7 40 | e3 11 2a ca ee 3c 1f 46 5a b4 2c a1 46 e2 91 3f | 68 78 d7 07 ee bc b8 54 af 0f 6f f4 35 9f 25 5a | 70 31 1a e2 f8 34 48 7c 1a 7f 10 db 53 f3 9a fe | fa de 84 fb d1 fb 7f 84 a7 78 e9 5e 9e d6 0d 08 | fa 1e 10 55 32 8f f7 ad 1c 59 50 0a 15 2a 95 8c | 9c 0f 19 d0 34 5b 6e 47 7a 1e 06 55 c6 fc 8e db | 83 c7 7e c7 f3 e1 26 9e b3 e4 d4 17 d6 42 4d 9f | e7 c7 1b f5 bb 55 b1 56 ca 4a 11 e3 cb ed 55 72 | 06 d2 75 86 0d c5 93 09 d9 2f 53 e2 4b 5c bc 46 | 94 1f 90 a0 ad 0b 65 7f cb 60 a6 c8 b8 81 52 03 | 29 00 00 24 80 f2 2d f7 19 64 29 91 76 39 f9 08 | f4 39 ae ee 0e 1e a3 4a b3 03 59 8e d4 db 47 b7 | 72 36 80 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c0 3b a7 72 3e 2c fe 72 31 a4 4a db | d0 c3 f1 1b 7b 68 2a 3d 00 00 00 1c 00 00 40 05 | e2 e8 76 08 28 09 d0 f1 5b c5 26 18 54 07 a9 f0 | 8b 97 eb 1b | libevent_free: release ptr-libevent@0x7f49b4014e58 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55564dac1658 | #491 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ec 75 d4 55 ad 0d 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 ec 75 d4 55 ad 0d 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7f49ac0058b8 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 6 | retransmits: current time 10671.812137; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x55564dac1658 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #492 | libevent_malloc: new ptr-libevent@0x7f49b4014e58 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3f ba bb 21 0e a9 68 c8 76 2a 11 5a c2 2e 58 a6 | 5d 56 5a 7a 81 f7 00 bf 9a fc e3 54 5e 55 50 f3 | 87 b0 e6 9f e9 90 7c 63 85 a9 ea e5 bd 46 53 9b | 63 16 f0 cf ba 8e 09 62 30 a7 bc 37 f6 26 20 80 | a5 31 2d 64 82 64 4e 12 c6 f0 8c 44 ad 4b 9e d5 | e8 94 ce ed a9 24 17 11 c1 3d 77 f0 28 74 f1 6e | 2c 74 41 e8 a5 61 42 fd 30 3d 56 91 72 ea 8a f6 | 32 30 8c 44 ec 53 1f fe 1c a8 56 88 b6 3d 4b 9a | 45 ce d1 51 ef 89 b2 29 a1 de b9 f0 06 cf ae 88 | 0f cd 63 f4 76 11 97 ea cb 65 c3 8d f9 8e 44 89 | 6f d2 2a 22 a0 dc 67 e8 0a ac 9e 09 be ad 9a f9 | 67 9b 09 82 00 c2 89 e8 89 08 81 66 79 e2 a0 ca | c1 07 3e 21 4a 71 19 78 03 20 3a 90 c2 57 3c 17 | d2 ce 64 ad 3f 78 7b 32 86 ef d2 c6 ad f2 1c 33 | 93 ee 8c 61 15 90 fe ab 86 48 b2 6c 89 53 be 69 | 42 58 35 c5 e5 49 23 10 54 50 0a a5 ce 78 57 7b | 29 00 00 24 11 f9 e7 bf 6c db 58 6c 14 64 92 6f | 6a 94 04 eb ab 72 37 9a 17 bf fc 97 52 9a 5f 7d | 46 eb 72 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 75 c2 0f f3 a1 ee 4e c4 ce 44 37 | f5 5e af 29 f0 8c 08 bd 00 00 00 1c 00 00 40 05 | 51 65 57 3d b1 4e 4d a9 06 d2 5f b1 d9 53 80 c6 | db a9 58 9a | libevent_free: release ptr-libevent@0x7f49b4002108 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f49ac0058b8 | #492 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8d 50 51 d3 05 9e f9 53 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | 8d 50 51 d3 05 9e f9 53 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 69 46 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()